Ethernet.ppt

Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
• Ethernet Cabling
• Manchester Encoding
• The Ethernet MAC Sublayer Protocol
• The Binary Exponential Backoff Algorithm
• Ethernet Performance
• Switched Ethernet
• Fast Ethernet
• Gigabit Ethernet
• IEEE 802.2: Logical Link Control
• Retrospective on Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• Finished our general discussion of channel allocation
protocols
• It is time to see how these principles apply to real
systems, in particular, LANs
• IEEE has standardized a number of local area networks
and metropolitan area networks under the name of
IEEE 802
• The most important of the survivors are 802.3
(Ethernet) and 802.11 (wireless LAN)
• With 802.15 (Bluetooth) and 802.16 (wireless MAN)
• Ethernet, the protocols and recent developments in
highspeed (gigabit) Ethernet
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Cabling
• ''Ethernet'' refers to the cable (the ether)
• Four types of cabling are commonly used, as
shown in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• Detecting cable breaks, excessive length, bad taps, or loose
connectors can be a major problem with this media
• For this reason, techniques have been developed to track them
down
• Basically, a pulse of known shape is injected into the cable
• If the pulse hits an obstacle or the end of the cable, an echo will be
generated and sent back
• By carefully timing the interval between sending the pulse and
receiving the echo, it is possible to localize the origin of the echo
• This technique is called time domain reflectometry
• The problems associated with finding cable breaks drove systems
toward a different kind of wiring pattern, in which all stations have
a cable running to a central hub in which they are all connected
electrically
Dr.T.Thendral, Assistant Professor, SRCW
• Three wiring schemes are illustrated in Fig
Dr.T.Thendral, Assistant Professor, SRCW
• For 10Base5, a transceiver is clamped securely
around the cable so that its tap makes contact
with the inner core
• The transceiver contains the electronics that
handle carrier detection and collision detection
• When a collision is detected, the transceiver also
puts a special invalid signal on the cable to ensure
that all other transceivers also realize that a
collision has occurred
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base5: a transceiver cable or drop cable
connects the transceiver to an interface board in
the computer
• The interface board contains a controller chip
that transmits frames to, and receives frames
from, the transceiver.
• 10Base2: The connection to the cable is just a
passive BNC T-junction connector
• The transceiver electronics are on the controller
board, and each station always has its own
transceiver.
Dr.T.Thendral, Assistant Professor, SRCW
• 10Base-T: There is no shared cable at all, just the
hub (a box full of electronics) to which each
station is connected by a dedicated (i.e., not
shared) cable
• A fourth cabling option for Ethernet is 10Base-F,
which uses fiber optics
• This alternative is expensive due to the cost of
the connectors and terminators, but it has
excellent noise immunity and is the method of
choice when running between buildings
Dr.T.Thendral, Assistant Professor, SRCW
• A repeater is a physical layer device
• It receives, amplifies (regenerates), and retransmits signals in both
directions
• As far as the software is concerned, a series of cable segments
connected by repeaters is no different from a single cable (except
for some delay introduced by the repeaters)
Dr.T.Thendral, Assistant Professor, SRCW
Manchester Encoding
• None of the versions of Ethernet uses straight binary encoding
with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to
ambiguities
• The start, end, or middle of each bit without reference to an
external clock
• Two such approaches are called Manchester encoding and
differential Manchester encoding
• With Manchester encoding, each bit period is divided into two
equal intervals
• A binary 1 bit is sent by having the voltage set high during
the first interval and low in the second one
• A binary 0 is just the reverse: first low and then high
Dr.T.Thendral, Assistant Professor, SRCW
Manchester encoding is shown in Fig. 4-16(b)
Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic
Manchester encoding
Dr.T.Thendral, Assistant Professor, SRCW
The Ethernet MAC Sublayer Protocol
• The original DIX (DEC, Intel, Xerox) frame
structure is shown in Fig
• Each frame starts with a Preamble of 8 bytes
• The frame contains two addresses, one for the
destination and one for the source
• When a frame is sent to a group address, all the
stations in the group receive it
• Sending to a group of stations is called multicast
• The address consisting of all 1 bits is reserved for
broadcast
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Station tries to transmit a very short frame, it is conceivable that
a collision occurs, but the transmission completes before the
noise burst gets back at 2τ
• The sender will then incorrectly conclude that the frame was
successfully sent
• To prevent this situation from occurring, all frames must take
more than 2τ to send so that the transmission is still taking place
when the noise burst gets back to the sender.
Dr.T.Thendral, Assistant Professor, SRCW
• The final Ethernet field is the Checksum
• It is effectively a 32-bit hash code of the data
• If some data bits are erroneously received (due to
noise on the cable), the checksum will almost
certainly be wrong and the error will be detected
• The checksum algorithm is a cyclic redundancy check
(CRC)
• It just does error detection, not forward error
correction
Dr.T.Thendral, Assistant Professor, SRCW
The Binary Exponential Backoff Algorithm
• In general, after i collisions, a random number between 0 and
2i
• - 1 is chosen, and that number of slots is skipped
• However, after ten collisions have been reached, the
randomization interval is frozen at a maximum of 1023 slots
• After 16 collisions, the controller throws in the towel and
reports failure back to the computer
• Further recovery is up to higher layers
• This algorithm, called binary exponential backoff
Dr.T.Thendral, Assistant Professor, SRCW
Ethernet Performance
• The performance of Ethernet under conditions of heavy and
constant load, that is, k stations always ready to transmit
• A rigorous analysis of the binary exponential backoff
algorithm is complicated
• Instead, we will follow Metcalfe and Boggs (1976) and
assume a constant retransmission probability in each slot
• The channel efficiency is plotted versus number of ready
stations
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
Switched Ethernet
• The heart of this system is a switch containing a high-
speed backplane and room for typically 4 to 32 plug-
in line cards, each containing one to eight connectors
• Most often, each connector has a 10Base-T twisted
pair connection to a single host computer
Dr.T.Thendral, Assistant Professor, SRCW
Figure 4-20. A simple example of switched Ethernet.
Dr.T.Thendral, Assistant Professor, SRCW
Fast Ethernet
• To pump up the speed, various industry groups
proposed two new ring-based optical LANs
• One was called FDDI (Fiber Distributed Data
Interface) and the other was called Fibre Channel
• In any event, the failure of the optical LANs to
catch fire left a gap for garden-variety
• Ethernet at speeds above 10 Mbps
• Many installations needed more bandwidth and
thus had numerous 10-Mbps LANs connected by
a maze of repeaters, bridges, routers, and
gateways
Dr.T.Thendral, Assistant Professor, SRCW
• The 802.3 committee decided to go with a
souped-up Ethernet for three primary reasons:
• 1. The need to be backward compatible with
existing Ethernet LANs.
• 2. The fear that a new protocol might have
unforeseen problems.
• 3. The desire to get the job done before the
technology changed
Dr.T.Thendral, Assistant Professor, SRCW
Gigabit Ethernet
• Fast Ethernet standard when the 802
committee began working on a yet faster
Ethernet (1995)
• It was quickly dubbed gigabit Ethernet and
was ratified by IEEE in 1998 under the name
802.3z
Dr.T.Thendral, Assistant Professor, SRCW
• In the simplest gigabit Ethernet configuration, illustrated in
Fig. 4-22(a), two computers are directly connected to each
other
• common case, having a switch or a hub connected to multiple
computers
• and possibly additional switches or hubs, as shown in Fig. 4-
22(b)
• In both configurations each individual Ethernet cable has
exactly two devices on it, no more and no fewer
Dr.T.Thendral, Assistant Professor, SRCW
Dr.T.Thendral, Assistant Professor, SRCW
• Gigabit Ethernet uses new encoding rules on the
fibers
• The following two rules were used in making the
choices:
• 1. No codeword may have more than four identical
bits in a row.
• 2. No codeword may have more than six 0s or six 1s.
Dr.T.Thendral, Assistant Professor, SRCW
• There are also systems in which an error-
controlled, flow-controlled data link protocol
is desired
• IEEE has defined one that can run on top of
Ethernet and the other 802 protocols
• In addition, this protocol, called LLC (Logical
Link Control)
Dr.T.Thendral, Assistant Professor, SRCW
• LLC forms the upper half of the data link layer, with the
MAC sublayer below it, as shown in Fig
• Typical usage of LLC is as follows
• The network layer on the sending machine passes a packet to
LLC, using the LLC access primitives
• The LLC sublayer then adds an LLC header, containing
sequence and acknowledgement numbers
Dr.T.Thendral, Assistant Professor, SRCW
Retrospective on Ethernet
• Ethernet has been around for over 20 years and has
no serious competitors in sight, so it is likely to be
around for many years to come
• Few CPU architectures, operating systems, or
programming languages have been king of the
mountain for two decades going on three
• the main reason for it that Ethernet is simple and
flexible
• Ethernet has been able to evolve in certain crucial
ways
Dr.T.Thendral, Assistant Professor, SRCW
1 de 30

Recomendados

DATA-LINK LAYER.ppt por
DATA-LINK LAYER.pptDATA-LINK LAYER.ppt
DATA-LINK LAYER.pptDrTThendralCompSci
355 vistas52 diapositivas
Ethernet 19 20 por
Ethernet 19 20Ethernet 19 20
Ethernet 19 20rajeshvbe
152 vistas43 diapositivas
Chapter 3 Networking por
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networkingmlrbrown
1.8K vistas62 diapositivas
Dc lec-03 (topologies) por
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)diaryinc
1.2K vistas37 diapositivas

Más contenido relacionado

Similar a Ethernet.ppt

lecture01_tm.pptx por
lecture01_tm.pptxlecture01_tm.pptx
lecture01_tm.pptxKashifIshaq10
2 vistas28 diapositivas
A427 nic card por
A427 nic cardA427 nic card
A427 nic cardsurajbhai
513 vistas21 diapositivas
NFPhysical Layer.pptx por
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
12 vistas37 diapositivas
Lan basic por
Lan basicLan basic
Lan basicOnline
1.4K vistas24 diapositivas
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol por
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolPradnya Saval
59 vistas54 diapositivas
Protocols and Interfaces - IPv4, IPv6, X.25, X.75 por
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Pradnya Saval
122 vistas54 diapositivas

Similar a Ethernet.ppt(20)

A427 nic card por surajbhai
A427 nic cardA427 nic card
A427 nic card
surajbhai513 vistas
NFPhysical Layer.pptx por mmmm11111
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
mmmm1111112 vistas
Lan basic por Online
Lan basicLan basic
Lan basic
Online 1.4K vistas
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol por Pradnya Saval
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 ProtocolProtocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Protocol and Interfaces - IPv4, IPv6, X.25 Protocol, X.75 Protocol
Pradnya Saval59 vistas
Protocols and Interfaces - IPv4, IPv6, X.25, X.75 por Pradnya Saval
Protocols and Interfaces - IPv4, IPv6, X.25, X.75Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Protocols and Interfaces - IPv4, IPv6, X.25, X.75
Pradnya Saval122 vistas
Et3003 sem2-1314-3 ethernets por Tutun Juhana
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
Tutun Juhana1.1K vistas
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians por Living Online
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Living Online553 vistas
Data communications_Network_Model (1).pdf por SujanTimalsina5
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
SujanTimalsina53 vistas
Chapter 1 Introduction to computer networks ppt by DMB por dhanashrisabale1
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
dhanashrisabale120 vistas
Networking Chapter 4 por mlrbrown
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
mlrbrown1.1K vistas
osi por Leenesh
osi osi
osi
Leenesh567 vistas

Más de DrTThendralCompSci

The Application Layer.ppt por
The Application Layer.pptThe Application Layer.ppt
The Application Layer.pptDrTThendralCompSci
104 vistas35 diapositivas
Transport Layer.pptx por
Transport Layer.pptxTransport Layer.pptx
Transport Layer.pptxDrTThendralCompSci
80 vistas28 diapositivas
SOFTWARE QUALITY ASSURANCE.ppt por
SOFTWARE QUALITY ASSURANCE.pptSOFTWARE QUALITY ASSURANCE.ppt
SOFTWARE QUALITY ASSURANCE.pptDrTThendralCompSci
268 vistas30 diapositivas
Software Configuration Management.ppt por
Software Configuration Management.pptSoftware Configuration Management.ppt
Software Configuration Management.pptDrTThendralCompSci
12 vistas23 diapositivas
UNIT TESTING.pptx por
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptxDrTThendralCompSci
124 vistas21 diapositivas
SOFTWARE TESTING.pptx por
SOFTWARE TESTING.pptxSOFTWARE TESTING.pptx
SOFTWARE TESTING.pptxDrTThendralCompSci
379 vistas48 diapositivas

Más de DrTThendralCompSci(20)

Software design and Software engineering.pptx por DrTThendralCompSci
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci116 vistas
Software design and Software engineering.pptx por DrTThendralCompSci
Software design and Software engineering.pptxSoftware design and Software engineering.pptx
Software design and Software engineering.pptx
DrTThendralCompSci279 vistas
Unit 1 - Introduction to Software Engineering.ppt por DrTThendralCompSci
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci224 vistas
Unit 1 - Introduction to Software Engineering.ppt por DrTThendralCompSci
Unit 1 - Introduction to Software Engineering.pptUnit 1 - Introduction to Software Engineering.ppt
Unit 1 - Introduction to Software Engineering.ppt
DrTThendralCompSci318 vistas

Último

Introduction to AERO Supply Chain - #BEAERO Trainning program por
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning programGuennoun Wajih
135 vistas78 diapositivas
What is Digital Transformation? por
What is Digital Transformation?What is Digital Transformation?
What is Digital Transformation?Mark Brown
46 vistas11 diapositivas
Gross Anatomy of the Liver por
Gross Anatomy of the LiverGross Anatomy of the Liver
Gross Anatomy of the Liverobaje godwin sunday
100 vistas12 diapositivas
Presentation_NC_Future now 2006.pdf por
Presentation_NC_Future now 2006.pdfPresentation_NC_Future now 2006.pdf
Presentation_NC_Future now 2006.pdfLora
38 vistas74 diapositivas
ANGULARJS.pdf por
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdfArthyR3
54 vistas10 diapositivas
JQUERY.pdf por
JQUERY.pdfJQUERY.pdf
JQUERY.pdfArthyR3
114 vistas22 diapositivas

Último(20)

Introduction to AERO Supply Chain - #BEAERO Trainning program por Guennoun Wajih
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning program
Guennoun Wajih135 vistas
What is Digital Transformation? por Mark Brown
What is Digital Transformation?What is Digital Transformation?
What is Digital Transformation?
Mark Brown46 vistas
Presentation_NC_Future now 2006.pdf por Lora
Presentation_NC_Future now 2006.pdfPresentation_NC_Future now 2006.pdf
Presentation_NC_Future now 2006.pdf
Lora 38 vistas
ANGULARJS.pdf por ArthyR3
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdf
ArthyR354 vistas
JQUERY.pdf por ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR3114 vistas
JRN 362 - Lecture Twenty-Two por Rich Hanley
JRN 362 - Lecture Twenty-TwoJRN 362 - Lecture Twenty-Two
JRN 362 - Lecture Twenty-Two
Rich Hanley39 vistas
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating... por Taste
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...
Creative Restart 2023: Christophe Wechsler - From the Inside Out: Cultivating...
Taste39 vistas
12.5.23 Poverty and Precarity.pptx por mary850239
12.5.23 Poverty and Precarity.pptx12.5.23 Poverty and Precarity.pptx
12.5.23 Poverty and Precarity.pptx
mary850239559 vistas
NodeJS and ExpressJS.pdf por ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR353 vistas
GSoC 2024 .pdf por ShabNaz2
GSoC 2024 .pdfGSoC 2024 .pdf
GSoC 2024 .pdf
ShabNaz245 vistas
11.30.23A Poverty and Inequality in America.pptx por mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239228 vistas
JRN 362 - Lecture Twenty-Three (Epilogue) por Rich Hanley
JRN 362 - Lecture Twenty-Three (Epilogue)JRN 362 - Lecture Twenty-Three (Epilogue)
JRN 362 - Lecture Twenty-Three (Epilogue)
Rich Hanley44 vistas

Ethernet.ppt

  • 2. • Ethernet Cabling • Manchester Encoding • The Ethernet MAC Sublayer Protocol • The Binary Exponential Backoff Algorithm • Ethernet Performance • Switched Ethernet • Fast Ethernet • Gigabit Ethernet • IEEE 802.2: Logical Link Control • Retrospective on Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 3. Ethernet Cabling • Finished our general discussion of channel allocation protocols • It is time to see how these principles apply to real systems, in particular, LANs • IEEE has standardized a number of local area networks and metropolitan area networks under the name of IEEE 802 • The most important of the survivors are 802.3 (Ethernet) and 802.11 (wireless LAN) • With 802.15 (Bluetooth) and 802.16 (wireless MAN) • Ethernet, the protocols and recent developments in highspeed (gigabit) Ethernet Dr.T.Thendral, Assistant Professor, SRCW
  • 4. Ethernet Cabling • ''Ethernet'' refers to the cable (the ether) • Four types of cabling are commonly used, as shown in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 5. • Detecting cable breaks, excessive length, bad taps, or loose connectors can be a major problem with this media • For this reason, techniques have been developed to track them down • Basically, a pulse of known shape is injected into the cable • If the pulse hits an obstacle or the end of the cable, an echo will be generated and sent back • By carefully timing the interval between sending the pulse and receiving the echo, it is possible to localize the origin of the echo • This technique is called time domain reflectometry • The problems associated with finding cable breaks drove systems toward a different kind of wiring pattern, in which all stations have a cable running to a central hub in which they are all connected electrically Dr.T.Thendral, Assistant Professor, SRCW
  • 6. • Three wiring schemes are illustrated in Fig Dr.T.Thendral, Assistant Professor, SRCW
  • 7. • For 10Base5, a transceiver is clamped securely around the cable so that its tap makes contact with the inner core • The transceiver contains the electronics that handle carrier detection and collision detection • When a collision is detected, the transceiver also puts a special invalid signal on the cable to ensure that all other transceivers also realize that a collision has occurred Dr.T.Thendral, Assistant Professor, SRCW
  • 8. • 10Base5: a transceiver cable or drop cable connects the transceiver to an interface board in the computer • The interface board contains a controller chip that transmits frames to, and receives frames from, the transceiver. • 10Base2: The connection to the cable is just a passive BNC T-junction connector • The transceiver electronics are on the controller board, and each station always has its own transceiver. Dr.T.Thendral, Assistant Professor, SRCW
  • 9. • 10Base-T: There is no shared cable at all, just the hub (a box full of electronics) to which each station is connected by a dedicated (i.e., not shared) cable • A fourth cabling option for Ethernet is 10Base-F, which uses fiber optics • This alternative is expensive due to the cost of the connectors and terminators, but it has excellent noise immunity and is the method of choice when running between buildings Dr.T.Thendral, Assistant Professor, SRCW
  • 10. • A repeater is a physical layer device • It receives, amplifies (regenerates), and retransmits signals in both directions • As far as the software is concerned, a series of cable segments connected by repeaters is no different from a single cable (except for some delay introduced by the repeaters) Dr.T.Thendral, Assistant Professor, SRCW
  • 11. Manchester Encoding • None of the versions of Ethernet uses straight binary encoding with 0 volts for a 0 bit and 5 volts for a 1 bit because it leads to ambiguities • The start, end, or middle of each bit without reference to an external clock • Two such approaches are called Manchester encoding and differential Manchester encoding • With Manchester encoding, each bit period is divided into two equal intervals • A binary 1 bit is sent by having the voltage set high during the first interval and low in the second one • A binary 0 is just the reverse: first low and then high Dr.T.Thendral, Assistant Professor, SRCW
  • 12. Manchester encoding is shown in Fig. 4-16(b) Differential Manchester encoding, shown in Fig. 4-16(c), is a variation of basic Manchester encoding Dr.T.Thendral, Assistant Professor, SRCW
  • 13. The Ethernet MAC Sublayer Protocol • The original DIX (DEC, Intel, Xerox) frame structure is shown in Fig • Each frame starts with a Preamble of 8 bytes • The frame contains two addresses, one for the destination and one for the source • When a frame is sent to a group address, all the stations in the group receive it • Sending to a group of stations is called multicast • The address consisting of all 1 bits is reserved for broadcast Dr.T.Thendral, Assistant Professor, SRCW
  • 15. • Station tries to transmit a very short frame, it is conceivable that a collision occurs, but the transmission completes before the noise burst gets back at 2τ • The sender will then incorrectly conclude that the frame was successfully sent • To prevent this situation from occurring, all frames must take more than 2τ to send so that the transmission is still taking place when the noise burst gets back to the sender. Dr.T.Thendral, Assistant Professor, SRCW
  • 16. • The final Ethernet field is the Checksum • It is effectively a 32-bit hash code of the data • If some data bits are erroneously received (due to noise on the cable), the checksum will almost certainly be wrong and the error will be detected • The checksum algorithm is a cyclic redundancy check (CRC) • It just does error detection, not forward error correction Dr.T.Thendral, Assistant Professor, SRCW
  • 17. The Binary Exponential Backoff Algorithm • In general, after i collisions, a random number between 0 and 2i • - 1 is chosen, and that number of slots is skipped • However, after ten collisions have been reached, the randomization interval is frozen at a maximum of 1023 slots • After 16 collisions, the controller throws in the towel and reports failure back to the computer • Further recovery is up to higher layers • This algorithm, called binary exponential backoff Dr.T.Thendral, Assistant Professor, SRCW
  • 18. Ethernet Performance • The performance of Ethernet under conditions of heavy and constant load, that is, k stations always ready to transmit • A rigorous analysis of the binary exponential backoff algorithm is complicated • Instead, we will follow Metcalfe and Boggs (1976) and assume a constant retransmission probability in each slot • The channel efficiency is plotted versus number of ready stations Dr.T.Thendral, Assistant Professor, SRCW
  • 20. Switched Ethernet • The heart of this system is a switch containing a high- speed backplane and room for typically 4 to 32 plug- in line cards, each containing one to eight connectors • Most often, each connector has a 10Base-T twisted pair connection to a single host computer Dr.T.Thendral, Assistant Professor, SRCW
  • 21. Figure 4-20. A simple example of switched Ethernet. Dr.T.Thendral, Assistant Professor, SRCW
  • 22. Fast Ethernet • To pump up the speed, various industry groups proposed two new ring-based optical LANs • One was called FDDI (Fiber Distributed Data Interface) and the other was called Fibre Channel • In any event, the failure of the optical LANs to catch fire left a gap for garden-variety • Ethernet at speeds above 10 Mbps • Many installations needed more bandwidth and thus had numerous 10-Mbps LANs connected by a maze of repeaters, bridges, routers, and gateways Dr.T.Thendral, Assistant Professor, SRCW
  • 23. • The 802.3 committee decided to go with a souped-up Ethernet for three primary reasons: • 1. The need to be backward compatible with existing Ethernet LANs. • 2. The fear that a new protocol might have unforeseen problems. • 3. The desire to get the job done before the technology changed Dr.T.Thendral, Assistant Professor, SRCW
  • 24. Gigabit Ethernet • Fast Ethernet standard when the 802 committee began working on a yet faster Ethernet (1995) • It was quickly dubbed gigabit Ethernet and was ratified by IEEE in 1998 under the name 802.3z Dr.T.Thendral, Assistant Professor, SRCW
  • 25. • In the simplest gigabit Ethernet configuration, illustrated in Fig. 4-22(a), two computers are directly connected to each other • common case, having a switch or a hub connected to multiple computers • and possibly additional switches or hubs, as shown in Fig. 4- 22(b) • In both configurations each individual Ethernet cable has exactly two devices on it, no more and no fewer Dr.T.Thendral, Assistant Professor, SRCW
  • 27. • Gigabit Ethernet uses new encoding rules on the fibers • The following two rules were used in making the choices: • 1. No codeword may have more than four identical bits in a row. • 2. No codeword may have more than six 0s or six 1s. Dr.T.Thendral, Assistant Professor, SRCW
  • 28. • There are also systems in which an error- controlled, flow-controlled data link protocol is desired • IEEE has defined one that can run on top of Ethernet and the other 802 protocols • In addition, this protocol, called LLC (Logical Link Control) Dr.T.Thendral, Assistant Professor, SRCW
  • 29. • LLC forms the upper half of the data link layer, with the MAC sublayer below it, as shown in Fig • Typical usage of LLC is as follows • The network layer on the sending machine passes a packet to LLC, using the LLC access primitives • The LLC sublayer then adds an LLC header, containing sequence and acknowledgement numbers Dr.T.Thendral, Assistant Professor, SRCW
  • 30. Retrospective on Ethernet • Ethernet has been around for over 20 years and has no serious competitors in sight, so it is likely to be around for many years to come • Few CPU architectures, operating systems, or programming languages have been king of the mountain for two decades going on three • the main reason for it that Ethernet is simple and flexible • Ethernet has been able to evolve in certain crucial ways Dr.T.Thendral, Assistant Professor, SRCW