Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Ethernet mac sublayer protocol ppt

26/11/2021 Client: muhammad11 Deadline: 2 Day

Chapter 13

Wired LANs:

Ethernet

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

*

Chapter 5: Outline

13.1 ETHERNET PROTOCOL

13.2 STANDARD ETHERNET

13.3 FAST ETHERNET

13.4 GIGABIT ETHERNET

13.5 10 GIGABIT ETHERNET

13.#

Chapter 13: Objective

The first section discusses the Ethernet protocol in general. It explains that IEEE Project 802 defines the LLC and MAC sub-layers for all LANs including Ethernet. The section also lists the four generations of Ethernet.
The second section discusses the Standard Ethernet. The section first describes some characteristics of the Standard Ethernet. It then discusses the addressing mechanism, which is the same in all Ethernet generations. The section next discusses the access method, CSMA/ CD, which we discussed in Chapter 12. The section then reviews the efficiency of the Standard Ethernet. It then shows the encoding and the implementation of this generation.
13.#

Chapter 13: Objective (continued)

The third section describes the Fast Ethernet, the second generation, which can still be seen in many places. The section first describes the changes in the MAC sublayer. The section then discusses the physical layer and the implementation of this generation.
The fourth section discusses the Gigabit Ethernet, with the rate of 1 gigabit per second. The section first describes the MAC sublayer. It then moves to the physical layer and implementation.
The fifth section touches on the 10 Gigabit Ethernet. This is a new technology that can be used both for a backbone LAN or as a MAN (metropolitan area network).
13.#

13.*

13-1 ETHERNET PROTOCOL

The data-link layer and the physical layer are the territory of the local and wide area networks. This means that when we discuss these two layers, we are talking about networks that are using them. As we see in this and the following two chapters, we can have wired or wireless networks. We discuss wired networks in this chapter and the next.

13.#

13.*

13.13.1 IEEE Project 802

In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers. Project 802 does not seek to replace any part of the OSI model or TCP/IP protocol suite. Instead, it is a way of specifying functions of the physical layer and the data-link layer of major LAN protocols. The relationship of the 802 Standard to the TCP/IP protocol suite is shown in Figure 13.13.

13.#

13.*

Figure 13.1: IEEE standard for LANs

13.#

13.*

13.13.2 Ethernet Evolution

The Ethernet LAN was developed in the 1970s by Robert Metcalfe and David Boggs. Since then, it has gone through four generations: Standard Ethernet (10 Mbps), Fast Ethernet (100 Mbps), Gigabit Ethernet (1 Gbps), and 10 Gigabit Ethernet (10 Gbps), as shown in Figure 13.2. We briefly discuss all these generations.

13.#

13.*

Figure 13.2 : Ethernet evolution

13.#

13.*

13-2 STANDARD ETHERNET

We refer to the original Ethernet technology with the data rate of 10 Mbps as the Standard Ethernet. Although most implementations have moved to other technologies in the Ethernet evolution, there are some features of the Standard Ethernet that have not changed during the evolution. We discuss this standard version first.

13.#

13.*

13.2.1 Characteristics

Let us first discuss some characteristics of the Standard Ethernet.

13.#

13.*

Figure 13.3: Ethernet frame

13.#

Show how the address 47:20:1B:2E:08:EE is sent out online.

Solution

The address is sent left to right, byte by byte; for each byte, it is sent right to left, bit by bit, as shown below:

13.*

Example 13.1

*

13.*

13.2.2 Addressing

Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network interface card (NIC). The NIC fits inside the station and provides the station with a link-layer address. The Ethernet address is 6 bytes (48 bits), normally written in hexadecimal notation, with a colon between the bytes. For example, the following shows an Ethernet MAC address:

13.#

13.*

Figure 13.4: Unicast and multicast addresses

13.#

Define the type of the following destination addresses:

4A:30:10:21:10:1A
47:20:1B:2E:08:EE
FF:FF:FF:FF:FF:FF
Solution

To find the type of the address, we need to look at the second hexadecimal digit from the left. If it is even, the address is unicast. If it is odd, the address is multicast. If all digits are Fs, the address is broadcast. Therefore, we have the following:

13.*

Example 13.2

*

a. This is a unicast address because A in binary is 1010
(even).

b. This is a multicast address because 7 in binary is 0111
(odd).

c. This is a broadcast address because all digits are Fs in

hexadecimal.

13.*

Example 13.2 (continued)

*

13.*

Figure 13.5: Implementation of standard Ethernet

13.#

13.*

13.2.3 Access Method

Since the network that uses the standard Ethernet protocol is a broadcast network, we need to use an access method to control access to the sharing medium. The standard Ethernet chose CSMA/CD with 1-persistent method, discussed earlier in Chapter 12, Section 13.3. Let us use a scenario to see how this method works for the Ethernet protocol.

13.#

13.*

13.2.4 Efficiency of Standard Ethernet

The efficiency of the Ethernet is defined as the ratio of the time used by a station to send data to the time the medium is occupied by this station. The practical efficiency of standard Ethernet has been measured to be

13.#

In the Standard Ethernet with the transmission rate of 10 Mbps, we assume that the length of the medium is 2500 m and the size of the frame is 512 bits. The propagation speed of a signal in a cable is normally 2 × 108 m/s.

The example shows that a = 0.24, which means only 0.24 of a frame occupies the whole medium in this case. The efficiency is 39 percent, which is considered moderate; it means that only 61 percent of the time the medium is occupied but not used by a station.

13.*

Example 13.3

*

13.*

13.2.5 Implementation

The Standard Ethernet defined several implementations, but only four of them became popular during the 1980s. Table 13.1 shows a summary of Standard Ethernet implementations.

13.#

Table 13.1: Summary of Standard Ethernet implementations

13.*

*

13.*

Figure 13.6: Encoding in a Standard Ethernet

13.#

13.*

Figure 13.7: 10Base5 implementation

13.#

13.*

Figure 13.8: 10Base2 implementation

13.#

13.*

Figure 13.9: 10Base-T implementation

13.#

13.*

Figure 13.10: 10Base-F implementation

13.#

13.*

13.2.6 Changes in the Standard

Before we discuss higher-rate Ethernet protocols, we need to discuss the changes that occurred to the 10-Mbps Standard Ethernet. These changes actually opened the road to the evolution of the Ethernet to become compatible with other high-data-rate LANs.

13.#

13.*

Figure 13.11: Sharing bandwidth

13.#

13.*

Figure 13.12: A network with and without bridging

13.#

13.*

Figure 13.13: Collision domains

13.#

13.*

Figure 13.14: Switched Ethernet

13.#

13.*

Figure 13.15: Full – duplex switched Ethernet

13.#

13.*

13-3 FAST ETHERNET

In the 1990s, Ethernet made a big jump by increasing the transmission rate to 100 Mbps, and the new generation was called the Fast Ethernet. The designers of the Fast Ethernet needed to make it compatible with the Standard Ethernet. The MAC sublayer was left unchanged. But the features of the Standard Ethernet that depend on the transmission rate, had to be changed.

13.#

13.*

13.3.1 Access Method

We remember that the proper operation of the CSMA/CD depends on the transmission rate, the minimum size of the frame, and the maximum network length. If we want to keep the minimum size of the frame, the maximum length of the network should be changed. In other words, if the minimum frame size is still 512 bits, and it is transmitted 10 times faster, the collision needs to be detected 10 times sooner, which means the maximum length of the network should be 10 times shorter (the propagation speed does not change).

13.#

13.*

13.3.2 Physical Layer

To be able to handle a 100 Mbps data rate, several changes need to be made at the physical layer.

13.#

13.*

Figure 13.16: Encoding for fast Ethernet

13.#

Table 13.2: Summary of Fast Ethernet implementations

13.*

*

13.*

13-4 GIGABIT ETHERNET

The need for an even higher data rate resulted in the design of the Gigabit Ethernet Protocol (1000 Mbps). The IEEE committee calls it the Standard 802.3z. The goals of the Gigabit Ethernet were to upgrade the data rate to 1 Gbps, but keep the address length, the frame format, and the maximum and minimum frame length the same.

13.#

13.*

13.4.1 MAC Sublayer

A main consideration in the evolution of Ethernet was to keep the MAC sublayer untouched. However, to achieve a data rate of 1 Gbps, this was no longer possible. Gigabit Ethernet has two distinctive approaches for medium access: half-duplex and full-duplex. Almost all implementations of Gigabit Ethernet follow the full-duplex approach, so we mostly ignore the half-duplex mode.

13.#

13.*

13.4.2 Physical Layer

The physical layer in Gigabit Ethernet is more complicated than that in Standard or Fast Ethernet. We briefly discuss some features of this layer.

13.#

13.*

Figure 13.17: Encoding in Gigabit Ethernet

13.#

Table 13.3: Summary of Gigabit Ethernet implementations

13.*

*

13.*

13-5 10-GIGABIT EHTERNET

In recent years, there has been another look into the Ethernet for use in metropolitan areas. The idea is to extend the technology, the data rate, and the coverage distance so that the Ethernet can be used as LAN and MAN (metropolitan area network). The IEEE committee created 10 Gigabit Ethernet and called it Standard 802.3ae.

13.#

13.*

13.5.1 Implementation

10 Gigabit Ethernet operates only in full-duplex mode, which means there is no need for contention; CSMA/CD is not used in 10 Gigabit Ethernet. Four implementations are the most common: 10GBase-SR, 10GBase-LR, 10GBase-EW, and 10GBase-X4. Table 13.4 shows a summary of the 10 Gigabit Ethernet implementations. We discussed the encoding in Chapter 4.

13.#

Table 13.4: Summary of 10-Gigabit Ethernet implementations

13.*

*

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Writer Writer Name Offer Chat

Writers are writing their proposals. Just wait here to get the offers for your project...

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Argument essay for lzy - Org Behavior - Reflection, Discussion and Assignment - Southern blotting dna fingerprinting - Should i do my homework flowchart - Definition of intoxication nsw - Saeed mohammad spinal surgeon - Estee lauder presidential management associate salary - Week 6b - Year 11 chemistry syllabus - Gnomeo and juliet google docs - Bridge to terabithia book chapter 2 - Aloft source india pvt ltd - In praise of the new knighthood - Iron iii hydroxide plus phosphoric acid - Sir robert peel 9 principles of policing - Explanatory passages present both sides are objective and ___________________ - Ria sw indonesian idol 2010 - Computer Science : Assignment Help - Inferential research and statistics project part 1 - What are the two main inventory accounting systems - Rewriting the result part and adding points in detail regarding the 3 small bar graphs mentioning numbers - The results of accounting principals latest workonomix - Managerial Finance - Acct - New practice approaches in nursing - ATTN: PAPERSGURU - When is the irr rule unreliable - Literature evaluation table gcu - 4 sources of authority islam - Assignment: Structural Versus Strategic Family Therapies - Medicare levy surcharge reportable fringe benefits - Is wind an abiotic factor - Franz mairinger horses are made to be horses - Workshop statistics discovery with data exercise answers - Deciduous forest producers consumers and decomposers - Virtual Address - As 4811 employment screening - Calibration of volumetric flask lab report - Similarities between classical and contemporary ballet - Conductors and insulators ppt - Midtronics exp 1050 software update - Http www apa org pubs databases psycinfo index aspx - Tattoo machine liner spring setup - How to calibrate orp meter - Tourism and colonial imagery - Uts student centre call - I need 2000 words on Marketing Guide - Henry luce's the american century quizlet - Access cost management data to determine a make or buy decision - Association of massage therapists ltd - How are accounting policies defined in the literature - Mangerial Economics - Simnet access independent project 1 5 - Week 1 - Kirkland dental methil fife - Https nen nasa gov web se doc repository - Case 9 the data cleansing task - Find the value of rl for maximum power transfer - Villanova six sigma program - Exploiting metasploitable with metasploit in kali linux - EBP and research - High-speed rail - Week 1 essay - The lean and mean approach of 3g capital - Cisco 7000 series router - In a normal costing system the manufacturing overhead control account - Methven to perth bus - Taekwondo black belt grading - What happened to trevor's mom - The great debaters study guide answers - Is kfc a public limited company - 2 page paper - Assignment 3: Impact of Economics on Daily Living - Grc spray machine india - 4 slides powerpoint - Pause proceed with caution strategy - As quickly as simile - Anzac 75th anniversary $5 coin value - Midnight rambler guitar lesson - Sdlc table - Alternative Energy Systems - Sheiko 5 day program - Bowlby and ainsworth 3 8 months - Individual Written Analysis of the Case (WAC) “Chick-Fil-A: International Expansion Challenges” - Ib biology final exam review - Literature Review on aggression and bullying as target behavior on ABA - What gases are exchanged by an animal with its environment - Comprehensive learning assessment - Basement excavation method statement - Short reading. - Wk 4 time traveler - Binomial expansion with fractions - Hunter paxson cause of death - Recapitulación leccion 3 - Assignment - E Documents - Qui9 - Ece registry phone number - Anatomy and physiology of breastfeeding - Electrophilic aromatic substitution nitration of methyl benzoate lab report