Ethernet Risanuri Hidayat. Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard. Three.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

University of Calgary – CPSC 441.  Ethernet, defined under IEEE 802.3, is one of today's most widely used data communications standards  It finds its.
Jaringan Komputer Lanjut Ethernet dan IEEE LAN Standard -Aurelio Rahmadian-
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Repeaters can Mix PHY Standards Repeater NIC BNC AUI Connectors RJ-45 UTPDrop Cables 10Base5 Trunk Cable 10Base2 10Base-T.
DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY Ethernet Fundamentals.
CompTIA Network+ Chapter 2
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Chapter 13 Wired LANs: Ethernet
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
CISCO NETWORKING ACADEMY PROGRAM (CNAP) Ethernet Fundamentals
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
The Ethernet Prepared by: Amer Al-Qadri Ahmad Abdul-Rahman Ismail khistah
Business Data Communications, 6e
Ethernet, MAC podvrstva
Chapter 13 Wired LANs: Ethernet
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Data Link Layer Dr. Muazzam A. Khan.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
Cisco 3 – Switching Concepts Perrine. J Page 16/1/2016 Module 4 The use of bridges and switches for segmentation results in ____? 1.Multiple broadcast.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
1 CS4550: Computer Networks II Review Data Link Layer.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
CS3505: Loca Area Networks CSMA/CD : IEEE and LAN Internetworks.
LANs : Aloha/CSMA , summary
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 16/Cisco 4 - Module 9 CCNA Certification Exam Review By Your Name.
Ethernet Overview it the IEEE standard for Ethernet.
Chapter 14 Local Area Networks
FDDI Network Security.
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
LECTURE 10 NET301 11/12/2015Lect 10 NET NETWORK STANDARDS Standards determine: Techniques used in the networks. Its protocols. Network specifications.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Wired LANs: Ethernet Shashank Srivastava Motilal Nehru national Institute Of Information Technology, Allahabad 4 Sep 2013.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
Data Communication Networks Lec 18. Wired LAN:Ethernet Datalink layer – Logical link control(LLC) – MAC Physical layer.
ETHERNET Yash Vaidya. Introduction Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Ethernet and Token Ring LAN Networks
CPEG512 Advanced Computer Networks
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
Protocol layering and data
CCNA 1 Chapter 5 Ethernet Fundamentals
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Chaithra Ashwin Sanjana
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet and Token Ring LAN Networks
SYSTEM ADMINISTRATION Chapter 3
Presentation transcript:

Ethernet Risanuri Hidayat

Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE standard. Three data rates are currently defined for operation over optical fiber and twisted-pair cables: 10 Mbps—10Base-T Ethernet 100 Mbps—Fast Ethernet 1000 Mbps—Gigabit Ethernet 10-Gigabit Ethernet is under development and will likely be published as the IEEE 802.3ae supplement to the IEEE base standard in late 2001 or early 2002

Ethernet Ethernet Network Topologies and Structures LANs take on many topological configurations, but regardless of their size or complexity, all will be a combination of only three basic interconnection structures or network building blocks point-to-point interconnection coaxial bus structure, Segment lengths were limited to 500 meters, and up to 100 stations could be connected to a single segment star-connected topology, the central network unit is either a multiport repeater (also known as a hub) or a network switch

Ethernet Ethernet Network Topologies and Structures

Ethernet IEEE to ISO Ethernet's Logical Relationship to the ISO Reference Model

Ethernet IEEE to ISO The MAC-client sublayer may be one of the following: Logical Link Control (LLC), if the unit is a DTE. This sublayer provides the interface between the Ethernet MAC and the upper layers in the protocol stack of the end station. The LLC sublayer is defined by IEEE standards. Bridge entity, if the unit is a DCE. Bridge entities provide LAN-to-LAN interfaces between LANs that use the same protocol (for example, Ethernet to Ethernet) and also between different protocols (for example, Ethernet to Token Ring). Bridge entities are defined by IEEE standards.

Ethernet IEEE to ISO MAC and Physical Layer Compatibility Requirements

Ethernet The Ethernet MAC Sublayer The MAC sublayer has two primary responsibilities: –Data encapsulation, including frame assembly before transmission, and frame parsing/error detection during and after reception –Media access control, including initiation of frame transmission and recovery from transmission failure

Ethernet Frame Format IEEE Data Frame Format PRE 7 SOF 1 DA 6 SA 6 Type 2 Data 1500 FCS 4 Ethernet Data Frame Format PRE 7 SOF 1 DA 6 SA 6 Lngth 2 DataFCS 4

Ethernet Frame Format Preamble (PRE)—Consists of 7 bytes. The PRE is an alternating pattern of ones and zeros that tells receiving stations that a frame is coming, and that provides a means to synchronize the frame-reception portions of receiving physical layers with the incoming bit stream. Start-of-frame delimiter (SOF)—Consists of 1 byte. The SOF is an alternating pattern of ones and zeros, ending with two consecutive 1- bits indicating that the next bit is the left-most bit in the left-most byte of the destination address. Destination address (DA)—Consists of 6 bytes. The DA field identifies which station(s) should receive the frame. The left-most bit in the DA field indicates whether the address is an individual address (indicated by a 0) or a group address (indicated by a 1). The second bit from the left indicates whether the DA is globally administered (indicated by a 0) or locally administered (indicated by a 1). The remaining 46 bits are a uniquely assigned value that identifies a single station, a defined group of stations, or all stations on the network.

Ethernet Frame Format Source addresses (SA)—Consists of 6 bytes. The SA field identifies the sending station. The SA is always an individual address and the left-most bit in the SA field is always 0. Length/Type—Consists of 2 bytes (0600 length-802.3). –Ethernet menggunakan Type untuk menentukan protokol di atasnya, seperti IP(0800),IPX, dsb. Panjang data untuk Ethernet max, yaitu 1500 bytes (=05DC). –Sedangkan panjang frame bisa bervariasi sesuai dengan isi Length (64 – 1518 bytes total). Untuk menentukan protokol di atasnya memerlukan bantuan IEEE LLC

Ethernet Ethernet Frame Format Data—Is a sequence of n bytes of any value, where n is less than or equal to If the length of the Data field is less than 46, the Data field must be extended by adding a filler (a pad) sufficient to bring the Data field length to 46 bytes. Frame check sequence (FCS)—Consists of 4 bytes. This sequence contains a 32-bit cyclic redundancy check (CRC) value, which is created by the sending MAC and is recalculated by the receiving MAC to check for damaged frames. The FCS is generated over the DA, SA, Length/Type, and Data fields.

Ethernet Frame Transmission Whenever an end station MAC receives a transmit-frame request with the accompanying address and data information from the LLC sublayer, the MAC begins the transmission sequence by transferring the LLC information into the MAC frame buffer. The preamble and start-of-frame delimiter are inserted in the PRE and SOF fields. The destination and source addresses are inserted into the address fields. The LLC data bytes are counted, and the number of bytes is inserted into the Length/Type field. The LLC data bytes are inserted into the Data field. If the number of LLC data bytes is less than 46, a pad is added to bring the Data field length up to 46. An FCS value is generated over the DA, SA, Length/Type, and Data fields and is appended to the end of the Data field.

Ethernet Half-Duplex Transmission— The CSMA/CD Access Method Carrier sense—Each station continuously listens for traffic on the medium to determine when gaps between frame transmissions occur. Multiple access—Stations may begin transmitting any time they detect that the network is quiet (there is no traffic). Collision detect—If two or more stations in the same CSMA/CD network (collision domain) begin transmitting at approximately the same time, the bit streams from the transmitting stations will interfere (collide) with each other, and both transmissions will be unreadable. If that happens, each transmitting station must be capable of detecting that a collision has occurred before it has finished sending its frame. Each must stop transmitting as soon as it has detected the collision and then must wait a quasirandom length of time (determined by a back-off algorithm) before attempting to retransmit the frame.