Modern Ethernet standards include 100-megabit Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet. 100-megabit Ethernet standards include 100BaseT and 100BaseFX. Gigabit Ethernet standards include 1000BaseT, 1000BaseCX, 1000BaseSX and 1000BaseLX. 10-Gigabit Ethernet standards include 10GBaseSR, 10GBaseLR and 10GBaseER which use different fiber types and wavelengths, and 10GBaseT which uses copper cabling. Higher speeds require fiber optic cabling and support longer transmission distances.
Ethernet is a standard for network technologies that share a bus topology and frame format. Early Ethernet implementations transferred data at speeds up to 10Mbps using coaxial cable or twisted pair cabling. 10BaseT networks used twisted pair cabling and hubs to connect computers in a star topology up to 100 meters apart. Switches were later introduced to avoid bandwidth limitations of hubs by creating point-to-point connections between communicating devices using MAC addresses. This increased overall network speed and allowed larger, more complex network topologies.
This chapter will cover how to configure, manage, and troubleshoot VLANs and
VLAN trunks. It will also examine security considerations and strategies relating
to VLANs and trunks, and best practices for VLAN design.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
Ethernet is a family of networking technologies commonly used in LANs, MANs and WANs. It was first standardized in 1983 at 10 Mbps and has since been updated to support higher speeds up to 10 Gbps. Fast Ethernet runs at 100 Mbps using the same frame format as standard Ethernet. Gigabit Ethernet runs at 1 Gbps while maintaining compatibility. Ten-Gigabit Ethernet operates at 10 Gbps while keeping the same frame format as prior standards.
The document provides an overview of the OSI model and TCP/IP networking model. It describes the seven layers of the OSI model from the physical layer to the application layer and their responsibilities in networking. It also discusses the four layers of the TCP/IP model and compares it to the OSI model. Key protocols like TCP, UDP, IP, Ethernet, and HTTP are explained in their respective layers along with functions like encapsulation and data flow between layers. Network analysis tools like Wireshark are also mentioned.
1. In 1997, the Gigabit Ethernet Alliance announced the first draft of the Gigabit Ethernet standard to provide speeds of 1000 Mbps for half and full duplex operation using Ethernet frame format and MAC technology.
2. Gigabit Ethernet was ratified in 1998 and provided backwards compatibility with Fast Ethernet while using Fiber Channel physical signaling technology over fiber optic or copper cables.
3. Gigabit Ethernet leveraged the physical layer of Fiber Channel and used the Gigabit Media Independent Interface to allow different physical layers to connect to the MAC layer, enabling connections over fiber or copper up to hundreds of meters.
Ethernet was first created by Robert Metcalfe and standardized by IEEE as 802.3. Fast Ethernet (802.3u) transmitted data 10 times faster than standard Ethernet at 100 Mbps while still being backward compatible. Gigabit Ethernet (802.3z) further increased speed to 1000 Mbps and supported full duplex between computers and switches or half duplex between computers and hubs using CSMA/CD. Switched Ethernet uses switches containing plug-in cards to reduce collisions by separating collision domains and allowing parallel transmission between cards.
Ethernet is a standard for network technologies that share a bus topology and frame format. Early Ethernet implementations transferred data at speeds up to 10Mbps using coaxial cable or twisted pair cabling. 10BaseT networks used twisted pair cabling and hubs to connect computers in a star topology up to 100 meters apart. Switches were later introduced to avoid bandwidth limitations of hubs by creating point-to-point connections between communicating devices using MAC addresses. This increased overall network speed and allowed larger, more complex network topologies.
This chapter will cover how to configure, manage, and troubleshoot VLANs and
VLAN trunks. It will also examine security considerations and strategies relating
to VLANs and trunks, and best practices for VLAN design.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
Ethernet is a family of networking technologies commonly used in LANs, MANs and WANs. It was first standardized in 1983 at 10 Mbps and has since been updated to support higher speeds up to 10 Gbps. Fast Ethernet runs at 100 Mbps using the same frame format as standard Ethernet. Gigabit Ethernet runs at 1 Gbps while maintaining compatibility. Ten-Gigabit Ethernet operates at 10 Gbps while keeping the same frame format as prior standards.
The document provides an overview of the OSI model and TCP/IP networking model. It describes the seven layers of the OSI model from the physical layer to the application layer and their responsibilities in networking. It also discusses the four layers of the TCP/IP model and compares it to the OSI model. Key protocols like TCP, UDP, IP, Ethernet, and HTTP are explained in their respective layers along with functions like encapsulation and data flow between layers. Network analysis tools like Wireshark are also mentioned.
1. In 1997, the Gigabit Ethernet Alliance announced the first draft of the Gigabit Ethernet standard to provide speeds of 1000 Mbps for half and full duplex operation using Ethernet frame format and MAC technology.
2. Gigabit Ethernet was ratified in 1998 and provided backwards compatibility with Fast Ethernet while using Fiber Channel physical signaling technology over fiber optic or copper cables.
3. Gigabit Ethernet leveraged the physical layer of Fiber Channel and used the Gigabit Media Independent Interface to allow different physical layers to connect to the MAC layer, enabling connections over fiber or copper up to hundreds of meters.
Ethernet was first created by Robert Metcalfe and standardized by IEEE as 802.3. Fast Ethernet (802.3u) transmitted data 10 times faster than standard Ethernet at 100 Mbps while still being backward compatible. Gigabit Ethernet (802.3z) further increased speed to 1000 Mbps and supported full duplex between computers and switches or half duplex between computers and hubs using CSMA/CD. Switched Ethernet uses switches containing plug-in cards to reduce collisions by separating collision domains and allowing parallel transmission between cards.
The 5-day course covers preparation for the MEF-CECP exam, focusing on carrier Ethernet concepts. Day 1 introduces carrier Ethernet and MEF services, including E-Line, E-LAN and E-Tree services. Participants learn about legacy Ethernet limitations addressed by carrier Ethernet, as well as the key attributes and components of carrier Ethernet networks.
This document provides an overview of Ethernet in a presentation for a computer networks class. It begins with an introduction to Ethernet and network topologies. The technology section discusses Ethernet standards, frame formats, and cable types. Devices covered include switches, routers, and the differences between them. Applications like firewalls and IP spoofing are also mentioned. The summary reiterates the key topics discussed, including the introduction of Ethernet, technologies and devices, and applications. It also outlines the future of Ethernet, such as vehicular uses and standardizing software-defined networking.
CAT 5 cables contain 4 pairs of twisted copper wires that transmit data. There are two common wiring schemes, 568A and 568B, that determine how the wires are arranged in an RJ-45 connector. To make a CAT5 cable, the jacket is stripped, wires are exposed and ordered according to the wiring scheme, inserted into an RJ-45 jack, and crimped into place. CAT5 cables are tested using a cable tester to check for faults like open wires or reversed pairs.
This document summarizes the Railnet system setup at the Gorakhpur headquarters of the North Eastern Railway zone in India. It describes the core network equipment used, including STM-1 fiber modules, Cisco routers and switches, modems, mail servers, LAN extenders and media converters. Power is supplied through UPS units and maintenance free batteries. Common failures like power outages and link errors are troubleshooted. Suggestions to minimize failures include proper installation, maintenance of temperature and power supply, and scheduled maintenance. The project helped provide understanding of the Railnet technology and connectivity used across the network.
Ethernet is a family of networking technologies used for local area networks (LANs). It was introduced in 1980 and standardized in 1985, providing data link layer services divided into logical link control and media access control sublayers. Ethernet has evolved to support higher data rates up to 10 Gbps while maintaining compatibility through consistent frame formats and addressing. Fiber optic and twisted pair cable implementations allow Ethernet to scale from campus to wide area networks.
This document discusses how networks impact daily life and the fundamentals of network components and architecture. It describes how instant communication benefits life and popular communication tools like IM, blogs and podcasts. Networks improve learning through collaboration. The key components of networks are devices, medium, messages and rules. Converged networks carry voice, video and data. Network architecture must consider fault tolerance, scalability, quality of service and security.
The document provides information about CCNA training and certification. It discusses the topics covered in the CCNA exam, recommended training courses, study materials, exam format and structure. The CCNA certification tests knowledge of network fundamentals, switching, routing, WAN technologies, security and management. Exams last 90 minutes and contain around 50-60 multiple choice and simulation questions. Common jobs requiring the CCNA include network administrator, database administrator and help desk technician.
OSPF is an intra-domain routing protocol that uses a link-state algorithm to calculate the shortest path to destinations within an autonomous system. It divides an autonomous system into areas to limit routing updates and allows for route summarization between areas. OSPF uses hello packets to discover neighbors, database description packets to exchange routing information, link-state request packets to request updates, and link-state acknowledgment packets to acknowledge receipt of updates.
The document describes a paper tower building activity that will be done in groups:
1) The class will be divided into five groups, each receiving 5 papers from the teacher.
2) Each group will develop a strategy to build the tallest free-standing paper tower.
3) The group whose tower survives different tests by the teacher without collapsing will be announced the winner.
Ethernet is a widely used networking protocol for local area networks (LANs). It uses cables to connect multiple computers together to allow them to send data to each other. Common cable types are thick coaxial cable, thin coaxial cable, and twisted pair cables. Ethernet uses encoding schemes like Manchester encoding and differential Manchester encoding to transmit data over the cables. Ethernet has evolved over time to support higher speeds through standards like Fast Ethernet that supports 100 Mbps and Gigabit Ethernet that supports 1 Gbps, while maintaining compatibility with previous versions.
- Introduz as redes PON (Redes Ópticas Passivas) e as tecnologias EPON e GPON, discutindo suas arquiteturas, desafios e padrões.
- Apresenta as arquiteturas EPON e GPON, comparando suas taxas de transmissão, alcance e número máximo de usuários.
- Discutem a evolução das redes ópticas para 10G GPON e as vantagens da tecnologia GPON em relação à EPON.
This document discusses Variable Length Subnet Masks (VLSM) and IP addressing. It begins with an overview of IP addressing fundamentals like IP address format and classes. It then explains that VLSM allows using different subnet masks for subnets of the same network, such as long masks for small subnets and short masks for large subnets. The rest of the document delves deeper into topics like hierarchical network design, subnetting, and implementing VLSM.
Ethernet is the traditional technology for connecting wired local area networks (LANs).
this slide describes ethernet its types and other aspects as well as its features
Learn the interesting explanation of the differences of the Cisco Operating Systems, including IOS, IOS-XE, IOS-XR, NX-OS and CatOS.
http://nhprice.com/difference-cisco-operating-systems.html
The document discusses network cabling and making connections with Cat5 cable. It describes different types of network cables like coaxial, UTP, and fiber optic cables. UTP cable characteristics and categories are explained, with Cat5e being suitable for Gigabit Ethernet connections up to 1000Mbps for runs under 90 meters. The steps for making a patch cable connection are outlined, including stripping the cable, arranging the wires according to the TIA/EIA 568A or 568B standard, crimping an RJ45 connector onto the cable, and testing the connection.
Network Fundamentals: Ch6 - Addressing the Network IP v4Abdelkhalik Mosa
Different types of addresses in IP v4 networks:
1. Network Address
2. Broadcast Address
3. Network Address
Unicat, Multicast, and Broadcast (directed and limited) addresses.
Multicast Addresses:
1. Reserved link local addresses.
2. Globally scoped addresses.
3. Administratively scoped addresses.
Public addresses: designated for use in networks that are accessible on the Internet.
Private addresses: used for internal networks and not routable on the Internet.
Classful and classless addressing, VLSM (subnetting a subnet)
Overview of IP v6
A network hub connects computers to each other but does not understand the data it transfers. It broadcasts all data packets received from any connected device to all other connected devices, regardless of the intended destination. While hubs are inexpensive and allow multiple devices to connect, they have several disadvantages: they run in half-duplex mode, share bandwidth between ports so each gets a lower speed, and cannot support large networks due to their limited number of ports.
The document discusses the transport layer in computer networks. It describes how transport layer protocols like TCP and UDP support end-to-end communication by establishing connections between applications, segmenting data, and ensuring reliable or unreliable delivery. TCP provides reliable, in-order transmission using sequence numbers, acknowledgments and retransmissions if needed. UDP is connectionless and unreliable but has less overhead than TCP. The document compares TCP and UDP, and explains how applications use each protocol depending on their reliability needs.
The PNO documents provide additional information on PROFINET installation and commissioning that are not covered in detail in this design guideline. The design guideline is intended to complement those documents by focusing specifically on the design process for PROFINET systems.
System designers and project managers look at the project
procurement, installation and deployment costs when they
price a project.
However, the costs of an automation system spread over the
life cycle of the plant and should include maintenance, faultfinding and health-checking.
Perhaps most important is the cost in terms of loss of
production should faults develop during the lifetime of the
plant. Spending a little more at procurement time can repay
many times over.
Good fault tolerant design need not be more expensive.
Sometimes fault tolerance can be achieved with just a little
thought at no additional cost.
The 5-day course covers preparation for the MEF-CECP exam, focusing on carrier Ethernet concepts. Day 1 introduces carrier Ethernet and MEF services, including E-Line, E-LAN and E-Tree services. Participants learn about legacy Ethernet limitations addressed by carrier Ethernet, as well as the key attributes and components of carrier Ethernet networks.
This document provides an overview of Ethernet in a presentation for a computer networks class. It begins with an introduction to Ethernet and network topologies. The technology section discusses Ethernet standards, frame formats, and cable types. Devices covered include switches, routers, and the differences between them. Applications like firewalls and IP spoofing are also mentioned. The summary reiterates the key topics discussed, including the introduction of Ethernet, technologies and devices, and applications. It also outlines the future of Ethernet, such as vehicular uses and standardizing software-defined networking.
CAT 5 cables contain 4 pairs of twisted copper wires that transmit data. There are two common wiring schemes, 568A and 568B, that determine how the wires are arranged in an RJ-45 connector. To make a CAT5 cable, the jacket is stripped, wires are exposed and ordered according to the wiring scheme, inserted into an RJ-45 jack, and crimped into place. CAT5 cables are tested using a cable tester to check for faults like open wires or reversed pairs.
This document summarizes the Railnet system setup at the Gorakhpur headquarters of the North Eastern Railway zone in India. It describes the core network equipment used, including STM-1 fiber modules, Cisco routers and switches, modems, mail servers, LAN extenders and media converters. Power is supplied through UPS units and maintenance free batteries. Common failures like power outages and link errors are troubleshooted. Suggestions to minimize failures include proper installation, maintenance of temperature and power supply, and scheduled maintenance. The project helped provide understanding of the Railnet technology and connectivity used across the network.
Ethernet is a family of networking technologies used for local area networks (LANs). It was introduced in 1980 and standardized in 1985, providing data link layer services divided into logical link control and media access control sublayers. Ethernet has evolved to support higher data rates up to 10 Gbps while maintaining compatibility through consistent frame formats and addressing. Fiber optic and twisted pair cable implementations allow Ethernet to scale from campus to wide area networks.
This document discusses how networks impact daily life and the fundamentals of network components and architecture. It describes how instant communication benefits life and popular communication tools like IM, blogs and podcasts. Networks improve learning through collaboration. The key components of networks are devices, medium, messages and rules. Converged networks carry voice, video and data. Network architecture must consider fault tolerance, scalability, quality of service and security.
The document provides information about CCNA training and certification. It discusses the topics covered in the CCNA exam, recommended training courses, study materials, exam format and structure. The CCNA certification tests knowledge of network fundamentals, switching, routing, WAN technologies, security and management. Exams last 90 minutes and contain around 50-60 multiple choice and simulation questions. Common jobs requiring the CCNA include network administrator, database administrator and help desk technician.
OSPF is an intra-domain routing protocol that uses a link-state algorithm to calculate the shortest path to destinations within an autonomous system. It divides an autonomous system into areas to limit routing updates and allows for route summarization between areas. OSPF uses hello packets to discover neighbors, database description packets to exchange routing information, link-state request packets to request updates, and link-state acknowledgment packets to acknowledge receipt of updates.
The document describes a paper tower building activity that will be done in groups:
1) The class will be divided into five groups, each receiving 5 papers from the teacher.
2) Each group will develop a strategy to build the tallest free-standing paper tower.
3) The group whose tower survives different tests by the teacher without collapsing will be announced the winner.
Ethernet is a widely used networking protocol for local area networks (LANs). It uses cables to connect multiple computers together to allow them to send data to each other. Common cable types are thick coaxial cable, thin coaxial cable, and twisted pair cables. Ethernet uses encoding schemes like Manchester encoding and differential Manchester encoding to transmit data over the cables. Ethernet has evolved over time to support higher speeds through standards like Fast Ethernet that supports 100 Mbps and Gigabit Ethernet that supports 1 Gbps, while maintaining compatibility with previous versions.
- Introduz as redes PON (Redes Ópticas Passivas) e as tecnologias EPON e GPON, discutindo suas arquiteturas, desafios e padrões.
- Apresenta as arquiteturas EPON e GPON, comparando suas taxas de transmissão, alcance e número máximo de usuários.
- Discutem a evolução das redes ópticas para 10G GPON e as vantagens da tecnologia GPON em relação à EPON.
This document discusses Variable Length Subnet Masks (VLSM) and IP addressing. It begins with an overview of IP addressing fundamentals like IP address format and classes. It then explains that VLSM allows using different subnet masks for subnets of the same network, such as long masks for small subnets and short masks for large subnets. The rest of the document delves deeper into topics like hierarchical network design, subnetting, and implementing VLSM.
Ethernet is the traditional technology for connecting wired local area networks (LANs).
this slide describes ethernet its types and other aspects as well as its features
Learn the interesting explanation of the differences of the Cisco Operating Systems, including IOS, IOS-XE, IOS-XR, NX-OS and CatOS.
http://nhprice.com/difference-cisco-operating-systems.html
The document discusses network cabling and making connections with Cat5 cable. It describes different types of network cables like coaxial, UTP, and fiber optic cables. UTP cable characteristics and categories are explained, with Cat5e being suitable for Gigabit Ethernet connections up to 1000Mbps for runs under 90 meters. The steps for making a patch cable connection are outlined, including stripping the cable, arranging the wires according to the TIA/EIA 568A or 568B standard, crimping an RJ45 connector onto the cable, and testing the connection.
Network Fundamentals: Ch6 - Addressing the Network IP v4Abdelkhalik Mosa
Different types of addresses in IP v4 networks:
1. Network Address
2. Broadcast Address
3. Network Address
Unicat, Multicast, and Broadcast (directed and limited) addresses.
Multicast Addresses:
1. Reserved link local addresses.
2. Globally scoped addresses.
3. Administratively scoped addresses.
Public addresses: designated for use in networks that are accessible on the Internet.
Private addresses: used for internal networks and not routable on the Internet.
Classful and classless addressing, VLSM (subnetting a subnet)
Overview of IP v6
A network hub connects computers to each other but does not understand the data it transfers. It broadcasts all data packets received from any connected device to all other connected devices, regardless of the intended destination. While hubs are inexpensive and allow multiple devices to connect, they have several disadvantages: they run in half-duplex mode, share bandwidth between ports so each gets a lower speed, and cannot support large networks due to their limited number of ports.
The document discusses the transport layer in computer networks. It describes how transport layer protocols like TCP and UDP support end-to-end communication by establishing connections between applications, segmenting data, and ensuring reliable or unreliable delivery. TCP provides reliable, in-order transmission using sequence numbers, acknowledgments and retransmissions if needed. UDP is connectionless and unreliable but has less overhead than TCP. The document compares TCP and UDP, and explains how applications use each protocol depending on their reliability needs.
The PNO documents provide additional information on PROFINET installation and commissioning that are not covered in detail in this design guideline. The design guideline is intended to complement those documents by focusing specifically on the design process for PROFINET systems.
System designers and project managers look at the project
procurement, installation and deployment costs when they
price a project.
However, the costs of an automation system spread over the
life cycle of the plant and should include maintenance, faultfinding and health-checking.
Perhaps most important is the cost in terms of loss of
production should faults develop during the lifetime of the
plant. Spending a little more at procurement time can repay
many times over.
Good fault tolerant design need not be more expensive.
Sometimes fault tolerance can be achieved with just a little
thought at no additional cost.
The document provides an agenda for a presentation on commissioning and maintaining PROFIBUS networks. The presentation covers PROFIBUS essentials, common faults, preparation for fault finding, tools needed, expected network quality, preventative maintenance, and steps for commissioning including using a test master to check connections and device configuration.
This document provides an overview of socket basics, including how sockets provide an endpoint for network connections and are identified by an IP address and port number. It describes the key functions for creating, binding, listening for, and accepting TCP and UDP sockets. TCP provides a reliable connected service while UDP is unreliable and connectionless. Port numbers and common services are also outlined.
The document discusses Java network programming using sockets, including how TCP and UDP sockets work in Java, how to create basic client-server applications with TCP sockets, how to create multithreaded servers to handle multiple clients simultaneously, and how to use UDP sockets to send and receive datagrams. It provides code examples for basic TCP clients and servers, a concurrent multithreaded TCP server, UDP clients and servers, and hints at creating a multiprotocol server.
Case Study – PROFIBUS Network, Waveforms, Network screen currents, EMC measurement and Network screen currents
Control Specialists Ltd. were asked to provide site support on a 6-year old PROFIBUS installation.
The installation consisted of several separate PROFIBUS networks all of which had been suffering from intermittent network failures since the network had been commissioned.
The engineering staff of the client already had a portable PROFIBUS analyser and a permanent monitor but had been unable to identify the cause of the problems.
PROFINET is an open Industrial Ethernet standard developed by the PROFIBUS Organisation for automation and process industries. It uses Ethernet communication protocols like TCP/IP for non-real time communications and provides a real-time channel for time-critical process data communications. PROFINET supports distributed intelligence, modular and component-based design approaches and provides high performance deterministic real-time communications capabilities required for motion control and process applications. It also enables integration with existing PROFIBUS installations.
PROFIBUS - the world's most successful fieldbus. Easy, flexible, consistent.
PROFINET - the leading Industrial Ethernet Standard. Open, versatile, safe.
IO-Link - the new standard in the lower field level. Universal, smart, easy.
Wireshark is a free and open-source packet analyzer that allows users to capture and analyze network traffic. It can be used by network administrators to troubleshoot problems, security engineers to examine security issues, developers to debug protocol implementations, and testers to detect defects. Wireshark works by capturing live packet data on the network, displaying the packet data in detail, and allowing users to interactively browse the packet data.
This document discusses the network packet analysis tool Wireshark. It begins with an introduction to Jim Gilsinn and his background in cybersecurity and industrial control systems. It then provides an overview of Wireshark, describing it as an open-source, multi-platform network protocol analyzer that allows users to capture, interactively browse, and decode network traffic. Key features of Wireshark like its large protocol support and graphical interface are highlighted. The document concludes by discussing advanced analysis features, developing custom protocol decoders, and providing resources for more information on Wireshark.
This document provides an overview and introduction to using the Wireshark network analysis tool. It discusses Wireshark basics and advanced features, including how to capture and filter network traffic, analyze protocols and packets, view statistics and conversations, and use Wireshark to troubleshoot network issues. Several case studies are presented showing how Wireshark can be used to analyze problems like slow connections, high load, and non-stable performance.
The document discusses optical networking and Ethernet standards. It provides information on:
- Ethernet physical layer standards including speeds, media types, and maximum distances supported.
- Optical module form factors and pluggable interfaces used to connect Ethernet ports to fiber cables.
- Fiber types (single-mode and multi-mode), wavelengths, and distance limitations of various Ethernet standards.
- Copper-based Ethernet standards including categories of unshielded twisted pair cabling and their speed and distance capabilities.
This document discusses advanced Ethernet technologies. It introduces Ethernet standards including 10Base-T, 10Base-FL, 100Base Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet. It describes their specifications, topologies, cabling, components, and advantages over previous Ethernet standards to support higher speeds and longer transmission distances. The document also covers switched Ethernet and full-duplex Ethernet technologies.
This document discusses selecting technologies and devices for campus network designs. It covers considerations for the physical cabling plant design including centralized vs distributed topologies. Common media types are discussed such as copper, optical fiber, and wireless. Specific technologies like Ethernet variants and their characteristics are outlined. Selection criteria for internetworking devices that will make up the campus network are presented, including processing power, port counts, latency, throughput and support/quality factors. The document provides guidance on evaluating options for building out the physical implementation of a previously designed logical campus network.
LAN architecture includes hardware, software, topology, and MAC protocols. There are two types of topologies - physical regarding physical connections and logical regarding message passing. Ethernet uses CSMA/CD while token ring uses token passing as the MAC protocol. Factors to consider when choosing a LAN include costs, performance, standards, and manageability.
The document discusses the history and specifications of Ethernet technologies. It describes several Ethernet standards including 10Base5, 10Base2, 10BaseT, 100BaseT, 100BaseF, and 1000BaseF which specify different data rates and cable types. It also outlines specifications for Ethernet like the number of nodes per segment, segment length, packet size limits, and media access methods. The document further discusses how Ethernet segments can be connected via repeaters and hubs, and how switches function by only repeating signals to the required port based on MAC address tables.
Transmission line, single and double matchingShankar Gangaju
This document discusses different types of transmission lines used for transmitting energy and signals over long distances. It describes common transmission line media like twisted pair, coaxial cable and optical fiber. It covers their applications in telephone networks, buildings and computer networks. It also discusses their transmission characteristics and limitations. The document compares properties of unshielded and shielded twisted pair. It provides details on utilizing different wavelengths in optical fiber for various applications.
Ethernet-Fiber converters allow Ethernet networks to use fiber optic cables by converting copper-based Ethernet connections to fiber optic signals. This extends transmission distances up to kilometers, protects data from noise and interference, and increases bandwidth capacity. The converters transform RJ45 Ethernet signals to fiber optic formats and support various fiber cable types. They are standalone devices that convert between Fast Ethernet, Gigabit Ethernet, and fiber optic connections.
Ethernet refers to local area network technologies that operate at speeds of 10 Mbps, 100 Mbps, or 1000 Mbps over twisted pair or optical cables. Ethernet devices implement the bottom two layers of the OSI model and are installed as network interface cards. Interface cards are identified by names indicating the speed and physical medium, such as 10Base-T for 10 Mbps over twisted pair. Gigabit Ethernet standards define 1000Base-T for twisted pair copper cables and 1000Base-X for twisted pair copper or single-mode/multi-mode optical fiber.
The document discusses different types of cables used for network transmission including coaxial cables, twisted pair cables, and fiber optic cables. It describes the key characteristics of common coaxial cable types like RG-58, RG-8, RG-6, and RG-59. It also covers unshielded twisted pair (UTP) cables, shielded twisted pair (STP) cables, single mode fiber optic cable, and multi-mode fiber optic cable.
Fast Ethernet and Gigabit Ethernet provide higher speeds over Ethernet networks. Fast Ethernet operates at 100 Mbps using various physical layer encoding schemes like 100BASE-T4 over twisted pair cables. Gigabit Ethernet provides 1 Gbps speeds using different cabling options like fiber optics or twisted pair. It utilizes 8B/10B encoding and builds upon Fast Ethernet and Ethernet standards to achieve higher throughput while maintaining compatibility. Gigabit Ethernet was developed to meet increasing bandwidth demands and leverage existing Ethernet infrastructure.
The document discusses Ethernet networking technologies. It describes how Ethernet was developed in the 1970s and standardized. It outlines the evolution of Ethernet speeds from 2Mbps to 1Gbps. It discusses the physical layer standards for 10BaseT, 100BaseT, 1000BaseT, and 10GBase networking. It also provides an overview of Token Ring and FDDI technologies, including their operation, standards, and key features.
Induction(Product) training programme for Schneider-electric , GoaAbhishek Singh
This presentation provides an overview of copper and fiber optic cabling used in networking. It discusses the basic components and types of twisted pair copper cabling including UTP and STP. It also covers fiber optic cabling fundamentals and components such as single mode vs multimode fiber, fiber connectors, patch cords, fiber patch panels and LIUs. The presentation concludes with providing information on testing copper cables and an overview of solar cables.
The document discusses network cabling standards for Ethernet, including copper and fiber options for speeds of up to 100 Gigabit Ethernet. It outlines the cable types, distances, and connectors used for 10/100 Mbps, 1 Gbps, 10 Gbps, 40 Gbps, and 100 Gbps Ethernet standards. Interface modules like SFP+, QSFP, and CFP are also mentioned for connecting to switches and routers.
Building rugged and reliable networks with fiberShane Duffy
This document discusses building reliable fiber optic networks. It covers why fiber is preferable to copper for networks due to its higher bandwidth, longer transmission distances, immunity to electromagnetic interference, and decreasing costs. The document discusses various network layers and designing resilient network topologies. It also covers selecting the appropriate fiber type and connectors as well as equipment for different applications.
The document discusses the evolution of Ethernet technologies over time, from the original 10 Mbps Ethernet standard to faster standards such as Fast Ethernet, Gigabit Ethernet, and 10 Gigabit Ethernet. It describes the key characteristics of each technology, including the types of media used (e.g. coaxial cable, fiber optic cable), encoding methods employed, and typical maximum transmission distances. The document suggests that while copper and wireless technologies may soon reach their speed limitations, fiber optic connections still have enormous potential bandwidth and will continue enabling faster Ethernet standards in the future.
This document discusses the evolution of Ethernet technology over several generations from its origins in 1976. It describes the key aspects of standard Ethernet including its IEEE standard, CSMA/CD access method, and use of broadcast protocol. It then covers physical layer implementations including 10Base5, 10Base2, 10BaseT, and 10BaseF and how bridged, switched, and full duplex Ethernet have improved bandwidth and separated collision domains. Fast Ethernet running at 100Mbps and Gigabit Ethernet at 1Gbps are introduced along with their respective IEEE standards and half or full duplex MAC sublayers and physical layer implementations.
The document outlines an agenda for teaching students about network cables. It includes activities such as warming up students with a motivating video, brainstorming essential questions about cables, and having the teacher demonstrate different cable types including coaxial, twisted pair, and fiber optic cables. Students will then search for information about cable types, be shown cable samples, and ask questions. The teacher will demonstrate installing network cables and students will brainstorm what tools a network engineer needs. Homework involves summarizing and comparing cable types. The session ends with reflection on students' goals and finding the teacher online.
This document discusses commercial transceivers used to implement Ethernet standards like 1GbE and 10GbE and the performance of existing fiber types. It describes the main transceiver form factors like SFP, SFP+, and XFP and their specifications regarding wavelength, fiber type, and connector. It also provides reach distances for different throughput and fiber types, noting that existing multi-mode fiber is limited by modal dispersion but the AROONA solution can transmit 4x10Gb/s over 10km in standard multi-mode fiber.
This document summarizes key topics from Chapter 15 on recursion from the textbook "Starting Out with Java: From Control Structures through Data Structures". It discusses introduction to recursion, solving problems with recursion, examples of recursive methods, and the Towers of Hanoi problem. Recursion involves a method calling itself directly or indirectly. It is used to solve repetitive problems by reducing them to smaller instances until a base case is reached. Examples demonstrated include calculating factorials and Fibonacci numbers recursively.
This chapter discusses applets and HTML. It covers creating applets using Swing and AWT, drawing shapes, handling mouse/key events, and playing audio. Applets are Java programs that run in web browsers, while applications are standalone. Applets are inserted into HTML using <applet> tags and run on the user's computer, having restrictions on file/network access for security.
The document summarizes topics from Chapter 13 of a textbook on advanced GUI applications using Java Swing and AWT. It discusses read-only text fields, lists, combo boxes, displaying images, menus, text areas, sliders, and look and feel. Specific topics covered include creating lists from arrays, list selection modes, retrieving selected items, adding scroll bars to lists, combo box events, and displaying images in labels and buttons using the ImageIcon class.
This chapter discusses exceptions and advanced file input/output in Java, including:
- Handling exceptions using try/catch blocks and throwing custom exceptions
- Reading and writing binary files using DataInputStream and DataOutputStream
- Creating random access files for efficient reading/writing of data at specified locations
- Serializing Java objects to files to save their state for later use
This document discusses inheritance in Java. It covers key concepts like subclasses inheriting fields and methods from superclasses, the "is-a" relationship between classes, overriding methods, abstract classes and methods, and interfaces. Polymorphism is also discussed, where a reference variable can refer to objects of its type as well as subclasses.
This document summarizes Chapter 10 of the textbook "Starting Out with Java: From Control Structures through Data Structures" which discusses text processing and wrapper classes in Java. The chapter covers introduction to wrapper classes, the Character class for character testing and conversion, additional String methods for searching and extracting substrings, the StringBuilder class, and wrapper classes for numeric primitive data types. Example code is provided to demonstrate various string and character methods.
This chapter discusses static class members, passing and returning objects from methods, the toString and equals methods, copying objects, aggregation, the this reference, enumerated types, garbage collection, and object-oriented design principles. Key topics covered include defining static fields and methods, passing objects by reference, overriding toString and equals, creating "has-a" relationships between objects, and letting Java handle memory management through garbage collection.
This document provides an overview of key topics covered in Chapter 8, which discusses arrays and the ArrayList class. The chapter introduces arrays as collections of like values indexed in memory. It covers creating and initializing arrays, accessing array elements, and performing common operations on array contents such as finding highest/lowest values and averaging elements. The chapter also discusses passing arrays to methods, comparing arrays, and using arrays with files. It introduces the ArrayList class as an alternative to primitive arrays.
This chapter discusses graphical user interface (GUI) applications in Java. It introduces common GUI components like buttons, labels, text fields etc. It explains how to create windows and add components to them using Swing classes. It also covers layout managers which control component positioning and sizing, and event-driven programming where applications respond to user events like button clicks. The document provides examples of creating simple GUI applications in Java.
This chapter discusses classes and objects in Java. It explains that object-oriented programming centers on creating objects that contain both data fields and methods. A class defines the attributes and behaviors for a particular kind of object, acting as a blueprint. Individual objects are created from a class and are called instances of that class. The chapter demonstrates how to define a Rectangle class with fields for length and width, and methods to set, get, and calculate area. It also covers concepts like encapsulation, access modifiers, and the Unified Modeling Language (UML) for visually depicting classes.
The document discusses methods in Java. It explains that methods break problems into smaller pieces through functional decomposition. Methods simplify programs by allowing code to be reused. Methods can return values or be void. Arguments are passed into methods and parameters hold the values. Local variables only exist within methods. Methods are defined with a header and body. Comments should document a method's purpose. Exceptions must be handled or thrown by methods interacting with external resources like files.
This chapter discusses various types of loops in Java including while, do-while, and for loops. It covers the syntax and flow of each loop type as well as examples of using loops for input validation, running totals, and sentinel values. Nested loops are also introduced. The chapter then discusses break and continue statements before introducing file input/output.
The document summarizes topics from Chapter 3 of the textbook "Starting Out with Java: From Control Structures through Data Structures" including:
1) The chapter discusses Java control structures like if, if-else, nested if statements, logical operators, and comparing strings.
2) If statements and boolean expressions are used to conditionally execute code based on relational operators. Blocks of code can be executed with if-else statements.
3) Nested if statements allow if statements within other if statements so nested conditional logic can be implemented. Proper indentation and formatting helps readability of complex conditional statements.
This document summarizes Chapter 2 of a textbook on Java fundamentals. It discusses the parts of a Java program, including comments, classes, methods and statements. It also covers using print and println methods to output to the console and introduces concepts like variables, data types, operators and input/output.
The chapter discusses the history and components of computer systems and the Java programming language. It describes how Java was created to enable programs to run on various devices and operating systems. The chapter outlines computer hardware, including the central processing unit, memory, storage, and input/output devices. It also discusses operating systems, application software, programming languages, and how Java source code is compiled into bytecode that runs on the Java Virtual Machine across different computers.
This document provides an overview of wireless networking standards and implementations. It describes how wireless networks use radio waves to communicate and follow the same OSI layers as wired networks. It outlines several IEEE 802.11 wireless standards including 802.11a, b, g, and n. It also discusses how Wi-Fi networks can operate in ad-hoc or infrastructure modes and how CSMA/CA is used to allow multiple devices to share the wireless medium. Finally, it covers common wireless security methods like MAC address filtering, wireless authentication, and data encryption using WEP.
This document discusses various tools used for network troubleshooting, including cable testers, protocol analyzers, multimeters, and software diagnostic tools. Cable testers like TDRs and OTDRs are used to identify cable breaks, while protocol analyzers monitor network activity at different layers. Software tools like ping, tracert, nslookup and dig help diagnose connectivity and DNS issues. The overall goal of troubleshooting is to analyze and resolve a variety of network problems using the appropriate tools.
This document discusses various technologies used for remote connectivity over wide area networks (WANs). It describes how analog signals were originally used for long-distance telephone calls but lost quality over distance, requiring the development of digital systems. Common digital WAN technologies discussed include SONET, T1, T3, cable modems, DSL, satellite, wireless, and fiber connections. Fiber networks are presented as a technology that telephone providers are implementing to compete with cable companies in providing high-speed internet to homes and businesses.
IPv6 was developed to replace IPv4 due to IPv4's limited 32-bit address space and inefficient use of addresses. IPv6 supports 2128 addresses, improves security with IPSec, and uses more efficient routing through address aggregation. IPv6 addresses are 128-bit and written in hexadecimal, with groups of zeros represented by double colons. IPv6 implements subnet masks as CIDR prefixes between /48 and /64. It uses DNS clusters, global unicast addresses, and DHCPv6 to assign addresses and DNS servers to clients.
This document discusses advanced networking devices and concepts. It covers four logical network topologies: client/server, peer-to-peer, virtual private network (VPN), and virtual local area network (VLAN). It also discusses trunking between switches and quality of service (QoS) policies for prioritizing network traffic. Home routers are highlighted as combining switch and router functionality into one advanced device that can operate at multiple layers of the OSI model.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
2. Objectives
• Describe the varieties of 100-megabit
Ethernet
• Discuss copper- and fiber-based Gigabit
Ethernet
• Compare the competing varieties of 10-
Gigabit Ethernet
4. Three Parts to Chapter 5
• 100-megabit Ethernet standards
• Gigabit Ethernet standards
• 10-Gigabit Ethernet standards
5. Ethernet Facts
• There are only four Ethernet speeds: 10 mega-
bit, 100 megabit, 1 gigabit, and 10 gigabit
• Every version of Ethernet uses either unshield-
ed twisted pair (UTP) or fiber-optic. (With a few,
rare exceptions)
• Every version of Ethernet uses a hub or switch,
although hubs are incredibly rare today.
6. Ethernet Facts (continued)
• Only 10- and 100-megabit Ethernet may use a
hub. Gigabit and 10-Gigabit Ethernet networks
must use a switch.
• Every version of Ethernet has a limit of 1024
nodes.
• Every UTP version of Ethernet has a maximum
distance from the switch or hub to the node of
100 meters.
8. • 100BaseT
– 100BaseT4
• CAT 3 or better cabling
• Uses all four pair of wires
• Disappeared from the market after 100BaseTX
generally accepted
– 100BaseTX
• Dominant 100-megabit standard by the late 1990s
• The term “100BaseT” now applies to this standard
9. • 100BaseTX Summary
– Speed: 100 Mbps
– Signal type: Baseband
– Distance: 100 meters between the hub and the
node
– Node limit: No more than 1,024 nodes per hub
– Topology: Star bus topology: physical star, logical
bus
– Cable type: Uses CAT5(e) or better UTP cabling with
RJ-45 connectors
10. • Upgrading 10BaseT network to 100BaseT
– CAT 5 cable or better
– Replace all old 10BaseT NICs with 100BaseT NICs
– Replace 10BaseT hubs or switches with 100BaseT
hubs or switches
– Multispeed, auto-sending NICs and
hubs/switches ease the upgrade
11. • Multispeed, autosensing NIC
– When first connected, it negotiates automatically
with the hub or switch
– If both do 100BaseT, they will use that mode
– If the hub/switch only does 10BaseT, NIC does
10BaseT
14. • Distinguishing 10BaseT NIC from 100BaseT NIC
– Inspect closely
– Look for something indicating the card’s speed
– All modern NICs are multispeed and auto-sensing
16. • 100BaseFX
– UTP versus fiber-optic
• UTP cannot meet the needs of every organization
– 100-meter distance limit inadequate for
large buildings and campuses
– Lack of electrical shielding
– Easy to tap
– Fast Ethernet refers to all the 100-Mbps Ethernet
standards
17. • 100BaseFX Summary
– Speed: 100 Mbps
– Signal type: Baseband
– Distance: Two kilometers between hub and
node
– Node limit: No more than 1,024 nodes per hub
– Topology: Star bus topology: physical star,
logical bus
– Cable type: Uses multimode fiber cabling with
ST or SC connectors
18. • Full-Duplex Ethernet
– Early 100BaseT NICs were half-duplex
• Could both send and receive data
• But not at the same time
– IEEE added full-duplex to the standard
• Device sends and receives at the same time
• By late 1990s, most 100BaseT cards could auto-negotiate for
full-duplex
– NIC and hub/switch determine full-or-half
duplex
– Setting can be forced through the operating
system
23. • IEEE 802.3ab called 1000BaseT
– Most dominant Gigabit Ethernet
– Four-pair UTP
– Maximum cable length 100 meters
– Connectors and ports look exactly like 10BaseT,
100BaseT
24. • IEEE 802.3z known as 1000BaseX
– 1000BaseCX
• Twinaxial cable
– Shielded 150-Ohm
– Maximum length of 25 meters
• This standard made little progress
26. • IEEE 802.3z (continued)
– 1000BaseSX
• More common
• Multimode fiber-optic cable
• Maximum cable length 200 to 500 meters,
depending on manufacturer
• Uses 850-nm wavelength LED
• Devices look exactly like 100BaseFX products
• SC is the most common type of connection
27. • IEEE 802.3z (continued)
– 1000BaseLX
• Long distance carrier
• Single-mode (laser) cables
• Maximum cable length 5 kilometers
• Special repeaters increase distance to 70
kilometers!
• Positioned as the Ethernet backbone of the future
• Connectors look like 100BaseSX connectors
28. • New Fiber Connectors
– Problems with ST and SC connectors
• ST connectors are large, twist-on
• Installer must twist cable—danger of fracturing
fibers
• Techs have trouble getting fingers around closely
packed connectors
• SC connectors snap in and out, but are also large
• Manufacturers wanted smaller connectors for more
ports
29. • New Fiber Connectors (continued)
– Solution: Small Form Factor (SFF)
connectors
• Mechanical Transfer Registered Jack (MT-RJ)
• Local Connector (LC)
– Very popular
– Considered the predominant fiber connector
• Other fiber connectors exist
• Only standards are ST and SC
• Manufacturers have different connectors
34. • Introduction to 10-Gigabit Ethernet (10-
GbE)
– Showing up in high-level LANs
– Expected to trickle down to the desktops
in near future
– New technology
– Large number of fiber standards
– Two copper standards
– 10-GbE copper product available only
since 2008
35. • Fiber-base 10-GbE
– IEEE challenge
• Maintain the integrity of Ethernet frame
• How to transfer frames at high speeds
– Could use traditional Ethernet Physical layer
mechanisms
– Already a usable ~10 GbE fiber network (SONET) used
for WANs
36. • Fiber-base 10 GbE (continued)
– IEEE Actions
• A set of 10GbE standards using traditional LAN
Physical-layer mechanisms
• A set of 10 GbE standards using SONET
infrastructure over WAN fiber
• Recognized need for different networking
situations
37. • IEEE created several standards defined
by
– The type of fiber used
– The wavelength of the laser or lasers
– The Physical layer signaling type
– Maximum signal distance (defined by
previous factors)
38. • Naming convention begins with
10GBasexy
– x = type of fiber (usually) and the signal
wavelength
– y = Physical layer signaling standard
• R for LAN-based signaling
• W for SONET/WAN-based signaling
39. • 10GBaseSy uses a short-wavelength
(850 nm) signal over multimode
Standard Fiber Type Wavelength Physical Maximum
Layer Signal
Signaling Length
10GBaseSR Multimode 850 nm LAN 26-300 m
10GBaseSW Multimode 850 nm SONET/WAN 26-300 m
Fiber-based 10GBaseSy Summary
40. Figure 5.10 A 10GBaseSR NIC
(photo courtesy of Intel Corporation)
41. • 10GBaseLy uses a long-wavelength
(1310 nm) signal over single-mode
Standard Fiber Type Wavelength Physical Maximum
Layer Signal
Signaling Length
10GBaseLR Single-mode 1310 nm LAN 10 km
10GBaseLW Single-mode 1310 nm SONET/WAN 10 km
Fiber-based 10GBaseLy Summary
42. • 10GBaseEy uses an extra-long-wave-
length (1550 nm) signal over single-
mode fiber
Standard Fiber Type Wavelength Physical Maximum
Layer Signal
Signaling Length
10GBaseER Single-mode 1550nm LAN 40 km
10GBaseEW Single-mode 1550 nm SONET/WAN 40 km
Fiber-based 10GBaseEy Summary
43. • 10 GbE connectors
– Standards do not define the type of
connector
– Manufacturers determine connectors
44. • Copper-based 10GbE (10GBaseT)
– 2006: IEEE standard for 10GbE running on
UTP
– Looks and works like slower versions of
UTP Ethernet
– Downside: 10GBaseT running on CAT 6
has maximum cable length of only 55
meters
– 10GBaseT running on CAT 6a can to go to
100 meters
45. Table 5.2 10-GbE Summary
Wavelength /
Standard Cabling Cable Details Connectors Length
10GBaseSR Multimode 850 nm Not defined 26 – 300 m
/SW fiber
10GBaseLR Single- 1310 nm Variable – LC 10 km
/LW mode fiber is common
10GBaseER Single- 1550 nm Variable – LC, 40 km
mode fiber SC are
common
10GBaseT CAT 6/6a Four-pair / RJ-45 55 – 100 m
UTP full-duplex
46. • 10-GbE Physical Connections
– Hodgepodge of 10-GbE types
– Problem: single router may need to support
several connector types
– Solution: multisource agreement (MSA)
• Modular transceiver plugs into10-GbE equipment
• Converts between media types
• Many competing media types recently
– 10-GbE equipment exclusive domain of high-
bandwidth LANs and WANs, including the Internet
48. • Backbones
– Multispeed network works best for many
situations
– Series of high-speed switches create a
backbone
• No computers (except maybe servers) on the backbone
• Each floor has its own switch connecting to every node
on floor
• Each floor switch has a separate high-speed
connection to a main switch
51. • Know Your Ethernets!
– Know details of the Ethernet versions
– Use summaries and tables
– So far in the text, only the functions of a
basic switch have been explained
– More to see in terms of capabilities of
switches
Editor's Notes
Teaching Tip The short paragraph in the opening page of this chapter contains a bit of historical information as a bridge between the previous chapter, which detailed the earliest versions of Ethernet, and this chapter, which follows Ethernet developments from the 1990s to the present. This entire chapter is Test Specific. It would be very easy for students to lose their way amidst the long list of standards with very similar names. Use the bulleted facts presented in the beginning to point out what is common among Ethernet standards. Then, point out the several small tables throughout the chapter that summarize the features of each Ethernet standard. Lab 5.3 at the end of the book chapter has the students create a comparison chart of all the standards described. Building that comparison chart will be a great way to review all the standards in preparation for the exam. If a student is not taking the exam, the chart will still be a practical job aid.
Teaching Tip These are continued on a second slide. Take time to go over these facts , common to all version of Ethernet. This chapter gives the students a great deal of basic data on the various modern Ethernet standards. Understanding the commonalities will help them understand the differences.
Teaching Tip Per the Cross Check on Page 81, take the time to have the students review the difference between an Ethernet hub and an Ethernet switch. They learned this in Chapter 4, Ethernet Basics.
Teaching Tip Point out the note on the bottom of Page 81, explaining that the term Fast Ether net , originally coined for 100BaseT, is still used to refer to any of the 100-Mbps standards, including 100BaseFX. In general, it is not used to refer to the even faster versions of Ethernet available today.
.
Teaching Tip Point out the Note on bottom of Page 84: Full-duplex doesn’t increase the speed of the network, but it doubles the bandwidth. Imagine a one-lane road expanded to two lanes while keeping the speed limit the same.
Note: There is an upcoming section titled 10-GbE Physical Connections.