0% found this document useful (0 votes)
68 views

Ethernet & IEEE Standards: Lecture-9

1. Ethernet and IEEE standards establish common networking protocols and specifications. IEEE 802 is the project group that sets standards for physical and data link layers, including Ethernet, Token Bus, and Token Ring networks. 2. Classic Ethernet used a shared cable and CSMA/CD protocol to allow multiple devices to access the network. Switched Ethernet uses switches to connect devices and provide dedicated connections for higher speeds. 3. The IEEE 802.4 Token Bus protocol uses a token passed from node to node to control access to the shared bus network. A node grabs the token to transmit data to another node via the bus.

Uploaded by

Abhiram Don
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

Ethernet & IEEE Standards: Lecture-9

1. Ethernet and IEEE standards establish common networking protocols and specifications. IEEE 802 is the project group that sets standards for physical and data link layers, including Ethernet, Token Bus, and Token Ring networks. 2. Classic Ethernet used a shared cable and CSMA/CD protocol to allow multiple devices to access the network. Switched Ethernet uses switches to connect devices and provide dedicated connections for higher speeds. 3. The IEEE 802.4 Token Bus protocol uses a token passed from node to node to control access to the shared bus network. A node grabs the token to transmit data to another node via the bus.

Uploaded by

Abhiram Don
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

Ethernet & IEEE standards

Lecture-9
Introduction
Let’s begin our study of real systems with
Ethernet
 probably the most ubiquitous kind of computer network in the
world.
Two kinds of Ethernet exist:
1.ClassicEthernet: which solves the multiple access problem using
the techniques studied earlier
 speed at rates from 3 to 10 Mbps
2. Switched Ethernet, in which devices called
switches are used to connect different computers
 speed 100, 1000, and 10,000 Mbps,
fast Ethernet, gigabit Ethernet, and 10 gigabit Ethernet
In practice, only switched Ethernet is used nowadays.
Classic Ethernet – bit of history
• many people use the terms ‘‘Ethernet’’ and ‘‘IEEE 802.3’’
interchangeably.
• The story of Ethernet starts about the same time
as that of ALOHA.
Bob Metcalfe ( pioneers of Arpanet)
• They called the system Ethernet after the
luminiferous ether,(A medium that was once supposed
to fill all space and to support the propagation of
electromagnetic waves)
• Hence the name Ethernet . made by Xerox PARC .
• The Xerox Ethernet was so successful that DEC, Intel, and
Xerox drew up a standard in 1978 for a 10-Mbps Ethernet,
called the DIX standard
Classic Ethernet
• Classic Ethernet snaked
around the building as a
single long cable to which
all the computers were
attached.
• The first variety, popularly
called thick Ethernet,
resembled a yellow garden
hose, with markings every
2.5 meters to show where
to attach computers.
Classic Ethernet -2
• It was succeeded by thin Ethernet, which bent
more easily and made connections using
industry-standard BNC connectors
• Thin Ethernet was much cheaper and easier
to install,
• Each version of Ethernet has a maximum cable
length per segment (i.e.,unamplified length)
over which the signal will propagate.
Switched Ethernet
• The problems associated with finding breaks or
loose connections drove it toward a different
kind of wiring pattern, in which each station has
a dedicated cable running to a central hub.
• Fortunately, there is an another way to deal with
increased load:
• switched Ethernet: The heart of this system is a
switch containing a high-speed backplane that
connects all of the ports,
Switched Ethernet

Switches only output frames to the ports for which those frames are
destined. When a switch port receives an Ethernet frame from a
station, the switch checks the Ethernet addresses to see which port the
frame is destined for.
IEEE Background
• Institution of Electrical and Electronic Engineering
(IEEE)
• A professional non-profit organization
• Project group 802 under IEEE
– Entrusted with the task of setting standards relating to
physical and logical links of nodes in a network
• Standard mostly applies to the Physical and Data
Link layers
• Example
– IEEE 802.3 standard for the Ethernet bus network
The ISO-OSI Model Recalled
• Models the end-to-end communication process
• It is a seven-layer model
• Proposed by International Standard Organization
(ISO)
• The model is known as Open Systems Interconnect
(OSI)
• IEEE sets the standards at the lower levels of the ISO-
OSI model
ISO-OSI Seven Layer Model
Layer 7 Application

Layer 6 Presentation

Layer 5 Session

Layer 4 Transport

Layer 3 Network Focus of


IEEE 802
Layer 2 Data Link

Layer 1 Physical
Layer Reference to Protocol
Application

Application FTP, Telnet, SMTP, HTTP, SNMP ..


Presentation

Session

Transport Host-to-Host TCP, UDP

Network Internet IP, ICMP

Data Link
Network Access Ethernet, Token-Ring ...
Physical

Source: http://starter.sdsu.edu/remote/demo/osi-tcp.html
Another Look at Network Protocols
Source: www.networkmagzine.com
IEEE 802 Standards for LANs
(ieee802.org)
• 802.1 LAN/MAN architectures, LAN
interworking, network management, higher
protocol layers
• 802.2 LLC (logical link control)
• 802.3 CSMA/CD (carrier sense multiple
access/collision detection) - Ethernet
• 802.4 Token bus
• 802.5 Token ring

13
IEEE 802 (cont)
• 802.6 DQDB (distributed queue dual bus)
metropolitan area network
• 802.7 Technical advisory on broadband cable
• 802.8 Technical advisory on optic fiber and
optical LANs
• 802.9 Report on voice/data integration
• 802.10 Standard for interoperable LAN security
(SILS)
• 802.11 Wireless LANs
14
IEEE 802 (cont)
• 802.12 Study of demand priority
• 802.13 Not used
• 802.14 Data over cable TV (cable modems, hybrid
fiber/coax)
• 802.15 Wireless personal area networks (WPANs)
• 802.16 Broadband wireless access (wireless MANs)
• 802.17 Resilient packet ring (RPR)
• 802.18 Radio regulatory technical advisory
• 802.19 Coexistence technical advisory
15
• IEEE establishes IEEE 802.24 Smart Grid
Technical Advisory Group
December 13, 2012
• The IEEE has announced the formation of the
IEEE 802.24 Smart Grid Technical Advisory
Group (TAG). The newly formed collective will
aid in addressing challenges related to the use
of IEEE 802 standards in smart grid
applications. 
:
IEEE 802.3 Carrier Sense Multiple Access/ Collision Detection
(CSMA/CD)
An Overview of CSMA/CD
• CSMA/CD has two components as mentioned
• First is the Carrier Sense Multiple Access
(CSMA) component
• Second is the Collision Detection (CD)
component
CSMA Component of CSMA/CD
• CSMA (Carrier Sense Multiple Access)
– Check the bus for traffic
– If the bus is free, then transmit
– If it is busy, wait for a random period of time
before attempting to transmit again
CD Component of CSMA/CD
• Two stations may check the data bus
simultaneously
• Both may find the line free and engage in the
transmission of data
• Both transmission will collide
• CD component will detect this collision
– Inform the workstations of the collision
• Each station will wait for a random period of time
before attempting to transmit again
Ethernet Cabling
The most common kinds of Ethernet cabling.
Some Types of Ethernet
Cabling
Example notation:
10Base5 = 10 Mb/s rate, baseband (no modulation), 500
meter length limit
• 10Base2 “thin Ethernet” uses 3/16-inch (cheaper) coax
cable
• 10Base5 “thick or standard Ethernet” uses 3/8-inch coax
cable
• 10BaseT uses unshielded twisted pair (cheap) cable -
approved as 802.3i (1990)
• 10Broad36 uses CATV coax cable
• 10BaseFP uses optic fiber in passive star
22
Ethernet Cabling (4)

(a) Binary encoding, (b) Manchester encoding,


(c) Differential Manchester encoding.
Ethernet MAC Sublayer Protocol (2)

Collision detection can take as long as 2 .


Binary Exponential Backoff
• Contention time slots = 2τ = nominally 512 bit times
• After first collision, each station randomly choose 1 slot
in next 2 slots and tries again
• After 2nd collision, randomly choose 1 slot in next 4
slots and try again
• After n-th collision, randomly choose 1 slot in next 2^n
slots
• After each collision, another collision becomes less likely
– Adjusts dynamically to appropriate level of traffic, improves
stability

25
Binary Exponential Backoff (cont)

collisions

Example X X X

tries in one tries in one tries in one


of 2 slots of 4 slots of 8 slots

26
802.3 frame format
802.3 Frame Format
• Preamble = 7 bytes of 10101010 to
synchronize receiver’s clock
• Start of frame (SOF) = 10101011 (byte)

Bytes 7 1 2 or 6 2 or 6 2 Variable 0-64 4


Dest. Source
Preamble SOF Length Data Pad CRC
Address Address

28
802.3 Frame Format (cont)
• Destination/Source addresses (2 or 6 bytes)
– 2-byte addresses are locally administered
– 6-byte addresses are local or global
• Length (2 bytes) = length of data field
• Data = 0-1500 bytes
• Pad = filler to make frame at least 64 bytes
(excluding preamble and SOF)
– Minimum length to ensure collision detection
• CRC = error detection using a CRC code
29
CSMA/CD Usage
• Used extensively in bus LANs
CSMA/CD Standards
• Highly standardized protocol
• Different protocol standards for different
speeds of communication
• 10 Mbps Ethernet standard
– IEEE 802.3
Ethernet Performance

Efficiency of Ethernet at 10 Mbps with 512-bit slot times.


IEEE 802.4 Token Bus Protocol

:
IEEE 802.4 Token Bus Protocol
Token Bus

Token Server

Client Client Client

A token is distributed to each client in turn.


Token Bus Data Pickup
• A token is sent from one node to the other
• The client wanting to transmit grabs an empty
token
• Data is attached
• Token leaves for the next node and its travel
on the bus until it reaches the address to
which the data is destined
Cont.
Token Bus Data Delivery
• Token delivers the data to the addressee
• Acknowledgement is returned to the sender
• Token is passed to the next node
• The process continues
• If there is an error in delivering the information, a
request for retransmission attached to the token and
it is sent to the sender
Token Bus Standard and Applications

• IEEE 802.4
• It can be used in both broadband and
baseband transmission
• In Baseband, data is sent as digital signals through the media as a single
channel that uses the entire bandwidth of the media. Baseband
communication is bi-directional, which means that the same channel can
be used to send and receive signals.
• Broadband sends information in the form of an analog signal. Each
transmission is assigned to a portion of the bandwidth, hence multiple
transmissions are possible at the same time. Broadband communication is
unidirectional, so in order to send and receive, two pathways are needed
IEEE 802.5 Token Passing
Protocol
LAN Lower Layer Protocol:
Token Passing Protocol in Operation

Circulating
Token
A

D B

Server Workstation

C
•No collisions
Workstation
802.5 Token Ring (cont)
• Basic operation:
– Station can transmit only by grabbing free token,
change to busy token, transmit frame after it
– Station with destination address will read frame
– Frame circulates back to sender, deletes it,
generates free token
– Next station on ring has first opportunity to grab
free token

40
802.5 Frame Format
• Access control: same as “access control” field
in token
• Frame control: indicates data frame or type
of control frame

Bytes 1 1 1 2 or 6 2 or 6 Variable 4 1 1
Access Frame Dest. Source Frame
SOF Data CRC EOF
control control Address Address status

41
802.5 Frame Format (cont)
• Frame status:
– A bit: destination station sets to 1 if frame was read
– C bit: destination station sets to 1 if frame was copied
– Sender looks at A and C bits when frame returns
– A=0, C=0: destination is down
– A=1, C=0: destination up but frame not accepted
– A=1, C=1: destination up and frame accepted
(equivalent to Ack)

42
The Token
• Token
– Data packet that could carry data
– Circulates around the ring
– Offers an opportunity for each workstation and
server to transmit data
The Transmitting Workstation
• Waits for a free token in order to be able to attach
the data to be transmitted to the token
• On finding a free token, attach the following:
– Sender’s address
– Receiver’s address
– Data block to be transmitted
– Error checking details
– etc.
At the Receiving End
• Data is received and checked for errors
• Outcomes at the receiving end
– Data received without errors
– Date received with errors
Error-free Delivery of Data
• An acknowledgment is attached to the token
• Acknowledgment is passed to the sender
• Token is set free for other nodes to transmit
information
• At this time, the next workstation on the ring
will receive an opportunity
Correcting Errors in Delivery
• A request for retransmission is attached to the
token
• Token carries the message for retransmission
to the sender
• The data is thus retransmitted

You might also like