Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Ethernet mac sublayer protocol ppt

26/11/2021 Client: muhammad11 Deadline: 2 Day

Chapter 13

Wired LANs:

Ethernet

Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

*

Chapter 5: Outline

13.1 ETHERNET PROTOCOL

13.2 STANDARD ETHERNET

13.3 FAST ETHERNET

13.4 GIGABIT ETHERNET

13.5 10 GIGABIT ETHERNET

13.#

Chapter 13: Objective

The first section discusses the Ethernet protocol in general. It explains that IEEE Project 802 defines the LLC and MAC sub-layers for all LANs including Ethernet. The section also lists the four generations of Ethernet.
The second section discusses the Standard Ethernet. The section first describes some characteristics of the Standard Ethernet. It then discusses the addressing mechanism, which is the same in all Ethernet generations. The section next discusses the access method, CSMA/ CD, which we discussed in Chapter 12. The section then reviews the efficiency of the Standard Ethernet. It then shows the encoding and the implementation of this generation.
13.#

Chapter 13: Objective (continued)

The third section describes the Fast Ethernet, the second generation, which can still be seen in many places. The section first describes the changes in the MAC sublayer. The section then discusses the physical layer and the implementation of this generation.
The fourth section discusses the Gigabit Ethernet, with the rate of 1 gigabit per second. The section first describes the MAC sublayer. It then moves to the physical layer and implementation.
The fifth section touches on the 10 Gigabit Ethernet. This is a new technology that can be used both for a backbone LAN or as a MAN (metropolitan area network).
13.#

13.*

13-1 ETHERNET PROTOCOL

The data-link layer and the physical layer are the territory of the local and wide area networks. This means that when we discuss these two layers, we are talking about networks that are using them. As we see in this and the following two chapters, we can have wired or wireless networks. We discuss wired networks in this chapter and the next.

13.#

13.*

13.13.1 IEEE Project 802

In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers. Project 802 does not seek to replace any part of the OSI model or TCP/IP protocol suite. Instead, it is a way of specifying functions of the physical layer and the data-link layer of major LAN protocols. The relationship of the 802 Standard to the TCP/IP protocol suite is shown in Figure 13.13.

13.#

13.*

Figure 13.1: IEEE standard for LANs

13.#

13.*

13.13.2 Ethernet Evolution

The Ethernet LAN was developed in the 1970s by Robert Metcalfe and David Boggs. Since then, it has gone through four generations: Standard Ethernet (10 Mbps), Fast Ethernet (100 Mbps), Gigabit Ethernet (1 Gbps), and 10 Gigabit Ethernet (10 Gbps), as shown in Figure 13.2. We briefly discuss all these generations.

13.#

13.*

Figure 13.2 : Ethernet evolution

13.#

13.*

13-2 STANDARD ETHERNET

We refer to the original Ethernet technology with the data rate of 10 Mbps as the Standard Ethernet. Although most implementations have moved to other technologies in the Ethernet evolution, there are some features of the Standard Ethernet that have not changed during the evolution. We discuss this standard version first.

13.#

13.*

13.2.1 Characteristics

Let us first discuss some characteristics of the Standard Ethernet.

13.#

13.*

Figure 13.3: Ethernet frame

13.#

Show how the address 47:20:1B:2E:08:EE is sent out online.

Solution

The address is sent left to right, byte by byte; for each byte, it is sent right to left, bit by bit, as shown below:

13.*

Example 13.1

*

13.*

13.2.2 Addressing

Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network interface card (NIC). The NIC fits inside the station and provides the station with a link-layer address. The Ethernet address is 6 bytes (48 bits), normally written in hexadecimal notation, with a colon between the bytes. For example, the following shows an Ethernet MAC address:

13.#

13.*

Figure 13.4: Unicast and multicast addresses

13.#

Define the type of the following destination addresses:

4A:30:10:21:10:1A
47:20:1B:2E:08:EE
FF:FF:FF:FF:FF:FF
Solution

To find the type of the address, we need to look at the second hexadecimal digit from the left. If it is even, the address is unicast. If it is odd, the address is multicast. If all digits are Fs, the address is broadcast. Therefore, we have the following:

13.*

Example 13.2

*

a. This is a unicast address because A in binary is 1010
(even).

b. This is a multicast address because 7 in binary is 0111
(odd).

c. This is a broadcast address because all digits are Fs in

hexadecimal.

13.*

Example 13.2 (continued)

*

13.*

Figure 13.5: Implementation of standard Ethernet

13.#

13.*

13.2.3 Access Method

Since the network that uses the standard Ethernet protocol is a broadcast network, we need to use an access method to control access to the sharing medium. The standard Ethernet chose CSMA/CD with 1-persistent method, discussed earlier in Chapter 12, Section 13.3. Let us use a scenario to see how this method works for the Ethernet protocol.

13.#

13.*

13.2.4 Efficiency of Standard Ethernet

The efficiency of the Ethernet is defined as the ratio of the time used by a station to send data to the time the medium is occupied by this station. The practical efficiency of standard Ethernet has been measured to be

13.#

In the Standard Ethernet with the transmission rate of 10 Mbps, we assume that the length of the medium is 2500 m and the size of the frame is 512 bits. The propagation speed of a signal in a cable is normally 2 × 108 m/s.

The example shows that a = 0.24, which means only 0.24 of a frame occupies the whole medium in this case. The efficiency is 39 percent, which is considered moderate; it means that only 61 percent of the time the medium is occupied but not used by a station.

13.*

Example 13.3

*

13.*

13.2.5 Implementation

The Standard Ethernet defined several implementations, but only four of them became popular during the 1980s. Table 13.1 shows a summary of Standard Ethernet implementations.

13.#

Table 13.1: Summary of Standard Ethernet implementations

13.*

*

13.*

Figure 13.6: Encoding in a Standard Ethernet

13.#

13.*

Figure 13.7: 10Base5 implementation

13.#

13.*

Figure 13.8: 10Base2 implementation

13.#

13.*

Figure 13.9: 10Base-T implementation

13.#

13.*

Figure 13.10: 10Base-F implementation

13.#

13.*

13.2.6 Changes in the Standard

Before we discuss higher-rate Ethernet protocols, we need to discuss the changes that occurred to the 10-Mbps Standard Ethernet. These changes actually opened the road to the evolution of the Ethernet to become compatible with other high-data-rate LANs.

13.#

13.*

Figure 13.11: Sharing bandwidth

13.#

13.*

Figure 13.12: A network with and without bridging

13.#

13.*

Figure 13.13: Collision domains

13.#

13.*

Figure 13.14: Switched Ethernet

13.#

13.*

Figure 13.15: Full – duplex switched Ethernet

13.#

13.*

13-3 FAST ETHERNET

In the 1990s, Ethernet made a big jump by increasing the transmission rate to 100 Mbps, and the new generation was called the Fast Ethernet. The designers of the Fast Ethernet needed to make it compatible with the Standard Ethernet. The MAC sublayer was left unchanged. But the features of the Standard Ethernet that depend on the transmission rate, had to be changed.

13.#

13.*

13.3.1 Access Method

We remember that the proper operation of the CSMA/CD depends on the transmission rate, the minimum size of the frame, and the maximum network length. If we want to keep the minimum size of the frame, the maximum length of the network should be changed. In other words, if the minimum frame size is still 512 bits, and it is transmitted 10 times faster, the collision needs to be detected 10 times sooner, which means the maximum length of the network should be 10 times shorter (the propagation speed does not change).

13.#

13.*

13.3.2 Physical Layer

To be able to handle a 100 Mbps data rate, several changes need to be made at the physical layer.

13.#

13.*

Figure 13.16: Encoding for fast Ethernet

13.#

Table 13.2: Summary of Fast Ethernet implementations

13.*

*

13.*

13-4 GIGABIT ETHERNET

The need for an even higher data rate resulted in the design of the Gigabit Ethernet Protocol (1000 Mbps). The IEEE committee calls it the Standard 802.3z. The goals of the Gigabit Ethernet were to upgrade the data rate to 1 Gbps, but keep the address length, the frame format, and the maximum and minimum frame length the same.

13.#

13.*

13.4.1 MAC Sublayer

A main consideration in the evolution of Ethernet was to keep the MAC sublayer untouched. However, to achieve a data rate of 1 Gbps, this was no longer possible. Gigabit Ethernet has two distinctive approaches for medium access: half-duplex and full-duplex. Almost all implementations of Gigabit Ethernet follow the full-duplex approach, so we mostly ignore the half-duplex mode.

13.#

13.*

13.4.2 Physical Layer

The physical layer in Gigabit Ethernet is more complicated than that in Standard or Fast Ethernet. We briefly discuss some features of this layer.

13.#

13.*

Figure 13.17: Encoding in Gigabit Ethernet

13.#

Table 13.3: Summary of Gigabit Ethernet implementations

13.*

*

13.*

13-5 10-GIGABIT EHTERNET

In recent years, there has been another look into the Ethernet for use in metropolitan areas. The idea is to extend the technology, the data rate, and the coverage distance so that the Ethernet can be used as LAN and MAN (metropolitan area network). The IEEE committee created 10 Gigabit Ethernet and called it Standard 802.3ae.

13.#

13.*

13.5.1 Implementation

10 Gigabit Ethernet operates only in full-duplex mode, which means there is no need for contention; CSMA/CD is not used in 10 Gigabit Ethernet. Four implementations are the most common: 10GBase-SR, 10GBase-LR, 10GBase-EW, and 10GBase-X4. Table 13.4 shows a summary of the 10 Gigabit Ethernet implementations. We discussed the encoding in Chapter 4.

13.#

Table 13.4: Summary of 10-Gigabit Ethernet implementations

13.*

*

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Writer Writer Name Offer Chat

Writers are writing their proposals. Just wait here to get the offers for your project...

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Primary obligor accounting - Business a level syllabus - Stem cells research - Henson v reddin case brief - Barack obama nobel acceptance speech - Worksop caravan centre ltd - Approved b double routes queensland - Which line from the text states the main cause for roosevelt's speech? - Identification of a compound by mass relationships lab answers - Market penetration assignment due in 18 hours - Delphi company has developed a new product - Webex google chrome extension - 12/70 park street st kilda west - Taylormade r320 ti driver - DISC 7 415 - Reflection of Subliminal Advertising - Ftse developed core infrastructure index - King lear iambic pentameter - How many moles are in of aspartame - Specific heat capacity of lead - Supply and demand worksheet - Fundamentals of Speech Communication - crisis management final project - Do you need help related to any subject? - Logistics management assignment - Multi voting process - Industrial motor control diagram - Political Science week 6 Discussion - Presuppositions/Ethics Paper - Which of the following best approximates a pure monopoly - Evolution of nursing education - Classification of birds ppt - Sample statement of purpose for ms in business analytics - Reynolds george w information technology for managers 2016 pdf - Saral transfer paper hobby lobby - Why does macbeth revisit the witches - Case study - Discussion: Use of Group Designs in Program Evaluation - The greek way summary - University of phoenix college algebra - How to calculate correlation coefficient on calculator casio - Www statesuper nsw gov au - Mylabsplus fsw - Assignment 1 - Billy hyde drum kit price - Describe the three psychological dimensions of vision - Syrian War and EU in a vulnerable situation - FRAME YOUR ISSUE AND COLLECT YOUR DATA - How can Detroit schools ensure students are able to transition to new routines, expectations, and responsibilities virtually? - Delphi printer simulation scenario a - Hmrc capital gains summary notes - Secondary school teacher personal statement examples - Apple financial statements past 5 years - Sra lugones el pollo asado por favor - Chapter 14 to kill a mockingbird quotes - Business law - Math102 - Riddells creek scout camp - Eight steps to sound ethical decision making - When did bank of america acquired merrill lynch - Discussion Responses - Purpose of cell group ministry - Single European Act (Chp.1) - Tommy reid buffalo ny - St john the baptist trowbridge - Will you pay for the Ransom - How do you write a cinquain - View of Human Resource Development - Factored form into standard form calculator - 2.4 3 two's complement arithmetic answer key - Root exposed wget http fbi gov 0 docs zip - Cellular respiration and exercise worksheet answers - If we must die summary - Rammed earth timber frame - Essay - Disscussion - English Idea Map - Http www learner org courses envsci interactives carbon - Wrangle and analyse data udacity project - Why do amides have higher boiling points than carboxylic acids - Community health nursing - ¿se llevan bien elena y mónica? a veces parece que se odian. a veces se relajan. - Euler hermes rating scale 1 10 - Sheffield city council parking permits - Some recent financial statements for smolira golf corp follow - Abner's lectures - Sample training needs analysis questionnaire for employees - Gcse pe paper 1 quiz - Percy jackson chapter 22 answers - Dragons den wiz of biz - Boss judith think 4th ed mcgraw hill 2017 - Hotel saville in south yarra - Manchester united soccer club case study answers - Lines depicting simple happiness analysis - The ethical decision making framework includes - The american life league promotes - Joe larkin millennium partners - How to break down a programming problem - Dirty john episode 1 reddit - Does anyone offer proofreading services? - Business Conti Plan & Disaster Recovery Plan