0% found this document useful (0 votes)
214 views3 pages

IEEE Standards

IEEE 802.3 defines Ethernet standards including variants that use different cabling such as coaxial cable, twisted pair, and fiber optic cables. Ethernet frames include fields for preamble, destination and source addresses, length, data, padding, and CRC. Switched Ethernet replaces hubs with switches to improve performance.

Uploaded by

Ishan Choubey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
214 views3 pages

IEEE Standards

IEEE 802.3 defines Ethernet standards including variants that use different cabling such as coaxial cable, twisted pair, and fiber optic cables. Ethernet frames include fields for preamble, destination and source addresses, length, data, padding, and CRC. Switched Ethernet replaces hubs with switches to improve performance.

Uploaded by

Ishan Choubey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

IEEE Standards into the cable to the core.

Here, 10 is the
Ethernet is a set of technologies and protocols that maximum throughput, i.e. 10 Mbps, BASE
are used primarily in LANs. It was first denoted use of baseband transmission, and 5 refers
standardized in 1980s as IEEE 802.3 standard. to the maximum segment length of 500m.
Ethernet is classified into two categories: classic
Ethernet and switched Ethernet. IEEE 802.3a: This gave the standard for thin coax
Classic Ethernet is the original form of Ethernet (10BASE-2), which is a thinner variety where the
that provides data rates between 3 to 10 Mbps. segments of coaxial cables are connected by BNC
The varieties are commonly referred as 10BASE- connectors. The 2 refers to the maximum segment
X. Here, 10 is the maximum throughput, i.e., 10 length of about 200m
Mbps, BASE denoted use of baseband
transmission, and X is the type of medium used. IEEE 802.3i: This gave the standard for twisted
The common varieties of classic Ethernet are – pair (10BASE-T) that uses unshielded twisted pair
(UTP) copper wires as physical layer medium.
Thick coax (10BASE-5): This was the original The further variations were given by IEEE 802.3u
version that used a single coaxial cable into which for 100BASE-TX, 100BASE-T4 and 100BASE-
a connection can be tapped by drilling into the FX.
cable to the core. The 5 refers to the maximum
segment length of 500m. IEEE 802.3i: This gave the standard for Ethernet
over Fiber (10BASE-F) that uses fiber optic
Thin coax (10BASE-2): This is a thinner variety cables as medium of transmission.
where segments of coaxial cables are connected
by BNC connectors. The 2 refers to the maximum Frame Format of IEEE 802.3
segment length of about 200m The main fields of a frame of classic Ethernet are -

Twisted pair (10BASE-T): This uses unshielded Preamble: It is a 7 bytes starting field that
twisted pair copper wires as physical layer provides alert and timing pulse for
medium. transmission.

Ethernet over Fibre (10BASE-F): This uses fibre Start of Frame Delimiter: It is a 1 byte field
optic cables as medium of transmission that contains an alternating pattern of ones and
zeros ending with two ones.
In switched Ethernet, the hub connecting the
stations of the classic Ethernet is replaced by a Destination Address: It is a 6 byte field
switch. containing physical address of destination
stations.
1. 802.3
IEEE 802.3 is a set of standards and protocols that Source Address: It is a 6 byte field containing
define Ethernet-based networks. IEEE 802.3 the physical address of the sending station.
defines the physical layer and the medium access
Length: It a 7 bytes field that stores the
control (MAC) sub-layer of the data link layer for
wired Ethernet networks. number of bytes in the data field.

IEEE 802.3 Popular Versions Data: This is a variable sized field carries the
IEEE 802.3: This was the original standard given data from the upper layers. The maximum size
for 10BASE-5. It used a thick single coaxial cable of data field is 1500 bytes.
into which a connection can be tapped by drilling
Padding: This is added to the data to bring its Whenever a station wants to transmit a frame, it
length to the minimum requirement of 46 inverts a single bit of the 3-byte token, which
bytes. instantaneously changes it into a normal data
packet appends the information that it wants to
CRC: CRC stands for cyclic redundancy check. It
transmit, and sends this information to the next
contains the error detection information.
station on the ring. Since only one station can
possess the token and transmit data at any given
time, there are no collisions.

Bridges:
Bridges are a data link layer device and can
connect to different networks as well as
connect different networks of different types.
Bridges from 802.x to 802.y where x & y may
both be ethernet or one can be ethernet and
other may be token ring, etc. It locally
connects small LANs, whereas if LANs are big
2. 802.4
then bridges can no longer handle them.
Token Bus (IEEE 802.4) is a standard for Bridges need not to be configured they are plug-
implementing token ring over the virtual ring in and-play and self-learning devices. At the physical
LANs level the bridge boosts the signal strength like a
Frame Format of Token Bus repeater or completely regenerates the signal.

The frame format is given by the following A bridge stores the hardware addresses observed
diagram − from frames received by each interface and uses
this information to learn which frames need to be
forwarded by the bridge. Bridge follows a
protocol in IEEE format execute 802.1 which is a
spanning tree of bridges.
Uses of Bridges
The main uses of bridges are –
Bridges are used to divide large busy networks
into multiple smaller and interconnected networks
to improve performance.
3. 802.5 (Token Ring Network)
Bridges also can increase the physical size of a
In a token ring, a special bit pattern, known as a network.
token, circulates around the ring when all the Bridges are also used to connect a LAN segment
stations are idle. The principle used in the token through a synchronous modem relation to another
LAN segment at a remote area.
ring network is that a token is circulating in the
ring, and whichever node grabs that token will  Spanning Tree Protocol
have the right to transmit the data. Since the token The spanning tree protocol is also known as STP.
rotates in the ring, it is guaranteed that every node It is a protocol that monitors the overall
gets the token within some specified time. performance of the network. The main task of the
spanning tree protocol is to remove the redundant  Router
link. tends to solve the problems when the The router is a physical or virtual internetworking
device that is designed to receive, analyze, and
computers use the shared telecommunications
forward data packets between computer networks.
paths on a local area network. When they share A router examines a destination IP address of a
the common path, if all the computers send the given data packet, and it uses the headers and
data simultaneously, it affects the overall network forwarding tables to decide the best way to
performance and brings all the network traffic transfer the packets. A router works on the third
layer of the OSI model, and it is based on the IP
near a halt.
address of a computer.
The spanning tree protocol (STP) overcomes this
situation by using the concept of bridge looping. Features of Router
Bridge looping is used when there are multiple
o A router works on the 3rd layer (Network
connections between the two endpoints, and
Layer) of the OSI model, and it is able to
messages are sent continuously, which leads to the
communicate with its adjacent devices
flooding of the network. To remove the looping,
STP divides the LAN network into two or more with the help of IP addresses and subnet.
segments with the help of a device known as o A router provides high-speed internet
bridges. The bridge is used to connect the two connectivity with the different types of
segments so when the message is sent, the ports like gigabit, fast-Ethernet, and STM
message is passed through the bridge to reach the link port.
intended destination. The bridge determines o It allows the users to configure the port as
whether the message is for the same segment or a per their requirements in the network.
different segment, and it works accordingly. This
o Routers' main components are central
network segmentation greatly reduces the chances
processing unit (CPU), flash memory,
of a network coming to a halt.
RAM, Non-Volatile RAM, console,
 Remote Bridge network, and interface card.
o Routers are capable of routing the traffic in
Remote Bridge is a bridge that connects two
geographically separated networks by using a a large networking system by considering
telecommunications service such as Plain Old the sub-network as an intact network.
Telephone Service (POTS), leased lines, or a
o Routers filter out the unwanted
circuit-switched service. A remote bridge has at
least one local area network (LAN) port for an interference, as well as carry out the data
unshielded twisted-pair (UTP) LAN connection to encapsulation and decapsulation process.
a switch or a hub and at least one serial port. The o Routers provide the redundancy as it
serial port is synchronous for digital lines or always works in master and slave mode.
asynchronous for modems.
o It allows the users to connect several LAN
and WAN.
Internetworking Device
o Furthermore, a router creates various paths
An internetworking device is a widely-used term to forward the data.
for any hardware within networks that connect
different network resources. Key devices that
comprise a network are routers, bridges, repeaters
and gateways

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy