Sei sulla pagina 1di 23

A Seminar

Report
On
“ETHERNET”
By
DEEPAK
RAJPUT
INTRODUCTION:
Personal computers hadn't even hit the mass market
when researchers started
working on what later proved to be the second phase
of the PC’s. The revolutionary
aspect is the linkage of Personal Computers to a
network. The year 1977 is the year of the
PC's big arrival. Ethernet has started in 1977 and till
today it is most widely used
technology for connecting tens and millions of PCs in
local area networks.
TECHNICAL ASPECTS OF
ETHERNET:
Ethernet is a LAN technology which
connects the computers in the close
proximity. It deals with physical and
data link layer aspects of the
networking, in
particular wires and chips used and
how the data is transmitted in the
network.
ETHERNET
TERMINOLOGY:
As shown in picture 2, there are four
different components involved in the
Ethernet terminology.
Medium – It is the means of which all the
devices are attached.
E.g. coaxial copper, twisted pair, fiber
cables.
Segment - single shared medium in the
network.
Node-device that is attached to the segment.
e.g: computer, printer……
Frame – short messages by which nodes
communicate with each other.
PROTOCOL USED IN
ETHERNET:
Ethernet uses bus topology. All the
devices are connected to Ethernet
medium in
bus local area network technology. The
protocol used by Ethernet is
CSMA/CD (Carrier
Sense Multiple Access with Collision
Detection).
Carrier Sense – carrier sense is the process of checking whether the medium is free or
not by the device before it wants to transmit the data. This will be done by all the devices
that are connected to the Ethernet medium.
Multiple Accesses – this means all the devices on the network have the ability to access
the medium many (multiple) times as long as no one else is transmitting the data.
Collision Detection – this is a process of making sure that when two machines send the
data simultaneously then the corrupted data has to be retransmitted at differing time
intervals. Different algorithms are implemented so as to get rid of this collision process
.
 Step1: first node 2 checks if the network is free.
 Step2: then it will start transmitting data on to the
 network.
 Step3: after that the signal is propagated through
the
 cable and sent to all other nodes, since it is intended
 for node 4, node 4 receives and all others ignores.
 Step4: node 4 will send the acknowledgement to
node 2 as a conformation that it received
 the data.
Sometimes “collision” may occur when two
nodes send the message simultaneously. The
following steps are used when collision
occurs.
• The two nodes have to wait for some time
(random period of time) and then start
transmitting data again.
Picture. 2 : Ethernet terminology
Picture. 3: Ethernet bus topology
• Each node will sense this collision since
they have not heard the answer from the
recipient with in a given period of time. (This
time period is the propagation delay
and is equivalent to the time it takes for a
signal to travel to the furthest part of the
network and back again).
SWITCH:
this is a device in which each node in the
network has a dedicated line in which nodes
can
transmit data simultaneously.
Advantage:
- avoid collision.
- increases network speed.
- Machines can transmit simultaneously.
LIMITATIONS OF
ETHERNET:
1. Limitation on “network diameter”: A
primary concern is the length of the
shared cable. Electrical signals weaken as
they travel, neighboring devices
( Lights) can scramble the signal. A network
connection should be good enough so
that the devices on the two extreme sides can
receive the signals with any loss. This
particular aspect lays a condition on the
length of the cable in the network. (This is
called the network diameter).
Solution: using Repeaters. Repeaters are the
devices which will amplify the strength
of the signals.
2. Limitation on no. of devices attached to a
segment: Ethernet networks faced
congestion problems as the number of
devices connected to the network are
increased in the size. If a large number of
devices are connected to the same
segment and each device generates a sizable
amount of data it will be very tough
to handle the network. So it will result in lot
of collisions.
Solution: the best way to reduce the traffic is
to split a single segment into multiple
segments. The device used for this purpose is
called “Bridge”.
How Bridge works:
• They connect 2 or more segments.
• They function same as repeaters to
increase diameter of the network.
• But additional feature is regulates traffic
in the net work.
• It does the traffic by examining the
destination address if it belongs to same
segment then it filters otherwise it will
send it to the other segment.
e.g.: A to B it filters. A to D it sends from
seg1 to seg2:
MODERN ETHERNET
IMPLEMENTATIONS:
Modern Ethernet connections use twisted pair
wiring or fiber optics to connect stations.
The band width they use is really high. Old
Ethernet networks transmitted data at 10
Mbps, modern networks can operate at 100 or
even 1,000 Mbps.
There are two kinds of modern Ethernet
connections:
1. Switched Ethernet.
2. Full-duplex Ethernet.
1. SWITCHED ETHERNET:
In a switched Ethernet every node has a
special segment connected to each node. The
switch first picks up each transmission and
checks it and then sends it to the appropriate
recipient or the receiver it just works same
like
bridge but the extra advantage that it has is
that
since each device has a special segment
connected to it, so it can send the message
directly to the receiver with out any chance
for collisions. The greatest advantage with
switch is that it will allow many
2. FULL-DUPLEX
ETHERNET:
Full duplex means two way connected
networking.So each node in this
network can send
and receive the data simultaneously. In
these
networks they use special type of
conductors for
sending and receiving the data
simultaneously.
ALTERNATE TECHNOLOGIES
TO ETHERNET:
There are two famous alternate
technologies to Ethernet. They are:
1. Token Ring Technology
2. Asynchronous Transfer Mode
1. TOKEN RING
TECHNOLOGY:
The token ring network technology was
developed by IBM.
Working procedure:
-Ring initializes by creating token
-the token will go around the ring until it
encounters a station who wishes to
transmit the data.
-then the station will capture the token and
sends its own data frame around the ring.
-once the data frame returns back to the
transmitted station it then captures the data frame
and then sends back the token on the ring. This way the
data is transmitted by all the
stations.
2. ASYNCHRONOUS
TheTRANSFER MODE:
final alternate network technology that is
mentioned in this report is
asynchronous transfer mode or ATM. It can
attach many devices with high reliability at
high speeds across different countries.ATM
networks are suitable for carrying not only
data, but also voice and video traffic. This
makes this technology more versatile and
expandable. The popularity of the ATM is
growing day by day. So this new technology
might the future technology

Potrebbero piacerti anche