Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Ethernet: Understanding NICs, Standards, and History, Study notes of Computer Science

An overview of ethernet technology, focusing on network interface cards (nics), definitions, standards, and history. Learn about full duplex data paths, error-detection mechanisms, mac addresses, and the development of ethernet from xerox to the ieee 802 committee. Understand the importance of ethernet frames, manchester encoding, and collision detection.

Typology: Study notes

Pre 2010

Uploaded on 08/04/2009

koofers-user-3ae-1
koofers-user-3ae-1 🇺🇸

10 documents

1 / 10

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Ethernet: Definitions and Standards
Networking Equipment Terminology
Network Interface Card
Network interface card is also frequently called a NIC. Currently, the most common types of NIC used in the
home and office are Ethernet and wireless Ethernet cards.
The link light signifies that the NIC card has successfully detected a device on the other end of the cable. This
indicates that you are using the correct type of cable and that the duplex has been negotiated correctly between
the devices at both ends.
Full duplex data paths have the capability of allowing the simultaneous sending and receiving of data. Half
duplex data paths can transmit in both directions too, but in only one direction at a time.
Error-detection and data-retransmission mechanisms ensure that the data reaches the destination correctly and
are specifically designed to remedy data corruption caused when multiple devices start transmitting at the same
time.
Most modern network cards can autonegotiate duplex with the device on the other end of the wire (802.3ae), if
it is plugged into a switch.
Media Access Control (MAC) Address
The media access control (MAC) address can be equated to the serial number of the NIC. Every IP packet is
sent out of your NIC wrapped inside an Ethernet frame that uses MAC addresses to direct traffic on your locally
attached network.
The MAC Address is a 6 byte field burned into the Ethernet chip on the NIC card by the manufacturer –
represented as 12 hexadecimal digits. The first 3 bytes (6 hex numbers) represent the manufacturer.
MAC addresses have significance only on the locally attached network. As the packet hops across the Internet,
its source/destination IP address stays the same, but the MAC addresses are reassigned by each router on the
way using a process called ARP.
Frame Type
Each LAN Protocol has it’s own data format called a “frame”. The standards for each protocols are defined
with the standard specification for the protocol.
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download Ethernet: Understanding NICs, Standards, and History and more Study notes Computer Science in PDF only on Docsity!

Ethernet: Definitions and Standards

Networking Equipment Terminology

Network Interface Card Network interface card is also frequently called a NIC. Currently, the most common types of NIC used in the home and office are Ethernet and wireless Ethernet cards. The link light signifies that the NIC card has successfully detected a device on the other end of the cable. This indicates that you are using the correct type of cable and that the duplex has been negotiated correctly between the devices at both ends. Full duplex data paths have the capability of allowing the simultaneous sending and receiving of data. Half duplex data paths can transmit in both directions too, but in only one direction at a time. Error-detection and data-retransmission mechanisms ensure that the data reaches the destination correctly and are specifically designed to remedy data corruption caused when multiple devices start transmitting at the same time. Most modern network cards can autonegotiate duplex with the device on the other end of the wire (802.3ae), if it is plugged into a switch. Media Access Control (MAC) Address The media access control (MAC) address can be equated to the serial number of the NIC. Every IP packet is sent out of your NIC wrapped inside an Ethernet frame that uses MAC addresses to direct traffic on your locally attached network. The MAC Address is a 6 byte field burned into the Ethernet chip on the NIC card by the manufacturer – represented as 12 hexadecimal digits. The first 3 bytes (6 hex numbers) represent the manufacturer. MAC addresses have significance only on the locally attached network. As the packet hops across the Internet, its source/destination IP address stays the same, but the MAC addresses are reassigned by each router on the way using a process called ARP. Frame Type Each LAN Protocol has it’s own data format called a “frame”. The standards for each protocols are defined with the standard specification for the protocol.

History

The early development of Ethernet was done by Xerox research. The name "Ethernet" was a registered trademark of Xerox Corporation. Ethernet from this period is often called DIX after its corporate sponsors Digital, Intel, and Xerox. As the holder of the trademark, Xerox established and published the standards. The technology was refined and a second generation called Ethernet II was widely used. The IEEE was assigned the task of developing formal international standards for all Local Area Network technology. The "802" committee was formed to look at Ethernet, Token Ring, Fiber Optic, and other LAN technology. The objective of the project was not just to standardize each LAN individually, but also to establish rules that would be global to all types of LANs so that data could easily move from Ethernet to Token Ring or Fiber Optics. This larger view created conflicts with the existing practice under the old Xerox DIX system. The IEEE was careful to separate the new and old rules. It recognized that there would be a period when old DIX messages and new IEEE 802 messages would have to coexist on the same LAN. It published a set of standards of which the most important are: 802.2 - The new message format for data on any LAN 802.3 - Hardware standards for Ethernet cards and cables 802.4 – Hardware standards Token Bus cards and cables 802.5 - Hardware standards for Token Ring cards and cables 802.11 – Wireless LAN Technologies The 802.3 standard further refined the electrical connection to the Ethernet. Today all Ethernet NICs cards conform to this standard. The TCP/IP protocol used by the Internet refused to change. Internet standards are managed by the IETF group, and they decided to stick with the old DIX message format. IBM implemented SNA over LAN until after the 802 committee released its standards, then rigorously implemented the 802 rules for everything except TCP/IP where the IETF rules take precedence. This means that NETBEUI (the format for NETBIOS on the LAN) and SNA obey the 802 conventions. The old DIX rules for message format persist for some uses (Internet, DECNET, some Novell). The new 802 rules apply to other traffic (SNA, NETBEUI). The most pressing problem is to make sure that Novell clients and servers are configured to use the same frame format.

Note that signal transitions do not always occur at the 'bit boundaries' (the division between one bit and another), but that there is always a transition at the centre of each bit.The encoding may be alternatively viewed as a phase encoding where each bit is encoded by a postive 90 degree phase transition, or a negative 90 degree phase transition. The Manchester code is therefore sometimes known as a Biphase Code. A Manchester encoded signal contains frequent level transitions which allow the receiver to extract the clock signal using a Digital Phase Locked Loop (DPLL) and correctly decode the value and timing of each bit. To allow reliable operation using a DPLL, the transmitted bit stream must contain a high density of bit transitions. Manchester encoding ensures this, allowing the receiving DPLL to correctly extract the clock signal. This is implemented in Ethernet using a 1-byte Start flag “0x7E: and a “preamble” consisting of 7 bytes of alternating one’s and zeroes ahead of the MAC Destination Address. The start field and preamble are typically not seen in LAN traces which show only Layer 2 data or above. Bi-phase Manchester encoding consumes up to approximately twice the bandwidth of the original signal ( MHz). This is the penalty for introducing frequent transitions. For a 10 Mbps LAN, the signal spectrum lies between the 5 and 20 MHz. Manchester encoding is used as the physical layer of an Ethernet LAN, where the additional bandwidth is not a significant issue for coaxial cable transmission The limited bandwidth of CAT5e cable necessitated a more efficient encoding method for 100 Mbps transmission using a 4b/5b MLT code. This uses three signal levels (instead of the two levels used in Manchester encoding) and therfore allows a 100 Mbps signal to occupy only 31 MHz of bandwidth. Gigabit Ethernet utilises five levels and 8b/10b encoding, to provide even more efficient use of the limited cable bandwidth, sending 1 Gbps within 100 MHz of bandwidth. A transmission rate of 10 Mbps implies that each bit is sent in 0.1 microseconds. For a coaxial cable, the speed at which the signal travels along the cable is approximately 0.77 times the speed of light (i.e. 0.77x3x10E8). A bit therefore occupies 23 metres of cable. Under the same conditions the smallest frame would be 13.3 km! If you wish to do the same calculation for a twisted pair cable, you would have to take into consideration that the propagation speed is slower at 1.77x10E8 (0.59c). Increasing the bit rate, for example using 100BTx, decreases the time available to send each bit into the wire, but does not change the speed at which the edge of the bits travel through the cable!

Access Method Computers wait until the line (media) is clear before transmitting and then send their data while comparing what they wanted to send with what they actually sent on the cable as a means of error detection using a mathematical comparison, technique called cyclic redundancy check (CRC). Any detected differences between the two, the server assumes that it transmitted data simultaneously with another server on the cable. It waits some (pseudo) random time and retransmit at some later stage when the line was clear again. The "Multiple Access" part means that every station is connected to a single copper wire (or a set of wires that are connected together to form a single data path). The "Carrier Sense" part says that before transmitting data, a station checks the wire to see if any other station is already sending something. If the LAN appears to be idle, then the station can begin to send data. Transmitting data only after first sensing whether the cable, which was strung between multiple devices, had the correct signaling levels is a methodology called carrier sense, multiple access or CSMA. The ability to detect garbling due to simultaneous data transmissions, also known as collisions, is called collision detect or CD. Together this access mechanism is referred to as CSMA/CD. This stands for "Carrier Sense, Multiple Access/ Collision Detect". An Ethernet station sends data at a rate of 10 megabits per second (base speed). That bit allows 100 nanoseconds per bit. Light and electricity travel about one foot in a nanosecond. Therefore, after the electric signal for the first bit has traveled about 100 feet down the wire, the station has begun to send the second bit. If two stations are located, say, 250 feet apart on the same cable, and both begin transmitting at the same time, then they will be in the middle of the third bit before the signal from each reaches the other station. This explains the need for the "Collision Detect" part. Two stations can begin to send data at the same time, and their signals will "collide" nanoseconds later. When such a collision occurs, the two stations stop transmitting, "back off", and try again later after a randomly chosen delay period. The 802.11 specifications defining many wireless Ethernet technologies are another example of commonly used layer 1 and 2 components of the OSI model uses a broadcast machanism called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) where the “random” access comes first instead of after a collison.

Ethernet Frame Formats - OSI Layer 2

Ethernet frames are defined at OSI layer 2. A block of data transmitted on the Ethernet is called a "frame." The first 12 bytes of every frame contain the 6 byte destination address (the recipient) and a 6 byte source address (the sender). Each Ethernet adapter card comes with a unique factory installed address (the "universally administered address"). Use of this hardware address guarantees a unique identity to each card. The PC software (in PROTOCOL.INI or NET.CFG) can be configured to substitute a different address number that the “burned-in” AMC, called a "locally administered address." The source address field of each frame must contain the unique address (universal or local) assigned to the sending card. The destination field can contain a "multicast" address representing a group of workstations with some common characteristic. A Novell client may broadcast a request to identify all Netware servers on the LAN, while a Microsoft or IBM client machine broadcasts a query to all machines supporting NETBIOS to find a particular server or domain. In normal operation, an Ethernet adapter will receive only frames with a destination address that matches its unique address, or destination addresses that represent a multicast message. However, most Ethernet adapters can be set into "promiscuous" mode where they receive all frames that appear on the LAN. If this poses a security problem, a new generation of smart hub devices can filter out all frames with private destination addresses belonging to another station. There are three common conventions for the format of the remainder of the frame:

  1. Ethernet II or DIX
  2. IEEE 802.3 and 802.
  3. SNAP Ethernet II or DIX================== Data direction Before the development of international standards, Xerox administered the Ethernet conventions. As each vendor developed a protocol, a two byte Type code was assigned by Xerox to identify it. Codes were given out to XNS (the Xerox own protocol), DECNET, IP, and Novell IPX. Since short Ethernet frames must be padded with zeros to a length of 64 bytes, each of these higher level protocols required either a larger minimum message size or an internal length field that can be used to distinguish data from padding. Type field values of particular note include: 0x0600 XNS (Xerox) 0x0800 IP (the Internet protocol) 0x6003 DECNET

IEEE 802.3 and 802. The IEEE 802 committee was charged to develop protocols that could operate the same way across all LAN media.  ================== Data direction To allow collision detect, the 10 megabit Ethernet requires a minimum packet size of 64 bytes (512) bytes. Any shorter message must be padded with zeros. The requirement to pad messages is unique to Ethernet and does not apply to any other LAN media. In order for Ethernet to be interchangeable with other types of LANs, it would have to provide a length field to distinguish significant data from padding. The DIX standard did not need a length field because the vendor protocols that used it (XNS, DECNET, IPX, IP) all had their own length fields. However, the 802 committee needed a standard that did not depend on the good behavior of other programs. The 802.3 standard therefore replaced the two byte type field with a two byte length field. Xerox had not assigned any important types to have a decimal value below 1500. Since the maximum size of a packet on Ethernet is 1500 bytes, there was no conflict or overlap between DIX and 802 standards. Any Ethernet packet with a type/length field less than 1500 is in 802.3 format (with a length) while any packet in which the field value is greater than 1500 must be in DIX format (with a type). The 802 committee then created a new field to substitute for Type. The 802.2 header follows the 802.3 header The 802.2 header is three bytes long for control packets or the kind of connectionless data sent by all the old DIX protocols. A four byte header is defined for connection oriented data, which refers primarily to SNA and NETBEUI. The first two bytes identify the SAP. Even with hindsight it is not clear exactly what the IEEE expected this field to be used for. In current use, the two SAP fields are set to 0x0404 for SNA and 0xF0F0 for NETBEUI. 0x0A0A for LLC2.. SNAP The IEEE left all the other protocols in a confusing situation. They did not need any new services and did not benefit from the change. Furthermore, a one byte SAP could not substitute for the two byte type field. Yet 802. was an International Standard, and that has the force of law in many areas. The compromise was to create a special version of the 802.2 header that conformed to the standard but actually repackaged the old DIX conventions.

Local Area Network Connectivity When a DCE (hub or switch) connects to a DTE(workstation ), a straight-through cable is used. DCEs connected to DCEs or DTEs connected to DTEs require crossover cables. This terminology is generally used with Ethernet cables. A straight-through Ethernet cable is easy to identify. Hold the connectors side by side, pointing in the same direction with the clips facing away from you. The color of the wire in position #1 on connector #1 should be the same as that of position #1 on connector #2. The same would go for positions #2 through #8, that is, the same color for corresponding wires on each end. A crossover cable has them mixed up. Table 2-3 provides some good rules of thumb. Cabling Rules of Thumb Scenario Likely Cable Type PC to PC Crossover Hub to hub Crossover Switch to switch Crossover PC to modem Straight-Through PC to hub Straight-Through PC to switch Straight-Through Some manufacturers configure the Ethernet ports of their networking equipment to be either of the DTE or the DCE type, and other manufacturers have designed their equipment to flip automatically between the two types until it gets a good link (autoMDIX); making cable selection unecessary. As you can see, confusion can arise when selecting a cable. If you fail to get a link light when connecting your Ethernet devices together, try using the other type of cable. Note that any device that functions an OSI Layer 3 only (router) or above (firewall etc), is a DTE for LAN connectivity purposes. These terms are often confused:  A repeater (Layer 1 device) receives and then immediately retransmits each bit. It has no memory and does not depend on any particular protocol. It duplicates everything, including the collisions.  A bridge (Layer 2 device) receives the entire message into memory. If the message was damaged by a collision or noise, then it is discarded. If the bridge knows that the message was being sent between two stations on the same cable, then it discards it. Otherwise, the message is queued up and will be retransmitted on another Ethernet cable. The bridge has no address. Its actions are transparent to the client and server workstations.  A router (Layer 3 device) acts as an agent to receive and forward messages. The router has an IP address and is known to the client or server machines. Typically, machines directly send messages to each other when they are on the same cable, and they send the router messages addressed to another zone, department, or subnetwork. Routing is a function specific to each protocol.