SlideShare a Scribd company logo
Ethernet Basics




   Chapter 4
Objectives
• Define and describe Ethernet
• Explain early Ethernet implementations
• Describe ways to extend and enhance
  Ethernet networks
Overview
Three Parts to Chapter 4
• Ethernet
• Early Ethernet Networks
• Extending and Enhancing Ethernet Networks
Ethernet
• First Ethernet implementation
  –   Develop by Xerox in 1973
  –   Based on bus topology
  –   Transferred data at 3Mbps max
  –   Evolved into today’s Ethernet standards

  Ethernet is a standard for a family of network
    technologies that share the same basic bus topology,
    frame type, and network access method.
• Next iteration of Ethernet
  – DIX standard (ca 1979)
  – DIX = Digital Equipment (DEC)+Intel+Xerox
  – Transferred data at 10Mbps max
• Standardization
  – DIX transferred control to IEEE
  – IEEE created the 802.3 (Ethernet) subcommittee
• 10BaseT
  – Earliest version of Ethernet to use UTP cabling
  – Used data frames and CSMA/CD
• Topology
  – Hybrid star-bus
  – Hub at center
     • Electronic repeater
     • Each connection on hub is a port
     • Each Ethernet NIC on network is a node.
     • Does not send signal back down the originating port
Figure 4.1 Ethernet hub
• Organizing the Data: Ethernet Frames
    – All networking technologies use frames
    – Ethernet frames contain seven pieces of information


•   Preamble
                               • Data
•   Destination MAC address
                               • Pad
•   Source MAC address
                               • Frame Check Sequence
•   Length
Figure 4.2 Ethernet frame
Figure 4.3 Frames propagating on a network
• Ethernet Security Vulnerability
  – Sniffers can order a NIC to run in promiscuous mode
  – In promiscuous mode, the NIC processes all frames
  – There are programs, such as AntiSniff, which network
    administrators can use to detect sniffers on an
    Ethernet network.
CSMA/CD
      Carrier Sense                Multiple Access      Collision Detection
Each NIC on the network         All machines have     If two NICs transmit at
examines the wire before        equal access to the   the same time, a colli-
sending a frame. If the         wire. Access to the   sion results. NICs may
node detects traffic, it will   wire is on a first-   listen to detect a
back off a random amount        come, first-served    collision.
of time and try again.          basis
Figure 4.4 No one else is talking – send the frame!
Figure 4.5 Collision!
Figure 4.6 Rolling for timing
Early Ethernet Networks
• 10BaseT
  –   Created in 1990
  –   Over 99% of all networks use this or its newer versions
  –   Two or more computers connected to a central hub
  –   NICs connect with wires per 802.3 standards
  –   Hubs for 10BaseT
       • Vary in size, shape, and number of ports
       • Need electrical power
10BaseT
 Speed     Signal Type      Type of cable
10 Mbps     Baseband        Twisted Pair
          A single signal
           on the cable
Figure 4.7 Two 10BaseT hubs
• 10BaseT (Continued)
  – UTP
     •   Uses CAT3 or better with RJ-45 connectors
     •   Two pairs of wires required (four-pair cable commonly used)
     •   One pair of wires sends data to the hub
     •   The other pair receives data from the hub
  – RJ-45 connector
     •   Introduced with 10BaseT
     •   Each pin connects to a single wire in cable
     •   Devices put voltage on the individual wires
     •   Pins numbered from 1 to 8
Figure 4.8 A typical four-pair CAT 5e
unshielded twisted-pair cable
Figure 4.9 Two views of an RJ-45 connector
• RJ-45 Pin Assignments
  – 1 and 2 send data
  – 3 and 6 receive data
• RJ-45 Connector called a crimp
  – Crimping is the act of installing an RJ-45 connector
  – Crimper is the tool used
Figure 4.10 The pins on an RJ-45 connector are
numbered 1 through 8.
Figure 4.11 Color-coded pairs
• TIA/EIA 568A and TIA/EIA 568B
  – Color-coded schemes for installing a crimp
  – TIA/EIA 568A
     • Green/white, green, orange/white, blue, blue/white, orange,
       brown/white, brown


  – TIA/EIA 568B
     • orange/white, orange, green/white, blue, blue/white, green,
       brown/white, brown
Figure 4.12 The TIA/EIA 568A and 568B standards
• 10BaseT Limits and Specifications
  – Distance between hub and computer = 100 meters
  – No more than 1024 computers connected to one hub
     • Such a high number too expensive and not practical
     • Too many collisions would occur
• 10BaseT Summary
  – Speed:         10 Mbps
  – Signal type:   Baseband
  – Distance:      100 meters between the hub and the
                   node
  – Node limit:    No more than 1,024 nodes per hub
  – Topology:      Star bus topology: physical star, logical
                   bus
  – Cable type:    Uses CAT3 or better UTP cabling with
                   RJ-45 connectors
• 10BaseFL
  – Distance: two kilometers (2,000 meters) between the
    hub and the node
  – Immune to EMI – ideal for high-interference
    environments
  – More secure because difficult to tap into
  – Multimode fiber-optic cables with ST or SC connectors
Figure 4.13 Typical 10BaseFL card
• 10BaseFL Summary
  –   Speed:         10Mbps
  –   Signal type:   Baseband
  –   Distance:      2000 meters between hub and node
  –   Node limit:    No more than 1,024 nodes per hub
  –   Topology:      Star bus topology: physical star, logical
                     bus
  – Cable type:      Uses multimode fiber-optic cabling with
                     ST or SC connectors
• Connecting different types of Ethernet networks
  – Same Ethernet packets, although different cabling and
    hubs
  – Media converter will connect differently-cabled
    Ethernet networks
Figure 4.14 Typical copper-to-fiber Ethernet media
converter (photo courtesy of TRENDnet)
Extending & Enhancing
  Ethernet Networks
• Connecting Ethernet Segments
  – Uplink Ports
     • Connect two hubs using a straight-through cable
     • Marked on hub
     • One end of cable to the uplink in one hub, other end in regular port of
       second hub
     • Daisy chain no more than four hubs
     • Uplink port may have a button to switch between regular or uplink
       mode, electronically reversing the wires inside the hub for that port
     • When connecting hubs
         – Only daisy-chain hubs
         – Take time to figure out the uplink ports
         – If incorrectly connected, they simply will not work
Figure 4.15 Typical uplink port
Figure 4.16 Daisy-chained hubs
Figure 4.17 Hierarchical hub configuration.
This will not work!
Figure 4.18 Press-button port
• Connecting Ethernet Segments (Continued)
   – Crossover Cables
      • Another way to connect two hubs without an uplink port
      • Connect via two normal ports using one crossover cable
      • Crossover cable reverses the sending and receiving pairs on one
        end
          • One end crimped per TIA/EIA 568A
          • Second end crimped per TIA/EIA 568B
Figure 4.19 A crossover cable reverses the
sending and receiving pairs
• Switched Ethernet
   – The Trouble with Hubs
      • A hub sends all packets out all ports
      • Increased traffic will slow network
      • Total bandwidth is 10 Mbps
      • When two nodes attempt to use wire at the same time, CSMA
        reduces the effective speed to ~ 5 Mbps
      • Add more conversations: network slows further
Figure 4.20 One conversation gets all the bandwidth
                    Switched
Figure 4.21 Two conversations must share the bandwidth
                        Hubs
• Switched Ethernet (Continued)
   – Switches to the Rescue
      • Ethernet switch takes advantage of MAC addresses
        (OSI Data Link layer)
      • Creates point-to-point connections between two conversing
        computers
      • Effectively gives every conversation the full bandwidth of the network
      • When first turned on, switch copies the source MAC addresses and
        builds a table of MAC addresses of each computer
      • Uses the table to create point-to-point connections between each
        pair of communicating devices
Figure 4.22 A switch tracking MAC addresses
Figure 4.23 A switch making two separate connections
• Switched Ethernet (Continued)
   – Switches to the Rescue (Continued)
      • Switch makes CSMA/CD insignificant
         • Connect switches any way you wish
         • Commonly connected in a tree organization
         • No collisions
Figure 4.24 Switches are very commonly
connected in a tree organization
Figure 4.25 Hub (top) and switch (bottom) comparison

More Related Content

PPT
Networking Chapter 5
PPT
Mac sub layer
PPTX
Ethernet
PPT
Switching
PPTX
CCCNA R&S-02-The TCP-IP and OSI Networking Models
PPTX
CCNA ppt Day 1
PPTX
PPTX
VIT 3-2014
Networking Chapter 5
Mac sub layer
Ethernet
Switching
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCNA ppt Day 1
VIT 3-2014

What's hot (20)

PPTX
The Basics of Industrial Ethernet Communications
PPTX
Tecnicas de conmutacion
PPTX
Cisco nexus series
PPT
ETHERNET
PPTX
TCP/IP and UDP protocols
PPTX
PPTX
CCNA v6.0 ITN - Chapter 05
PDF
5G URLLC (Ultra Reliable Low Latency Communications)
PDF
Tcp vs udp difference and comparison diffen
PPT
OSI model (7 LAYER )
PPTX
Network cable
PPTX
Integrated service digital network
PPTX
Ethernet Computer network
PPTX
Osi model
DOC
5. what is network cabling
PDF
Layer 3 redundancy hsrp
PDF
Passive infrastructure of FTTH networks: an overview
PPT
Optical networks
PPT
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
The Basics of Industrial Ethernet Communications
Tecnicas de conmutacion
Cisco nexus series
ETHERNET
TCP/IP and UDP protocols
CCNA v6.0 ITN - Chapter 05
5G URLLC (Ultra Reliable Low Latency Communications)
Tcp vs udp difference and comparison diffen
OSI model (7 LAYER )
Network cable
Integrated service digital network
Ethernet Computer network
Osi model
5. what is network cabling
Layer 3 redundancy hsrp
Passive infrastructure of FTTH networks: an overview
Optical networks
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
Ad

Viewers also liked (12)

PDF
Profinet Design
PDF
Profinet system design - Andy Verwer
PDF
Profibus commissioning and maintenance - Richard Needham
PPTX
Basics of sockets
PDF
Jnp
PDF
W4 profinet frame analysis, peter thomas
PDF
Profibus and Profinet shield currents - Peter Thomas
PDF
Introduction to PROFINET - Derek Lane of Wago
PDF
Introduction to Profibus & Profinet - Mark Freeman
PPT
Wireshark - presentation
PPTX
Network Packet Analysis with Wireshark
PPT
Wireshark Basics
Profinet Design
Profinet system design - Andy Verwer
Profibus commissioning and maintenance - Richard Needham
Basics of sockets
Jnp
W4 profinet frame analysis, peter thomas
Profibus and Profinet shield currents - Peter Thomas
Introduction to PROFINET - Derek Lane of Wago
Introduction to Profibus & Profinet - Mark Freeman
Wireshark - presentation
Network Packet Analysis with Wireshark
Wireshark Basics
Ad

Similar to Networking Chapter 4 (20)

PPT
Lan basic
PPTX
CHAPTER FIVE presentation on slide .pptx
PPT
Chapter 4ver2
PPT
Advance ethernet
PPTX
Chapter 4 (1)
PPTX
Network adpater,cabel,cards ,types, network devices
PPTX
LAN TECHNOLOGIES
PDF
Twisted Pair Ethernet
PPT
Week 5 lan topology
PPTX
Networking
PPTX
Networking
PPTX
Introduction and different types of Ethernet.pptx
PPT
Unit 1 ethernet vsd
PPT
DOCX
Ethernet
PPT
Lecture5
PPTX
39 ethernet
PDF
IEEE standards 802.3.&802.11
PPTX
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
PPT
Chapter 3 Networking
Lan basic
CHAPTER FIVE presentation on slide .pptx
Chapter 4ver2
Advance ethernet
Chapter 4 (1)
Network adpater,cabel,cards ,types, network devices
LAN TECHNOLOGIES
Twisted Pair Ethernet
Week 5 lan topology
Networking
Networking
Introduction and different types of Ethernet.pptx
Unit 1 ethernet vsd
Ethernet
Lecture5
39 ethernet
IEEE standards 802.3.&802.11
Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)
Chapter 3 Networking

More from mlrbrown (20)

PPT
Cso gaddis java_chapter15
PPT
Cso gaddis java_chapter14
PPT
Cso gaddis java_chapter13
PPT
Cso gaddis java_chapter12
PPT
Cso gaddis java_chapter11
PPT
Cso gaddis java_chapter10
PPT
Cso gaddis java_chapter9ppt
PPT
Cso gaddis java_chapter8
PPT
Cso gaddis java_chapter7
PPT
Cso gaddis java_chapter6
PPT
Cso gaddis java_chapter5
PPT
Cso gaddis java_chapter4
PPT
Cso gaddis java_chapter3
PPT
Cso gaddis java_chapter2
PPT
Cso gaddis java_chapter1
PPT
Networking Chapter 16
PPT
Networking Chapter 15
PPT
Networking Chapter 14
PPT
Networking Chapter 13
PPT
Networking Chapter 12
Cso gaddis java_chapter15
Cso gaddis java_chapter14
Cso gaddis java_chapter13
Cso gaddis java_chapter12
Cso gaddis java_chapter11
Cso gaddis java_chapter10
Cso gaddis java_chapter9ppt
Cso gaddis java_chapter8
Cso gaddis java_chapter7
Cso gaddis java_chapter6
Cso gaddis java_chapter5
Cso gaddis java_chapter4
Cso gaddis java_chapter3
Cso gaddis java_chapter2
Cso gaddis java_chapter1
Networking Chapter 16
Networking Chapter 15
Networking Chapter 14
Networking Chapter 13
Networking Chapter 12

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
master seminar digital applications in india
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Final Presentation General Medicine 03-08-2024.pptx
Week 4 Term 3 Study Techniques revisited.pptx
Classroom Observation Tools for Teachers
Microbial diseases, their pathogenesis and prophylaxis
Module 4: Burden of Disease Tutorial Slides S2 2025
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
O7-L3 Supply Chain Operations - ICLT Program
TR - Agricultural Crops Production NC III.pdf
PPH.pptx obstetrics and gynecology in nursing
102 student loan defaulters named and shamed – Is someone you know on the list?
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Renaissance Architecture: A Journey from Faith to Humanism
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
master seminar digital applications in india
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx

Networking Chapter 4

  • 1. Ethernet Basics Chapter 4
  • 2. Objectives • Define and describe Ethernet • Explain early Ethernet implementations • Describe ways to extend and enhance Ethernet networks
  • 4. Three Parts to Chapter 4 • Ethernet • Early Ethernet Networks • Extending and Enhancing Ethernet Networks
  • 6. • First Ethernet implementation – Develop by Xerox in 1973 – Based on bus topology – Transferred data at 3Mbps max – Evolved into today’s Ethernet standards Ethernet is a standard for a family of network technologies that share the same basic bus topology, frame type, and network access method.
  • 7. • Next iteration of Ethernet – DIX standard (ca 1979) – DIX = Digital Equipment (DEC)+Intel+Xerox – Transferred data at 10Mbps max
  • 8. • Standardization – DIX transferred control to IEEE – IEEE created the 802.3 (Ethernet) subcommittee • 10BaseT – Earliest version of Ethernet to use UTP cabling – Used data frames and CSMA/CD
  • 9. • Topology – Hybrid star-bus – Hub at center • Electronic repeater • Each connection on hub is a port • Each Ethernet NIC on network is a node. • Does not send signal back down the originating port
  • 11. • Organizing the Data: Ethernet Frames – All networking technologies use frames – Ethernet frames contain seven pieces of information • Preamble • Data • Destination MAC address • Pad • Source MAC address • Frame Check Sequence • Length
  • 13. Figure 4.3 Frames propagating on a network
  • 14. • Ethernet Security Vulnerability – Sniffers can order a NIC to run in promiscuous mode – In promiscuous mode, the NIC processes all frames – There are programs, such as AntiSniff, which network administrators can use to detect sniffers on an Ethernet network.
  • 15. CSMA/CD Carrier Sense Multiple Access Collision Detection Each NIC on the network All machines have If two NICs transmit at examines the wire before equal access to the the same time, a colli- sending a frame. If the wire. Access to the sion results. NICs may node detects traffic, it will wire is on a first- listen to detect a back off a random amount come, first-served collision. of time and try again. basis
  • 16. Figure 4.4 No one else is talking – send the frame!
  • 18. Figure 4.6 Rolling for timing
  • 20. • 10BaseT – Created in 1990 – Over 99% of all networks use this or its newer versions – Two or more computers connected to a central hub – NICs connect with wires per 802.3 standards – Hubs for 10BaseT • Vary in size, shape, and number of ports • Need electrical power
  • 21. 10BaseT Speed Signal Type Type of cable 10 Mbps Baseband Twisted Pair A single signal on the cable
  • 22. Figure 4.7 Two 10BaseT hubs
  • 23. • 10BaseT (Continued) – UTP • Uses CAT3 or better with RJ-45 connectors • Two pairs of wires required (four-pair cable commonly used) • One pair of wires sends data to the hub • The other pair receives data from the hub – RJ-45 connector • Introduced with 10BaseT • Each pin connects to a single wire in cable • Devices put voltage on the individual wires • Pins numbered from 1 to 8
  • 24. Figure 4.8 A typical four-pair CAT 5e unshielded twisted-pair cable
  • 25. Figure 4.9 Two views of an RJ-45 connector
  • 26. • RJ-45 Pin Assignments – 1 and 2 send data – 3 and 6 receive data • RJ-45 Connector called a crimp – Crimping is the act of installing an RJ-45 connector – Crimper is the tool used
  • 27. Figure 4.10 The pins on an RJ-45 connector are numbered 1 through 8.
  • 29. • TIA/EIA 568A and TIA/EIA 568B – Color-coded schemes for installing a crimp – TIA/EIA 568A • Green/white, green, orange/white, blue, blue/white, orange, brown/white, brown – TIA/EIA 568B • orange/white, orange, green/white, blue, blue/white, green, brown/white, brown
  • 30. Figure 4.12 The TIA/EIA 568A and 568B standards
  • 31. • 10BaseT Limits and Specifications – Distance between hub and computer = 100 meters – No more than 1024 computers connected to one hub • Such a high number too expensive and not practical • Too many collisions would occur
  • 32. • 10BaseT Summary – Speed: 10 Mbps – Signal type: Baseband – Distance: 100 meters between the hub and the node – Node limit: No more than 1,024 nodes per hub – Topology: Star bus topology: physical star, logical bus – Cable type: Uses CAT3 or better UTP cabling with RJ-45 connectors
  • 33. • 10BaseFL – Distance: two kilometers (2,000 meters) between the hub and the node – Immune to EMI – ideal for high-interference environments – More secure because difficult to tap into – Multimode fiber-optic cables with ST or SC connectors
  • 34. Figure 4.13 Typical 10BaseFL card
  • 35. • 10BaseFL Summary – Speed: 10Mbps – Signal type: Baseband – Distance: 2000 meters between hub and node – Node limit: No more than 1,024 nodes per hub – Topology: Star bus topology: physical star, logical bus – Cable type: Uses multimode fiber-optic cabling with ST or SC connectors
  • 36. • Connecting different types of Ethernet networks – Same Ethernet packets, although different cabling and hubs – Media converter will connect differently-cabled Ethernet networks
  • 37. Figure 4.14 Typical copper-to-fiber Ethernet media converter (photo courtesy of TRENDnet)
  • 38. Extending & Enhancing Ethernet Networks
  • 39. • Connecting Ethernet Segments – Uplink Ports • Connect two hubs using a straight-through cable • Marked on hub • One end of cable to the uplink in one hub, other end in regular port of second hub • Daisy chain no more than four hubs • Uplink port may have a button to switch between regular or uplink mode, electronically reversing the wires inside the hub for that port • When connecting hubs – Only daisy-chain hubs – Take time to figure out the uplink ports – If incorrectly connected, they simply will not work
  • 40. Figure 4.15 Typical uplink port
  • 42. Figure 4.17 Hierarchical hub configuration. This will not work!
  • 44. • Connecting Ethernet Segments (Continued) – Crossover Cables • Another way to connect two hubs without an uplink port • Connect via two normal ports using one crossover cable • Crossover cable reverses the sending and receiving pairs on one end • One end crimped per TIA/EIA 568A • Second end crimped per TIA/EIA 568B
  • 45. Figure 4.19 A crossover cable reverses the sending and receiving pairs
  • 46. • Switched Ethernet – The Trouble with Hubs • A hub sends all packets out all ports • Increased traffic will slow network • Total bandwidth is 10 Mbps • When two nodes attempt to use wire at the same time, CSMA reduces the effective speed to ~ 5 Mbps • Add more conversations: network slows further
  • 47. Figure 4.20 One conversation gets all the bandwidth Switched
  • 48. Figure 4.21 Two conversations must share the bandwidth Hubs
  • 49. • Switched Ethernet (Continued) – Switches to the Rescue • Ethernet switch takes advantage of MAC addresses (OSI Data Link layer) • Creates point-to-point connections between two conversing computers • Effectively gives every conversation the full bandwidth of the network • When first turned on, switch copies the source MAC addresses and builds a table of MAC addresses of each computer • Uses the table to create point-to-point connections between each pair of communicating devices
  • 50. Figure 4.22 A switch tracking MAC addresses
  • 51. Figure 4.23 A switch making two separate connections
  • 52. • Switched Ethernet (Continued) – Switches to the Rescue (Continued) • Switch makes CSMA/CD insignificant • Connect switches any way you wish • Commonly connected in a tree organization • No collisions
  • 53. Figure 4.24 Switches are very commonly connected in a tree organization
  • 54. Figure 4.25 Hub (top) and switch (bottom) comparison

Editor's Notes

  • #3: Note: The Historical/Conceptual information on page 59 is not part of the exam, but it will give the students a good background understanding of how Ethernet has evolved. Point this out, and inform them that they will see more changes in Ethernet as technology advances.
  • #6: Tech Tip (top of Page 59) IEEE The source for all things Ethernet is but a short click away on the Internet. For starters, check www.ieee802.org . Note on Page 59: There have been many versions of Ethernet over the years. The earliest versions, named 10Base5 and 10Base2, are long obsolete. As of 2009, CompTIA finally dropped these ancient technologies from the CompTIA Network+ exam. Rest in peace, 10Base5 and 10Base2!
  • #7: Tech Tip (bottom of Page 59) Defining Ethernet Providing a clear and concise definition of Ethernet provides one of the major challenges in teaching networking. The difficulty comes because nobody else has a good definition and Ethernet has changed over the years to incorporate new and improved technology. Here’s a stab at a current definition. Ethernet is a standard for a family of network technologies that share the same basic bus topology, frame type, and network access method. Because the technologies share these essential components, you can communicate between them just fine. The implementation of the network might be different, but the frames remain the same.
  • #8: Note: The evolved Ethernet standards are the dominant network standards.
  • #12: Teaching Tip Briefly ask the students to recall the size and makeup of a MAC address from Chapter 2. They should remember that a MAC address is a 48-bit (6-byte) binary hard-coded address that uniquely identifies each node on a network. It is usually shown in hexadecimal notation, the first six digits are the organizationally unique identifier (OUI), and the last six digits are the device ID.
  • #13: Tip on Page 60: The terms frame and packet are often used interchangeably, especially on exams! This book uses the terms more strictly. You’ll recall from Chapter 2, “Building a Network with OSI,” that frames area based on MAC addresses; packets are generally associated with data assembled by the IP protocol at Layer 3 [Network layer] of the OSI seven-layer model.
  • #14: Tip on Page 61: The CompTIA Network+ exam might describe MAC addresses as 48-bit binary addresses or 6-byte binary addresses. Teaching Tip Cross Check Take time to have the students review what they learned in Chapter 2 about MAC addresses by having them answer the questions in the Cross Check on Page 61: Where does the NIC gets its MAC address? How does the MAC address manifest on the card? At what layer or layers of the OSI seven-layer model does the NIC operate?
  • #15: Note: A node is any NIC connected to an Ethernet network. Note on the bottom of Page 61: There are many situations where one computer might have two or more NICs, so one physical system might have more than one node! Note: There are programs, such as AntiSniff, which network administrators can use to detect sniffers on an Ethernet network.
  • #16: Tip on Page 63: CSMA/CD is a network access method that maps to the IEEE 802.3 standard for Ethernet networks. Note on Page 63: In an Ethernet network, a collision domain is a group of nodes that hear each other’s traffic. A segment is certainly a collision domain, but there are ways to connect segments together to create larger collision domains. If the collision domain gets too large, you’ll start running into traffic problems that manifest as general network sluggishness. That’s one of the reasons to break up networks into smaller groupings.
  • #21: Tip on Page 65: If you ever run into a situation on a 10BaseT or later network in which none of the computers can get on the network, always first check the hub!
  • #22: Note on Page 65: The names of two earlier true bus versions of Ethernet, 10Base5 and 10Base2, gave the maximum length of the bus. 10Base5 networks could be up to 500 meters long, for example, whereas 10Base2 could be almost 200 meters (though in practice topped out at 185 meters).
  • #23: Teaching Tip Cross Check Spend a few minutes having the students answer the
  • #24: Teaching Tip Cross Check Take time to have the students review what they learned about CAT levels in Chapter 3 by having them answer the questions in the Cross Check on Page 66: Could 10BaseT use Cat2? Could it use CAT6? What types of devices can use CAT1?
  • #26: Note on Page 66: The real name for RJ-45 is “8 Position 8 Contact (8P8C) modular plug.” The name RJ-45 is so dominant, however, that nobody but the nerdiest of nerds call it by its real name. Stick to RJ-45.
  • #27: Teaching Tip Although it is stated in the text, be sure to emphasize that in spite of having separate wires for sending and receiving, 10BaseT does not allow for simultaneous send-receive. Rules of CSMA/CD apply. Later versions of Ethernet changed this rule.
  • #30: Tech Tip (Page 67): 568A and 568B An easy trick to remembering the difference between 568A and 568B is the word “GO.” The green and orange pairs are swapped between 568A and 568B, whereas the blue and brown pairs stay in the same place! Tip on Page 67: For the CompTIA Network+ exam, you won’t be tested on the TIA/EIA 568A or B color codes. Just know that they are industry-standard color codes for UTP cabling. Note on bottom of Page 67: 10BaseFL is often just called 10BaseF.
  • #31: Note: It might be a good idea to go ahead and discuss the wiring patterns for the patch, crossover, and straight through CAT5 cables. It would help even more if you could not only show the students how to make a cable, but also allow them to make one. Letting them actually make the cables does more for their understanding. Lab Project 4.2 in the Instructor Manual lists some websites with great instructions – including at least one good video at www.viewdo.com.
  • #33: Note: There are many situations where one computer might have two or more NICs, so one system might have more than one node!
  • #34: Teaching Tip 1000 meters = approximately 6/10 of a mile It might be a good idea to go ahead and discuss the wiring patterns for the patch, crossover, and rollover CAT5 cables. It would help even more if you could not only show the students how to make a cable, but also allow them to make one. Letting them actually make the cables does more for their understanding.
  • #41: Teaching Tip Higher-end hubs do not come with uplink ports. Therefore, crossover cables are the only option for connecting these hubs.
  • #43: Teaching Tip It is easy for students to miss that fact that hubs cannot be arranged in a star. That is, multiple hubs cannot be connected to a central hub.
  • #45: It might be a good idea to go ahead and discuss the wiring patterns for the patch, crossover, and rollover CAT5 cables. It would help even more if you could not only show the students how to make a cable, but also allow them to make one. Letting them actually make cables does more for their understanding.
  • #46: Tech Tip (Page 71) Crossing Crossovers If you mess up your crossover connections, you won’t cause any damage, but the connection will not work. Think about it. If you take a straight cable (that is, not a crossover cable) and try to connect two PCs directly, it won’t work. Both PCs will try to use the same send and receive wires. When you plug the two PCs into a hub, the hub electronically crosses the data wires, so one NIC sends and the other can receive. If you plug a second hub to the first hub using regular ports, you essentially cross the cross and crate a straight connection again between the two PCs! That won’t work. Luckily, nothing gets hurt (except your reputation if one of your colleagues notes your mistake!).
  • #48: Tip on Page 72: The classic difference between a hub and a switch is in the repeating of packets during normal use . Although it’s true that switches initially forward all frames, in regular use they filter by MAC address. Hubs never learn and always forward all frames.
  • #50: Note on Page 73: Because a switch filters traffic on MAC addresses (and MAC addresses run at Layer 2 of the OSI seven-layer model), switches are often called Layer 2 switches .