SlideShare a Scribd company logo
1 of 54
Ethernet Basics




   Chapter 4
Objectives
β€’ Define and describe Ethernet
β€’ Explain early Ethernet implementations
β€’ Describe ways to extend and enhance
  Ethernet networks
Overview
Three Parts to Chapter 4
β€’ Ethernet
β€’ Early Ethernet Networks
β€’ Extending and Enhancing Ethernet Networks
Ethernet
β€’ First Ethernet implementation
  –   Develop by Xerox in 1973
  –   Based on bus topology
  –   Transferred data at 3Mbps max
  –   Evolved into today’s Ethernet standards

  Ethernet is a standard for a family of network
    technologies that share the same basic bus topology,
    frame type, and network access method.
β€’ Next iteration of Ethernet
  – DIX standard (ca 1979)
  – DIX = Digital Equipment (DEC)+Intel+Xerox
  – Transferred data at 10Mbps max
β€’ Standardization
  – DIX transferred control to IEEE
  – IEEE created the 802.3 (Ethernet) subcommittee
β€’ 10BaseT
  – Earliest version of Ethernet to use UTP cabling
  – Used data frames and CSMA/CD
β€’ Topology
  – Hybrid star-bus
  – Hub at center
     β€’ Electronic repeater
     β€’ Each connection on hub is a port
     β€’ Each Ethernet NIC on network is a node.
     β€’ Does not send signal back down the originating port
Figure 4.1 Ethernet hub
β€’ Organizing the Data: Ethernet Frames
    – All networking technologies use frames
    – Ethernet frames contain seven pieces of information


β€’   Preamble
                               β€’ Data
β€’   Destination MAC address
                               β€’ Pad
β€’   Source MAC address
                               β€’ Frame Check Sequence
β€’   Length
Figure 4.2 Ethernet frame
Figure 4.3 Frames propagating on a network
β€’ Ethernet Security Vulnerability
  – Sniffers can order a NIC to run in promiscuous mode
  – In promiscuous mode, the NIC processes all frames
  – There are programs, such as AntiSniff, which network
    administrators can use to detect sniffers on an
    Ethernet network.
CSMA/CD
      Carrier Sense                Multiple Access      Collision Detection
Each NIC on the network         All machines have     If two NICs transmit at
examines the wire before        equal access to the   the same time, a colli-
sending a frame. If the         wire. Access to the   sion results. NICs may
node detects traffic, it will   wire is on a first-   listen to detect a
back off a random amount        come, first-served    collision.
of time and try again.          basis
Figure 4.4 No one else is talking – send the frame!
Figure 4.5 Collision!
Figure 4.6 Rolling for timing
Early Ethernet Networks
β€’ 10BaseT
  –   Created in 1990
  –   Over 99% of all networks use this or its newer versions
  –   Two or more computers connected to a central hub
  –   NICs connect with wires per 802.3 standards
  –   Hubs for 10BaseT
       β€’ Vary in size, shape, and number of ports
       β€’ Need electrical power
10BaseT
 Speed     Signal Type      Type of cable
10 Mbps     Baseband        Twisted Pair
          A single signal
           on the cable
Figure 4.7 Two 10BaseT hubs
β€’ 10BaseT (Continued)
  – UTP
     β€’   Uses CAT3 or better with RJ-45 connectors
     β€’   Two pairs of wires required (four-pair cable commonly used)
     β€’   One pair of wires sends data to the hub
     β€’   The other pair receives data from the hub
  – RJ-45 connector
     β€’   Introduced with 10BaseT
     β€’   Each pin connects to a single wire in cable
     β€’   Devices put voltage on the individual wires
     β€’   Pins numbered from 1 to 8
Figure 4.8 A typical four-pair CAT 5e
unshielded twisted-pair cable
Figure 4.9 Two views of an RJ-45 connector
β€’ RJ-45 Pin Assignments
  – 1 and 2 send data
  – 3 and 6 receive data
β€’ RJ-45 Connector called a crimp
  – Crimping is the act of installing an RJ-45 connector
  – Crimper is the tool used
Figure 4.10 The pins on an RJ-45 connector are
numbered 1 through 8.
Figure 4.11 Color-coded pairs
β€’ TIA/EIA 568A and TIA/EIA 568B
  – Color-coded schemes for installing a crimp
  – TIA/EIA 568A
     β€’ Green/white, green, orange/white, blue, blue/white, orange,
       brown/white, brown


  – TIA/EIA 568B
     β€’ orange/white, orange, green/white, blue, blue/white, green,
       brown/white, brown
Figure 4.12 The TIA/EIA 568A and 568B standards
β€’ 10BaseT Limits and Specifications
  – Distance between hub and computer = 100 meters
  – No more than 1024 computers connected to one hub
     β€’ Such a high number too expensive and not practical
     β€’ Too many collisions would occur
β€’ 10BaseT Summary
  – Speed:         10 Mbps
  – Signal type:   Baseband
  – Distance:      100 meters between the hub and the
                   node
  – Node limit:    No more than 1,024 nodes per hub
  – Topology:      Star bus topology: physical star, logical
                   bus
  – Cable type:    Uses CAT3 or better UTP cabling with
                   RJ-45 connectors
β€’ 10BaseFL
  – Distance: two kilometers (2,000 meters) between the
    hub and the node
  – Immune to EMI – ideal for high-interference
    environments
  – More secure because difficult to tap into
  – Multimode fiber-optic cables with ST or SC connectors
Figure 4.13 Typical 10BaseFL card
β€’ 10BaseFL Summary
  –   Speed:         10Mbps
  –   Signal type:   Baseband
  –   Distance:      2000 meters between hub and node
  –   Node limit:    No more than 1,024 nodes per hub
  –   Topology:      Star bus topology: physical star, logical
                     bus
  – Cable type:      Uses multimode fiber-optic cabling with
                     ST or SC connectors
β€’ Connecting different types of Ethernet networks
  – Same Ethernet packets, although different cabling and
    hubs
  – Media converter will connect differently-cabled
    Ethernet networks
Figure 4.14 Typical copper-to-fiber Ethernet media
converter (photo courtesy of TRENDnet)
Extending & Enhancing
  Ethernet Networks
β€’ Connecting Ethernet Segments
  – Uplink Ports
     β€’ Connect two hubs using a straight-through cable
     β€’ Marked on hub
     β€’ One end of cable to the uplink in one hub, other end in regular port of
       second hub
     β€’ Daisy chain no more than four hubs
     β€’ Uplink port may have a button to switch between regular or uplink
       mode, electronically reversing the wires inside the hub for that port
     β€’ When connecting hubs
         – Only daisy-chain hubs
         – Take time to figure out the uplink ports
         – If incorrectly connected, they simply will not work
Figure 4.15 Typical uplink port
Figure 4.16 Daisy-chained hubs
Figure 4.17 Hierarchical hub configuration.
This will not work!
Figure 4.18 Press-button port
β€’ Connecting Ethernet Segments (Continued)
   – Crossover Cables
      β€’ Another way to connect two hubs without an uplink port
      β€’ Connect via two normal ports using one crossover cable
      β€’ Crossover cable reverses the sending and receiving pairs on one
        end
          β€’ One end crimped per TIA/EIA 568A
          β€’ Second end crimped per TIA/EIA 568B
Figure 4.19 A crossover cable reverses the
sending and receiving pairs
β€’ Switched Ethernet
   – The Trouble with Hubs
      β€’ A hub sends all packets out all ports
      β€’ Increased traffic will slow network
      β€’ Total bandwidth is 10 Mbps
      β€’ When two nodes attempt to use wire at the same time, CSMA
        reduces the effective speed to ~ 5 Mbps
      β€’ Add more conversations: network slows further
Figure 4.20 One conversation gets all the bandwidth
                    Switched
Figure 4.21 Two conversations must share the bandwidth
                        Hubs
β€’ Switched Ethernet (Continued)
   – Switches to the Rescue
      β€’ Ethernet switch takes advantage of MAC addresses
        (OSI Data Link layer)
      β€’ Creates point-to-point connections between two conversing
        computers
      β€’ Effectively gives every conversation the full bandwidth of the network
      β€’ When first turned on, switch copies the source MAC addresses and
        builds a table of MAC addresses of each computer
      β€’ Uses the table to create point-to-point connections between each
        pair of communicating devices
Figure 4.22 A switch tracking MAC addresses
Figure 4.23 A switch making two separate connections
β€’ Switched Ethernet (Continued)
   – Switches to the Rescue (Continued)
      β€’ Switch makes CSMA/CD insignificant
         β€’ Connect switches any way you wish
         β€’ Commonly connected in a tree organization
         β€’ No collisions
Figure 4.24 Switches are very commonly
connected in a tree organization
Figure 4.25 Hub (top) and switch (bottom) comparison

More Related Content

What's hot

network Switch
 network Switch network Switch
network Switchzeeshan hanif
Β 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
Β 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
Β 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
Β 
Lecture 3 network communication media and devices
Lecture 3 network communication media and devicesLecture 3 network communication media and devices
Lecture 3 network communication media and devicesAlbert Abbosey
Β 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
Β 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESManas Rai
Β 
Network Adapter
Network AdapterNetwork Adapter
Network AdapterAnkit Agrawal
Β 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit Ipkaviya
Β 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabhaSuprabha Sahoo
Β 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
Β 
Packet tracer
Packet tracerPacket tracer
Packet tracerImdad Ullah
Β 
Delays in packet switch network
Delays in packet switch networkDelays in packet switch network
Delays in packet switch networkShanza Sohail
Β 
Network devices
Network devicesNetwork devices
Network devicesAshok R
Β 
Computer networks
Computer networksComputer networks
Computer networkspenja_sims
Β 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
Β 

What's hot (20)

network Switch
 network Switch network Switch
network Switch
Β 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Β 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Β 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
Β 
Lecture 3 network communication media and devices
Lecture 3 network communication media and devicesLecture 3 network communication media and devices
Lecture 3 network communication media and devices
Β 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Β 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
Β 
Network Adapter
Network AdapterNetwork Adapter
Network Adapter
Β 
CS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit ICS8591 Computer Networks - Unit I
CS8591 Computer Networks - Unit I
Β 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
Β 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
Β 
Packet tracer
Packet tracerPacket tracer
Packet tracer
Β 
Ethernet
EthernetEthernet
Ethernet
Β 
Network architecture
Network architectureNetwork architecture
Network architecture
Β 
Ethernet
EthernetEthernet
Ethernet
Β 
Delays in packet switch network
Delays in packet switch networkDelays in packet switch network
Delays in packet switch network
Β 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
Β 
Network devices
Network devicesNetwork devices
Network devices
Β 
Computer networks
Computer networksComputer networks
Computer networks
Β 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
Β 

Viewers also liked (12)

Profinet Design
Profinet DesignProfinet Design
Profinet Design
Β 
Profinet system design - Andy Verwer
Profinet system design - Andy VerwerProfinet system design - Andy Verwer
Profinet system design - Andy Verwer
Β 
Profibus commissioning and maintenance - Richard Needham
Profibus commissioning and maintenance - Richard NeedhamProfibus commissioning and maintenance - Richard Needham
Profibus commissioning and maintenance - Richard Needham
Β 
Basics of sockets
Basics of socketsBasics of sockets
Basics of sockets
Β 
Jnp
JnpJnp
Jnp
Β 
W4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomasW4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomas
Β 
Profibus and Profinet shield currents - Peter Thomas
Profibus and Profinet shield currents - Peter ThomasProfibus and Profinet shield currents - Peter Thomas
Profibus and Profinet shield currents - Peter Thomas
Β 
Introduction to PROFINET - Derek Lane of Wago
Introduction to PROFINET -  Derek Lane of WagoIntroduction to PROFINET -  Derek Lane of Wago
Introduction to PROFINET - Derek Lane of Wago
Β 
Introduction to Profibus & Profinet - Mark Freeman
Introduction to Profibus & Profinet - Mark FreemanIntroduction to Profibus & Profinet - Mark Freeman
Introduction to Profibus & Profinet - Mark Freeman
Β 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
Β 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
Β 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
Β 

Similar to Networking Chapter 4

Lan basic
Lan basicLan basic
Lan basicOnline
Β 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernetOnline
Β 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
Β 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsTutun Juhana
Β 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware ConceptsAmir Villas
Β 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20rajeshvbe
Β 
Chapter 2. fundamentals of ethernet la ns
Chapter 2. fundamentals of ethernet la nsChapter 2. fundamentals of ethernet la ns
Chapter 2. fundamentals of ethernet la nsVishnu Vardhan
Β 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptHODElex
Β 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsYogesh Thawait
Β 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
Β 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networkingmlrbrown
Β 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2Programmer
Β 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
Β 
08. networking
08. networking08. networking
08. networkingMuhammad Ahad
Β 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
Β 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdfSanjayPradhan61
Β 

Similar to Networking Chapter 4 (20)

Lan basic
Lan basicLan basic
Lan basic
Β 
Ch10
Ch10Ch10
Ch10
Β 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
Β 
Network architecture
Network architectureNetwork architecture
Network architecture
Β 
Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
Β 
Ppt on networking
Ppt on networkingPpt on networking
Ppt on networking
Β 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware Concepts
Β 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
Β 
Chapter 2. fundamentals of ethernet la ns
Chapter 2. fundamentals of ethernet la nsChapter 2. fundamentals of ethernet la ns
Chapter 2. fundamentals of ethernet la ns
Β 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
Β 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
Β 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
Β 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networking
Β 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
Β 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Β 
08. networking
08. networking08. networking
08. networking
Β 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
Β 
IEEE standard
IEEE standardIEEE standard
IEEE standard
Β 
Basic networking
Basic networkingBasic networking
Basic networking
Β 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdf
Β 

More from mlrbrown

Cso gaddis java_chapter15
Cso gaddis java_chapter15Cso gaddis java_chapter15
Cso gaddis java_chapter15mlrbrown
Β 
Cso gaddis java_chapter14
Cso gaddis java_chapter14Cso gaddis java_chapter14
Cso gaddis java_chapter14mlrbrown
Β 
Cso gaddis java_chapter13
Cso gaddis java_chapter13Cso gaddis java_chapter13
Cso gaddis java_chapter13mlrbrown
Β 
Cso gaddis java_chapter12
Cso gaddis java_chapter12Cso gaddis java_chapter12
Cso gaddis java_chapter12mlrbrown
Β 
Cso gaddis java_chapter11
Cso gaddis java_chapter11Cso gaddis java_chapter11
Cso gaddis java_chapter11mlrbrown
Β 
Cso gaddis java_chapter10
Cso gaddis java_chapter10Cso gaddis java_chapter10
Cso gaddis java_chapter10mlrbrown
Β 
Cso gaddis java_chapter9ppt
Cso gaddis java_chapter9pptCso gaddis java_chapter9ppt
Cso gaddis java_chapter9pptmlrbrown
Β 
Cso gaddis java_chapter8
Cso gaddis java_chapter8Cso gaddis java_chapter8
Cso gaddis java_chapter8mlrbrown
Β 
Cso gaddis java_chapter7
Cso gaddis java_chapter7Cso gaddis java_chapter7
Cso gaddis java_chapter7mlrbrown
Β 
Cso gaddis java_chapter6
Cso gaddis java_chapter6Cso gaddis java_chapter6
Cso gaddis java_chapter6mlrbrown
Β 
Cso gaddis java_chapter5
Cso gaddis java_chapter5Cso gaddis java_chapter5
Cso gaddis java_chapter5mlrbrown
Β 
Cso gaddis java_chapter4
Cso gaddis java_chapter4Cso gaddis java_chapter4
Cso gaddis java_chapter4mlrbrown
Β 
Cso gaddis java_chapter3
Cso gaddis java_chapter3Cso gaddis java_chapter3
Cso gaddis java_chapter3mlrbrown
Β 
Cso gaddis java_chapter2
Cso gaddis java_chapter2Cso gaddis java_chapter2
Cso gaddis java_chapter2mlrbrown
Β 
Cso gaddis java_chapter1
Cso gaddis java_chapter1Cso gaddis java_chapter1
Cso gaddis java_chapter1mlrbrown
Β 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16mlrbrown
Β 
Networking Chapter 15
Networking Chapter 15Networking Chapter 15
Networking Chapter 15mlrbrown
Β 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14mlrbrown
Β 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13mlrbrown
Β 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12mlrbrown
Β 

More from mlrbrown (20)

Cso gaddis java_chapter15
Cso gaddis java_chapter15Cso gaddis java_chapter15
Cso gaddis java_chapter15
Β 
Cso gaddis java_chapter14
Cso gaddis java_chapter14Cso gaddis java_chapter14
Cso gaddis java_chapter14
Β 
Cso gaddis java_chapter13
Cso gaddis java_chapter13Cso gaddis java_chapter13
Cso gaddis java_chapter13
Β 
Cso gaddis java_chapter12
Cso gaddis java_chapter12Cso gaddis java_chapter12
Cso gaddis java_chapter12
Β 
Cso gaddis java_chapter11
Cso gaddis java_chapter11Cso gaddis java_chapter11
Cso gaddis java_chapter11
Β 
Cso gaddis java_chapter10
Cso gaddis java_chapter10Cso gaddis java_chapter10
Cso gaddis java_chapter10
Β 
Cso gaddis java_chapter9ppt
Cso gaddis java_chapter9pptCso gaddis java_chapter9ppt
Cso gaddis java_chapter9ppt
Β 
Cso gaddis java_chapter8
Cso gaddis java_chapter8Cso gaddis java_chapter8
Cso gaddis java_chapter8
Β 
Cso gaddis java_chapter7
Cso gaddis java_chapter7Cso gaddis java_chapter7
Cso gaddis java_chapter7
Β 
Cso gaddis java_chapter6
Cso gaddis java_chapter6Cso gaddis java_chapter6
Cso gaddis java_chapter6
Β 
Cso gaddis java_chapter5
Cso gaddis java_chapter5Cso gaddis java_chapter5
Cso gaddis java_chapter5
Β 
Cso gaddis java_chapter4
Cso gaddis java_chapter4Cso gaddis java_chapter4
Cso gaddis java_chapter4
Β 
Cso gaddis java_chapter3
Cso gaddis java_chapter3Cso gaddis java_chapter3
Cso gaddis java_chapter3
Β 
Cso gaddis java_chapter2
Cso gaddis java_chapter2Cso gaddis java_chapter2
Cso gaddis java_chapter2
Β 
Cso gaddis java_chapter1
Cso gaddis java_chapter1Cso gaddis java_chapter1
Cso gaddis java_chapter1
Β 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
Β 
Networking Chapter 15
Networking Chapter 15Networking Chapter 15
Networking Chapter 15
Β 
Networking Chapter 14
Networking Chapter 14Networking Chapter 14
Networking Chapter 14
Β 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13
Β 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
Β 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
Β 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
Β 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
Β 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
Β 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
Β 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
Β 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
Β 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ9953056974 Low Rate Call Girls In Saket, Delhi NCR
Β 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
Β 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
Β 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
Β 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
Β 
β€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
β€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...β€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
β€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
Β 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
Β 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
Β 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Β 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
Β 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
Β 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
Β 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Β 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
Β 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
Β 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Β 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
Β 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
Β 
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Β 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Β 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Β 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
Β 
β€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
β€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...β€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
β€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Β 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Β 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Β 

Networking Chapter 4

  • 1. Ethernet Basics Chapter 4
  • 2. Objectives β€’ Define and describe Ethernet β€’ Explain early Ethernet implementations β€’ Describe ways to extend and enhance Ethernet networks
  • 4. Three Parts to Chapter 4 β€’ Ethernet β€’ Early Ethernet Networks β€’ Extending and Enhancing Ethernet Networks
  • 6. β€’ First Ethernet implementation – Develop by Xerox in 1973 – Based on bus topology – Transferred data at 3Mbps max – Evolved into today’s Ethernet standards Ethernet is a standard for a family of network technologies that share the same basic bus topology, frame type, and network access method.
  • 7. β€’ Next iteration of Ethernet – DIX standard (ca 1979) – DIX = Digital Equipment (DEC)+Intel+Xerox – Transferred data at 10Mbps max
  • 8. β€’ Standardization – DIX transferred control to IEEE – IEEE created the 802.3 (Ethernet) subcommittee β€’ 10BaseT – Earliest version of Ethernet to use UTP cabling – Used data frames and CSMA/CD
  • 9. β€’ Topology – Hybrid star-bus – Hub at center β€’ Electronic repeater β€’ Each connection on hub is a port β€’ Each Ethernet NIC on network is a node. β€’ Does not send signal back down the originating port
  • 11. β€’ Organizing the Data: Ethernet Frames – All networking technologies use frames – Ethernet frames contain seven pieces of information β€’ Preamble β€’ Data β€’ Destination MAC address β€’ Pad β€’ Source MAC address β€’ Frame Check Sequence β€’ Length
  • 13. Figure 4.3 Frames propagating on a network
  • 14. β€’ Ethernet Security Vulnerability – Sniffers can order a NIC to run in promiscuous mode – In promiscuous mode, the NIC processes all frames – There are programs, such as AntiSniff, which network administrators can use to detect sniffers on an Ethernet network.
  • 15. CSMA/CD Carrier Sense Multiple Access Collision Detection Each NIC on the network All machines have If two NICs transmit at examines the wire before equal access to the the same time, a colli- sending a frame. If the wire. Access to the sion results. NICs may node detects traffic, it will wire is on a first- listen to detect a back off a random amount come, first-served collision. of time and try again. basis
  • 16. Figure 4.4 No one else is talking – send the frame!
  • 18. Figure 4.6 Rolling for timing
  • 20. β€’ 10BaseT – Created in 1990 – Over 99% of all networks use this or its newer versions – Two or more computers connected to a central hub – NICs connect with wires per 802.3 standards – Hubs for 10BaseT β€’ Vary in size, shape, and number of ports β€’ Need electrical power
  • 21. 10BaseT Speed Signal Type Type of cable 10 Mbps Baseband Twisted Pair A single signal on the cable
  • 22. Figure 4.7 Two 10BaseT hubs
  • 23. β€’ 10BaseT (Continued) – UTP β€’ Uses CAT3 or better with RJ-45 connectors β€’ Two pairs of wires required (four-pair cable commonly used) β€’ One pair of wires sends data to the hub β€’ The other pair receives data from the hub – RJ-45 connector β€’ Introduced with 10BaseT β€’ Each pin connects to a single wire in cable β€’ Devices put voltage on the individual wires β€’ Pins numbered from 1 to 8
  • 24. Figure 4.8 A typical four-pair CAT 5e unshielded twisted-pair cable
  • 25. Figure 4.9 Two views of an RJ-45 connector
  • 26. β€’ RJ-45 Pin Assignments – 1 and 2 send data – 3 and 6 receive data β€’ RJ-45 Connector called a crimp – Crimping is the act of installing an RJ-45 connector – Crimper is the tool used
  • 27. Figure 4.10 The pins on an RJ-45 connector are numbered 1 through 8.
  • 29. β€’ TIA/EIA 568A and TIA/EIA 568B – Color-coded schemes for installing a crimp – TIA/EIA 568A β€’ Green/white, green, orange/white, blue, blue/white, orange, brown/white, brown – TIA/EIA 568B β€’ orange/white, orange, green/white, blue, blue/white, green, brown/white, brown
  • 30. Figure 4.12 The TIA/EIA 568A and 568B standards
  • 31. β€’ 10BaseT Limits and Specifications – Distance between hub and computer = 100 meters – No more than 1024 computers connected to one hub β€’ Such a high number too expensive and not practical β€’ Too many collisions would occur
  • 32. β€’ 10BaseT Summary – Speed: 10 Mbps – Signal type: Baseband – Distance: 100 meters between the hub and the node – Node limit: No more than 1,024 nodes per hub – Topology: Star bus topology: physical star, logical bus – Cable type: Uses CAT3 or better UTP cabling with RJ-45 connectors
  • 33. β€’ 10BaseFL – Distance: two kilometers (2,000 meters) between the hub and the node – Immune to EMI – ideal for high-interference environments – More secure because difficult to tap into – Multimode fiber-optic cables with ST or SC connectors
  • 34. Figure 4.13 Typical 10BaseFL card
  • 35. β€’ 10BaseFL Summary – Speed: 10Mbps – Signal type: Baseband – Distance: 2000 meters between hub and node – Node limit: No more than 1,024 nodes per hub – Topology: Star bus topology: physical star, logical bus – Cable type: Uses multimode fiber-optic cabling with ST or SC connectors
  • 36. β€’ Connecting different types of Ethernet networks – Same Ethernet packets, although different cabling and hubs – Media converter will connect differently-cabled Ethernet networks
  • 37. Figure 4.14 Typical copper-to-fiber Ethernet media converter (photo courtesy of TRENDnet)
  • 38. Extending & Enhancing Ethernet Networks
  • 39. β€’ Connecting Ethernet Segments – Uplink Ports β€’ Connect two hubs using a straight-through cable β€’ Marked on hub β€’ One end of cable to the uplink in one hub, other end in regular port of second hub β€’ Daisy chain no more than four hubs β€’ Uplink port may have a button to switch between regular or uplink mode, electronically reversing the wires inside the hub for that port β€’ When connecting hubs – Only daisy-chain hubs – Take time to figure out the uplink ports – If incorrectly connected, they simply will not work
  • 40. Figure 4.15 Typical uplink port
  • 42. Figure 4.17 Hierarchical hub configuration. This will not work!
  • 44. β€’ Connecting Ethernet Segments (Continued) – Crossover Cables β€’ Another way to connect two hubs without an uplink port β€’ Connect via two normal ports using one crossover cable β€’ Crossover cable reverses the sending and receiving pairs on one end β€’ One end crimped per TIA/EIA 568A β€’ Second end crimped per TIA/EIA 568B
  • 45. Figure 4.19 A crossover cable reverses the sending and receiving pairs
  • 46. β€’ Switched Ethernet – The Trouble with Hubs β€’ A hub sends all packets out all ports β€’ Increased traffic will slow network β€’ Total bandwidth is 10 Mbps β€’ When two nodes attempt to use wire at the same time, CSMA reduces the effective speed to ~ 5 Mbps β€’ Add more conversations: network slows further
  • 47. Figure 4.20 One conversation gets all the bandwidth Switched
  • 48. Figure 4.21 Two conversations must share the bandwidth Hubs
  • 49. β€’ Switched Ethernet (Continued) – Switches to the Rescue β€’ Ethernet switch takes advantage of MAC addresses (OSI Data Link layer) β€’ Creates point-to-point connections between two conversing computers β€’ Effectively gives every conversation the full bandwidth of the network β€’ When first turned on, switch copies the source MAC addresses and builds a table of MAC addresses of each computer β€’ Uses the table to create point-to-point connections between each pair of communicating devices
  • 50. Figure 4.22 A switch tracking MAC addresses
  • 51. Figure 4.23 A switch making two separate connections
  • 52. β€’ Switched Ethernet (Continued) – Switches to the Rescue (Continued) β€’ Switch makes CSMA/CD insignificant β€’ Connect switches any way you wish β€’ Commonly connected in a tree organization β€’ No collisions
  • 53. Figure 4.24 Switches are very commonly connected in a tree organization
  • 54. Figure 4.25 Hub (top) and switch (bottom) comparison

Editor's Notes

  1. Note: The Historical/Conceptual information on page 59 is not part of the exam, but it will give the students a good background understanding of how Ethernet has evolved. Point this out, and inform them that they will see more changes in Ethernet as technology advances.
  2. Tech Tip (top of Page 59) IEEE The source for all things Ethernet is but a short click away on the Internet. For starters, check www.ieee802.org . Note on Page 59: There have been many versions of Ethernet over the years. The earliest versions, named 10Base5 and 10Base2, are long obsolete. As of 2009, CompTIA finally dropped these ancient technologies from the CompTIA Network+ exam. Rest in peace, 10Base5 and 10Base2!
  3. Tech Tip (bottom of Page 59) Defining Ethernet Providing a clear and concise definition of Ethernet provides one of the major challenges in teaching networking. The difficulty comes because nobody else has a good definition and Ethernet has changed over the years to incorporate new and improved technology. Here’s a stab at a current definition. Ethernet is a standard for a family of network technologies that share the same basic bus topology, frame type, and network access method. Because the technologies share these essential components, you can communicate between them just fine. The implementation of the network might be different, but the frames remain the same.
  4. Note: The evolved Ethernet standards are the dominant network standards.
  5. Teaching Tip Briefly ask the students to recall the size and makeup of a MAC address from Chapter 2. They should remember that a MAC address is a 48-bit (6-byte) binary hard-coded address that uniquely identifies each node on a network. It is usually shown in hexadecimal notation, the first six digits are the organizationally unique identifier (OUI), and the last six digits are the device ID.
  6. Tip on Page 60: The terms frame and packet are often used interchangeably, especially on exams! This book uses the terms more strictly. You’ll recall from Chapter 2, β€œBuilding a Network with OSI,” that frames area based on MAC addresses; packets are generally associated with data assembled by the IP protocol at Layer 3 [Network layer] of the OSI seven-layer model.
  7. Tip on Page 61: The CompTIA Network+ exam might describe MAC addresses as 48-bit binary addresses or 6-byte binary addresses. Teaching Tip Cross Check Take time to have the students review what they learned in Chapter 2 about MAC addresses by having them answer the questions in the Cross Check on Page 61: Where does the NIC gets its MAC address? How does the MAC address manifest on the card? At what layer or layers of the OSI seven-layer model does the NIC operate?
  8. Note: A node is any NIC connected to an Ethernet network. Note on the bottom of Page 61: There are many situations where one computer might have two or more NICs, so one physical system might have more than one node! Note: There are programs, such as AntiSniff, which network administrators can use to detect sniffers on an Ethernet network.
  9. Tip on Page 63: CSMA/CD is a network access method that maps to the IEEE 802.3 standard for Ethernet networks. Note on Page 63: In an Ethernet network, a collision domain is a group of nodes that hear each other’s traffic. A segment is certainly a collision domain, but there are ways to connect segments together to create larger collision domains. If the collision domain gets too large, you’ll start running into traffic problems that manifest as general network sluggishness. That’s one of the reasons to break up networks into smaller groupings.
  10. Tip on Page 65: If you ever run into a situation on a 10BaseT or later network in which none of the computers can get on the network, always first check the hub!
  11. Note on Page 65: The names of two earlier true bus versions of Ethernet, 10Base5 and 10Base2, gave the maximum length of the bus. 10Base5 networks could be up to 500 meters long, for example, whereas 10Base2 could be almost 200 meters (though in practice topped out at 185 meters).
  12. Teaching Tip Cross Check Spend a few minutes having the students answer the
  13. Teaching Tip Cross Check Take time to have the students review what they learned about CAT levels in Chapter 3 by having them answer the questions in the Cross Check on Page 66: Could 10BaseT use Cat2? Could it use CAT6? What types of devices can use CAT1?
  14. Note on Page 66: The real name for RJ-45 is β€œ8 Position 8 Contact (8P8C) modular plug.” The name RJ-45 is so dominant, however, that nobody but the nerdiest of nerds call it by its real name. Stick to RJ-45.
  15. Teaching Tip Although it is stated in the text, be sure to emphasize that in spite of having separate wires for sending and receiving, 10BaseT does not allow for simultaneous send-receive. Rules of CSMA/CD apply. Later versions of Ethernet changed this rule.
  16. Tech Tip (Page 67): 568A and 568B An easy trick to remembering the difference between 568A and 568B is the word β€œGO.” The green and orange pairs are swapped between 568A and 568B, whereas the blue and brown pairs stay in the same place! Tip on Page 67: For the CompTIA Network+ exam, you won’t be tested on the TIA/EIA 568A or B color codes. Just know that they are industry-standard color codes for UTP cabling. Note on bottom of Page 67: 10BaseFL is often just called 10BaseF.
  17. Note: It might be a good idea to go ahead and discuss the wiring patterns for the patch, crossover, and straight through CAT5 cables. It would help even more if you could not only show the students how to make a cable, but also allow them to make one. Letting them actually make the cables does more for their understanding. Lab Project 4.2 in the Instructor Manual lists some websites with great instructions – including at least one good video at www.viewdo.com.
  18. Note: There are many situations where one computer might have two or more NICs, so one system might have more than one node!
  19. Teaching Tip 1000 meters = approximately 6/10 of a mile It might be a good idea to go ahead and discuss the wiring patterns for the patch, crossover, and rollover CAT5 cables. It would help even more if you could not only show the students how to make a cable, but also allow them to make one. Letting them actually make the cables does more for their understanding.
  20. Teaching Tip Higher-end hubs do not come with uplink ports. Therefore, crossover cables are the only option for connecting these hubs.
  21. Teaching Tip It is easy for students to miss that fact that hubs cannot be arranged in a star. That is, multiple hubs cannot be connected to a central hub.
  22. It might be a good idea to go ahead and discuss the wiring patterns for the patch, crossover, and rollover CAT5 cables. It would help even more if you could not only show the students how to make a cable, but also allow them to make one. Letting them actually make cables does more for their understanding.
  23. Tech Tip (Page 71) Crossing Crossovers If you mess up your crossover connections, you won’t cause any damage, but the connection will not work. Think about it. If you take a straight cable (that is, not a crossover cable) and try to connect two PCs directly, it won’t work. Both PCs will try to use the same send and receive wires. When you plug the two PCs into a hub, the hub electronically crosses the data wires, so one NIC sends and the other can receive. If you plug a second hub to the first hub using regular ports, you essentially cross the cross and crate a straight connection again between the two PCs! That won’t work. Luckily, nothing gets hurt (except your reputation if one of your colleagues notes your mistake!).
  24. Tip on Page 72: The classic difference between a hub and a switch is in the repeating of packets during normal use . Although it’s true that switches initially forward all frames, in regular use they filter by MAC address. Hubs never learn and always forward all frames.
  25. Note on Page 73: Because a switch filters traffic on MAC addresses (and MAC addresses run at Layer 2 of the OSI seven-layer model), switches are often called Layer 2 switches .