SlideShare a Scribd company logo
CHAPTER 13
WIRED LANS: ETHERNET

13.3 CHANGES IN THE
STANDARD
Presented by : Malik S.Abeisat
- From 10-Mbps Standard Ethernet until it’s moving
to higher data rate , it passes through through
several changes.
- These changes actually opened the road to the
evolution of the Ethernet to become compatible
with other high-data-rate LANs.
- Here we’ll talk about some of them :
Bridged Ethernet
Switched Ethernet
Full-Duplex Ethernet

1
Bridged Ethernet
2
WHAT EXACTLY IS A BRIDGE IN
NETWORKING?
_____________________________________
A Bridge is a device that filters data traffic at a network
boundary. Bridges reduce the amount of traffic on a LAN by
dividing it into two segments. It connects on the data-link
layer, (layer 2) of the OSI model.

In the picture to the right, the data is
coming from the database server.
The bridge filters the data, sending
the data to the correct locations.

3
BRIDGED ETHERNET


The first step in the Ethernet evolution was the division of a LAN by bridges.



The term bridge was coined in the early 1980s.



Today, the terms LAN switch or (in the context of Ethernet) Ethernet switch
are used.



Bridges have two effects on an Ethernet LAN:
1- They raise the bandwidth.
2- they separate collision domains.







Bridges are intermediate systems that forward MAC frames to
destinations based on MAC addresses.
Q. Is an Ethernet hub a bridge or a repeater ? What’s the difference ?
A. It can be either a bridge or a repeater. “hub” is a product name, not an
architecture name. Modern hubs are bridges. Old ones are repeaters.The
difference is: a repeater is a layer 1 intermediate system (acts on bits)
whereas a bridge is a layer 2 intermediate system (acts on entire MAC
frames). Also: a bridge separates collision domains, a repeater does not

hub
hub

hub

4
HOW DOES A BRIDGE WORK?
___________________________
Bridges are similar to repeaters and network hubs, devices that connect at the
physical layer, however, with bridging, traffic from one network is managed
rather than simply rebroadcast to adjacent network segments.
Bridges tend to be more complex than hubs or repeaters. Bridges can analyze
incoming data packets to determine if the bridge is able to send the given
packet to another segment of the network.

Since bridging takes place at the data-link layer of the OSI model, a bridge
processes the information from each frame of data it receives. In an
Ethernet frame, this provides the MAC address of the frame's source and
destination. Bridges use two methods to resolve the network segment that
a MAC address belongs to.

5
Bridged Ethernet_Effect
1.

Raising the Bandwidth
Stations shares the total bandwidth they are provided with. When we have more
than one station they share the provided bandwidth hence we can put the bridge
we can spilt the stations so that they can share the same bandwidth but the
number of stations are less as it’s divided between stations. For example, We
have 10 stations sharing 10 mbps now if we bridge them over 5-5 stations ,we
will have 5 stations sharing the same 10mbps bandwidth, hence bridged
connection can increase the bandwidth by above mentioned method.

6
2.

Separating Collision Domains

The collision domain becomes much smaller and the
probability of collision is reduced tremendously. Without
bridging, 12 stations contend for access to the medium;
with bridging only 3 stations contend for access to the
medium.

7
Switched Ethernet
8
SWITCHED ETHERNET


Consists of a several
segments, each of which is
shared by NICs attached to it.
(Network interface controller “NIC”)

The network is segmented
into several collision domains.
 Bridges, switches, and routers
create the segment and
collision domain boundaries.
 Segments may contain hubs
and repeaters.

There is switch table and it’s build by
(media access control address “MAC”) for
each device



9
SWITCHED ETHERNET
Switch - 1 port per hub

Hub

Hub

10
11
Full-Duplex Ethernet
12
Full-duplex is a data communications term that
refers to the ability to send and receive data at the
same time.
 The full-duplex mode increases the capacity of
each domain (ex. from 10 to 20 Mbps).
 instead of using one link between the station and
the switch, the configuration uses two links:
one to transmit and one to receive.


13


In full-duplex mode, both devices can transmit and
receive to and from each other at the same time, and
there is no collision domain. This doubles the
aggregate bandwidth of the link and is sometimes
advertised as double the link speed (e.g., 200 Mbit/s).
o The elimination of the
collision domain for these
connections also means
that all the link's
bandwidth can be used by
the two devices on that
segment and that segment
length is not limited by the
need for correct collision
detection.

14
No Need for
(CSMA/CD)
15
(CSMA/CD)
Carrier Sense Multiple Access With Collision Detection


Collision: two transmissions interfere with each
other



Station that wants to transmit first listens to check if
another transmission is in progress (carrier sense).



If medium is in use, station waits; else, it transmits.



Collisions can still occur.



Transmitter waits for ACK; if no ACKs, retransmits.

16
ETHERNET: CSMA/CD
(CARRIER SENSE MULTIPLE ACCESS
WITH COLLISION DETECTION)


Access method: method of controlling how network
nodes access communications channels



CSMA/CD: Ethernet’s access method


Ethernet NICs listen on network
Wait until no nodes transmitting data over the signal on the
communications channel before transmission
 Several Ethernet nodes can be connected to a network and can
monitor traffic simultaneously


17
(Network interface controller “NIC”)
In a full-duplex switched Ethernet, each station is
connected to the switch via two separate links.
 Each station or switch can send and receive
independently without worrying about collision.
 Each link is a point-to-point dedicated path between the
station and the switch.
 There is no longer a need for carrier sensing; there is no
longer a need for collision detection. The job of the MAC
layer becomes much easier.
 The carrier sensing and collision detection functionalities
of the MAC sublayer can be turned off.


18
MAC Control
Layer
19
DEFINITION MAC




Specified by the technology being used.
Determine who can transmit and when.
Two types:


Deterministic: “Let’s take turns”.




Token-Ring, FDDI.

Non-deterministic: “First come, first serve”.


Ethernet : CSMA/CD.

20
DETERMINISTIC MAC PROTOCOL

21
NON-DETERMINISTIC MAC PROTOCOL



Carrier Sense Multiple Access with Collision Detection
(CSMA/CD).

22
USING MAC ADDRESSES

Data

A

D

Data

A

D

Destination Address
Source Address

Data

A

D

Data

A

D

23
Thanks on your attentions

Best regards
Presented by : Malik S.Abeisat

More Related Content

PPTX
Ch 18 intro to network layer - section 1
PPT
Lan technologies
PPSX
Token ring
DOCX
16 x 16 banyan switch
PPT
network Switch
PPTX
Computer Network - Network Layer
PPT
PPTX
Osi model
Ch 18 intro to network layer - section 1
Lan technologies
Token ring
16 x 16 banyan switch
network Switch
Computer Network - Network Layer
Osi model

What's hot (20)

PPTX
Reference models in Networks: OSI & TCP/IP
PPTX
Ethernet - Networking presentation
PPTX
Internet congestion
PPTX
TCP/IP model
PPT
Packet Switching and X.25 Protocol
PPT
Chapter 2 - Network Models
PPT
Chapter 22
PPTX
Sub Netting
PPTX
difference between hub, bridge, switch and router
PPTX
Ethernet Computer network
PPT
Chapter 20
PPT
CCNA PPT
PPTX
Ch 19 Network-layer protocols Section 1
PPTX
CCNA Course Training Presentation
PPTX
Routing Information Protocol
PPT
Chapter 11
PPTX
VLSM & SUPERNETTING
PPTX
Transport layer
PPTX
Ch 20 UNICAST ROUTING SECTION 2
Reference models in Networks: OSI & TCP/IP
Ethernet - Networking presentation
Internet congestion
TCP/IP model
Packet Switching and X.25 Protocol
Chapter 2 - Network Models
Chapter 22
Sub Netting
difference between hub, bridge, switch and router
Ethernet Computer network
Chapter 20
CCNA PPT
Ch 19 Network-layer protocols Section 1
CCNA Course Training Presentation
Routing Information Protocol
Chapter 11
VLSM & SUPERNETTING
Transport layer
Ch 20 UNICAST ROUTING SECTION 2
Ad

Viewers also liked (16)

PPTX
Chapter 05
PPT
Lans ethernet
PPT
CCNA CHAPTER 17 BY jetarvind kumar madhukar
PPT
802.11[1]
PPT
Chapter 13
PPT
PPT
14 Wireless LAN
PPT
Chapter 14
PPT
wired lans
PPT
Ieee standards
PPT
PPT
13 Wired Lans_Ethernet
PPT
12 wireless la-ns
PPTX
Networking
Chapter 05
Lans ethernet
CCNA CHAPTER 17 BY jetarvind kumar madhukar
802.11[1]
Chapter 13
14 Wireless LAN
Chapter 14
wired lans
Ieee standards
13 Wired Lans_Ethernet
12 wireless la-ns
Networking
Ad

Similar to Changes in the standard ppt (20)

PPTX
Network hardware essentials Lec#3
PPTX
Switching Concepts presentation
PPTX
chapter 5.1.pptx
PPTX
Switches, Routers and different routing protocols
PPT
chaptet 4 DC and CN.ppt
PPT
Switching
PPT
Networks-part17-Bridges-RP1.pptjwhwhsjshh
PPT
Lecture 07
PPT
1 networking devices 2014
PPTX
Interconnecting devies
PPT
Lecture 07
PPTX
Network Connecting Devices UNIT 5
PDF
unit5-190409094326.pdf
PPT
lecture666.ppt
PPTX
Network Devices
PPT
chapter7.ppt introduction to networking and subneting for ip version four
PPT
F06_Lecture7_etherne..
PPTX
PDF
CCNP_qefwqqw3fqwfq2wrffqwf2qwfwqwfS1.pdf
PDF
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf
Network hardware essentials Lec#3
Switching Concepts presentation
chapter 5.1.pptx
Switches, Routers and different routing protocols
chaptet 4 DC and CN.ppt
Switching
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Lecture 07
1 networking devices 2014
Interconnecting devies
Lecture 07
Network Connecting Devices UNIT 5
unit5-190409094326.pdf
lecture666.ppt
Network Devices
chapter7.ppt introduction to networking and subneting for ip version four
F06_Lecture7_etherne..
CCNP_qefwqqw3fqwfq2wrffqwf2qwfwqwfS1.pdf
CCNP_sdbsdbsdbsdbsdbsdbsdbsdbsdbsdbS1.pdf

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Tartificialntelligence_presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
1. Introduction to Computer Programming.pptx
NewMind AI Weekly Chronicles - August'25-Week II
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Group 1 Presentation -Planning and Decision Making .pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Tartificialntelligence_presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
Network Security Unit 5.pdf for BCA BBA.
SOPHOS-XG Firewall Administrator PPT.pptx
A comparative analysis of optical character recognition models for extracting...
1. Introduction to Computer Programming.pptx

Changes in the standard ppt

  • 1. CHAPTER 13 WIRED LANS: ETHERNET 13.3 CHANGES IN THE STANDARD Presented by : Malik S.Abeisat
  • 2. - From 10-Mbps Standard Ethernet until it’s moving to higher data rate , it passes through through several changes. - These changes actually opened the road to the evolution of the Ethernet to become compatible with other high-data-rate LANs. - Here we’ll talk about some of them : Bridged Ethernet Switched Ethernet Full-Duplex Ethernet 1
  • 4. WHAT EXACTLY IS A BRIDGE IN NETWORKING? _____________________________________ A Bridge is a device that filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments. It connects on the data-link layer, (layer 2) of the OSI model. In the picture to the right, the data is coming from the database server. The bridge filters the data, sending the data to the correct locations. 3
  • 5. BRIDGED ETHERNET  The first step in the Ethernet evolution was the division of a LAN by bridges.  The term bridge was coined in the early 1980s.  Today, the terms LAN switch or (in the context of Ethernet) Ethernet switch are used.  Bridges have two effects on an Ethernet LAN: 1- They raise the bandwidth. 2- they separate collision domains.    Bridges are intermediate systems that forward MAC frames to destinations based on MAC addresses. Q. Is an Ethernet hub a bridge or a repeater ? What’s the difference ? A. It can be either a bridge or a repeater. “hub” is a product name, not an architecture name. Modern hubs are bridges. Old ones are repeaters.The difference is: a repeater is a layer 1 intermediate system (acts on bits) whereas a bridge is a layer 2 intermediate system (acts on entire MAC frames). Also: a bridge separates collision domains, a repeater does not hub hub hub 4
  • 6. HOW DOES A BRIDGE WORK? ___________________________ Bridges are similar to repeaters and network hubs, devices that connect at the physical layer, however, with bridging, traffic from one network is managed rather than simply rebroadcast to adjacent network segments. Bridges tend to be more complex than hubs or repeaters. Bridges can analyze incoming data packets to determine if the bridge is able to send the given packet to another segment of the network. Since bridging takes place at the data-link layer of the OSI model, a bridge processes the information from each frame of data it receives. In an Ethernet frame, this provides the MAC address of the frame's source and destination. Bridges use two methods to resolve the network segment that a MAC address belongs to. 5
  • 7. Bridged Ethernet_Effect 1. Raising the Bandwidth Stations shares the total bandwidth they are provided with. When we have more than one station they share the provided bandwidth hence we can put the bridge we can spilt the stations so that they can share the same bandwidth but the number of stations are less as it’s divided between stations. For example, We have 10 stations sharing 10 mbps now if we bridge them over 5-5 stations ,we will have 5 stations sharing the same 10mbps bandwidth, hence bridged connection can increase the bandwidth by above mentioned method. 6
  • 8. 2. Separating Collision Domains The collision domain becomes much smaller and the probability of collision is reduced tremendously. Without bridging, 12 stations contend for access to the medium; with bridging only 3 stations contend for access to the medium. 7
  • 10. SWITCHED ETHERNET  Consists of a several segments, each of which is shared by NICs attached to it. (Network interface controller “NIC”) The network is segmented into several collision domains.  Bridges, switches, and routers create the segment and collision domain boundaries.  Segments may contain hubs and repeaters. There is switch table and it’s build by (media access control address “MAC”) for each device  9
  • 11. SWITCHED ETHERNET Switch - 1 port per hub Hub Hub 10
  • 12. 11
  • 14. Full-duplex is a data communications term that refers to the ability to send and receive data at the same time.  The full-duplex mode increases the capacity of each domain (ex. from 10 to 20 Mbps).  instead of using one link between the station and the switch, the configuration uses two links: one to transmit and one to receive.  13
  • 15.  In full-duplex mode, both devices can transmit and receive to and from each other at the same time, and there is no collision domain. This doubles the aggregate bandwidth of the link and is sometimes advertised as double the link speed (e.g., 200 Mbit/s). o The elimination of the collision domain for these connections also means that all the link's bandwidth can be used by the two devices on that segment and that segment length is not limited by the need for correct collision detection. 14
  • 17. (CSMA/CD) Carrier Sense Multiple Access With Collision Detection  Collision: two transmissions interfere with each other  Station that wants to transmit first listens to check if another transmission is in progress (carrier sense).  If medium is in use, station waits; else, it transmits.  Collisions can still occur.  Transmitter waits for ACK; if no ACKs, retransmits. 16
  • 18. ETHERNET: CSMA/CD (CARRIER SENSE MULTIPLE ACCESS WITH COLLISION DETECTION)  Access method: method of controlling how network nodes access communications channels  CSMA/CD: Ethernet’s access method  Ethernet NICs listen on network Wait until no nodes transmitting data over the signal on the communications channel before transmission  Several Ethernet nodes can be connected to a network and can monitor traffic simultaneously  17 (Network interface controller “NIC”)
  • 19. In a full-duplex switched Ethernet, each station is connected to the switch via two separate links.  Each station or switch can send and receive independently without worrying about collision.  Each link is a point-to-point dedicated path between the station and the switch.  There is no longer a need for carrier sensing; there is no longer a need for collision detection. The job of the MAC layer becomes much easier.  The carrier sensing and collision detection functionalities of the MAC sublayer can be turned off.  18
  • 21. DEFINITION MAC    Specified by the technology being used. Determine who can transmit and when. Two types:  Deterministic: “Let’s take turns”.   Token-Ring, FDDI. Non-deterministic: “First come, first serve”.  Ethernet : CSMA/CD. 20
  • 23. NON-DETERMINISTIC MAC PROTOCOL  Carrier Sense Multiple Access with Collision Detection (CSMA/CD). 22
  • 24. USING MAC ADDRESSES Data A D Data A D Destination Address Source Address Data A D Data A D 23
  • 25. Thanks on your attentions Best regards Presented by : Malik S.Abeisat