28
Ethernet

Ethernet

Embed Size (px)

DESCRIPTION

Ethernet in Computer Networks

Citation preview

Page 1: Ethernet

Ethernet

Page 2: Ethernet

• While connecting computers through networks we need to have set of rules/standards for the data to travel from one computer to other computer.

• One such set of rules for the networking traffic to follow is IEEE 802 standards.

• Its developed by IEEE (Institute of Electrical and Electronics Engineers, Inc.)

• The IEEE 802 standards are further divided into many parts. They are, IEEE 802.2 Logical link control IEEE 802.3 Ethernet (CSMA/CD) IEEE 802.11 Wireless LAN & Mesh (Wi-Fi certification) IEEE 802.15.1 (Bluetooth certification)

Page 3: Ethernet

Ethernet Cabling

Name Cable Max. Segment /wire Length

Maximum number of Nodes /Segment

Advantages

10Base5 Thick coax 500 m 100 Long cable length

10Base2 Thin coax 185 m 30 Low cost

10Base-T Twisted pair 100 m 1024 Easy to maintain

10Base-F Fiber optics 2000 m 1024 No noise interference

Page 4: Ethernet
Page 5: Ethernet
Page 6: Ethernet
Page 7: Ethernet
Page 8: Ethernet
Page 9: Ethernet

Repeaters

Page 10: Ethernet
Page 11: Ethernet

Making connections - Tools

Page 12: Ethernet

Step 1 – Strip cable end

• Strip 1 – 1½” of insulating sheath• Avoid cutting into conductor insulation

Page 13: Ethernet

Step 2 – Untwist wire ends

• Sort wires by insulation colors

Page 14: Ethernet

Step 3 – Arrange wires

• TIA/EIA 568A: GW-G OW-Bl BlW-O BrW-Br• TIA/EIA 568B: OW-O GW-Bl BlW-G BrW-Br

Page 15: Ethernet

Step 4 – Trim wires to size

• Trim all wires evenly• Leave about ½” of wires exposed

Page 16: Ethernet

Step 5 – Attach connector

• Maintain wire order, left-to-right, with RJ45 tab facing downward

Page 17: Ethernet

Step 6 - Check

• Do all wires extend to end?• Is sheath well inside connector?

Page 18: Ethernet

Step 7 - Crimp

• Squeeze firmly to crimp connecter onto cable end (8P)

Page 19: Ethernet

Step 8 – Test

• Does the cable work?

Page 20: Ethernet

Linear topology

The linear topology is like a single cable running in all portions of building. The stations are connected to the cable through tapping

Page 21: Ethernet

Spine topology

It looks like our back one spinal cord, where multiple numbers of horizontal cables are connected to a vertical line through special amplifiers or repeaters

Page 22: Ethernet

Tree topology

This is most general topology because a network with two paths between some pairs of stations would suffer from interference between the signals

Page 23: Ethernet

Segmented topology

Since each version of 802.3 has maximum cable length per segment, to allow larger networks, repeaters can connect multiple cables

Page 24: Ethernet

Manchester Encoding

• The normal binary logics of one and zero are no more used to send data from one station to other station.

• The reason of not using plain binary signal is they cause ambiguities resulting in false interpretation of sent data.

• The major culprit is zero, where even no data is sent the receiver can assume it as zero.

• So to clear out the ambiguity or to ensure proper interpretation of data, a coding technique called Manchester coding is employed in IEEE802.3 standards

Page 25: Ethernet
Page 26: Ethernet

MAC Sublayer Protocol

Page 27: Ethernet
Page 28: Ethernet

The binary Exponential Backoff Algorithm

• Exponential backoff is an algorithm that uses feedback to multiplicatively decrease the rate of some process, in order to gradually find an acceptable rate.

• It is often used in network congestion avoidance to help determine the correct sending rate.

• For example, a sender might send a message, set a timer to wait 0.25 seconds for an acknowledgment, and if none arrives, retransmit the message and wait 0.5 seconds for an acknowledgment.

• It will continue to retry until it receives an acknowledgement and will wait, 1s, 2s, 4s, 8s, etc. each time before retrying.

• Time slots are defined to be 51.2µsec during contention period. After i collisions, backoff random number of intervals between 0 and 2i -1. i is bounded at 10. After 16 attempts, the sender quits