Ethernet
Hi students! š Welcome to our deep dive into Ethernet - the backbone of modern computer networking! In this lesson, we'll explore how Ethernet has evolved from a simple collision-prone system to the sophisticated switching technology that powers today's internet. By the end of this lesson, you'll understand Ethernet's frame structure, MAC addressing system, and the fundamental differences between collision detection and full duplex operation. Get ready to discover why Ethernet became the dominant networking standard that connects billions of devices worldwide! š
The Evolution of Ethernet: From Humble Beginnings to Global Dominance
Ethernet didn't start as the networking giant we know today. Back in 1973, Robert Metcalfe at Xerox developed the first version of Ethernet to connect computers in their research facility. The original Ethernet operated at just 2.94 Mbps - that's about 1000 times slower than today's Gigabit Ethernet!
The technology got its name from the "luminiferous ether," an old physics concept that described how light waves traveled through space. Metcalfe thought data would travel through cables in a similar way. The first commercial Ethernet standard, IEEE 802.3, was released in 1983 and operated at 10 Mbps using thick coaxial cables.
Here's how Ethernet speeds have evolved over the decades:
- 1983: 10 Mbps (10BASE-T)
- 1995: 100 Mbps (Fast Ethernet)
- 1999: 1 Gbps (Gigabit Ethernet)
- 2002: 10 Gbps
- 2010: 40/100 Gbps
- 2017: 200/400 Gbps
Today, Ethernet is used in over 85% of all local area networks worldwide, making it the most successful networking technology in history! š
Understanding Ethernet Frame Structure: The Building Blocks of Communication
Think of an Ethernet frame like a carefully packaged letter š®. Just as your letter needs an envelope with addresses and postage, data traveling over Ethernet needs specific formatting to reach its destination successfully.
An Ethernet frame consists of several key components:
Preamble (7 bytes): This is like a "wake up call" for receiving devices. It consists of alternating 1s and 0s (10101010...) that help synchronize the receiver's clock with the incoming data.
Start Frame Delimiter (1 byte): This marks the actual beginning of the frame with the pattern 10101011, signaling "here comes the real data!"
Destination MAC Address (6 bytes): This specifies exactly which device should receive the frame. It's like the "To:" address on your envelope.
Source MAC Address (6 bytes): This identifies the sending device, similar to the return address on mail.
Length/Type Field (2 bytes): This indicates either the length of the data field or the type of protocol being used (like IPv4 or IPv6).
Data Field (46-1500 bytes): This contains the actual information being transmitted. If your data is less than 46 bytes, padding is added to meet the minimum frame size requirement.
Frame Check Sequence (4 bytes): This is like a security seal that helps detect transmission errors using a mathematical calculation called CRC (Cyclic Redundancy Check).
The total frame size ranges from 64 to 1518 bytes. Why these specific limits? The minimum size ensures collision detection works properly, while the maximum prevents any single device from monopolizing the network for too long.
MAC Addresses: The Unique Fingerprints of Network Devices
Every network device has a unique identifier called a MAC (Media Access Control) address, which is like a fingerprint that never changes š. MAC addresses are 48-bit numbers typically written in hexadecimal format, like 00:1B:44:11:3A:B7.
Here's what makes MAC addresses special:
- Globally Unique: No two devices should ever have the same MAC address
- Burned-in: The address is typically set by the manufacturer and stored in the device's hardware
- Organizationally Unique Identifier (OUI): The first 24 bits identify the manufacturer
- Device Identifier: The last 24 bits uniquely identify the specific device
For example, if you see a MAC address starting with 00:1B:44, you know it was manufactured by Apple! Major manufacturers are assigned these OUI blocks by the IEEE Registration Authority. This system ensures that every network card, whether in your laptop, smartphone, or smart TV, has its own unique identity.
MAC addresses operate at Layer 2 (Data Link Layer) of the OSI model, which means they're used for communication within the same network segment. When data needs to travel beyond your local network, routers use IP addresses instead.
Switching Fundamentals: The Traffic Directors of Modern Networks
Modern Ethernet networks rely on switches - intelligent devices that have revolutionized how data flows through networks š¦. Unlike the old hub-based systems where all devices shared the same collision domain, switches create separate collision domains for each port.
How Switches Learn and Forward:
- Learning Phase: When a switch first starts up, its MAC address table is empty. As frames arrive, the switch examines the source MAC address and associates it with the port it came from.
- Forwarding Decision: When a frame arrives with a destination MAC address, the switch checks its table:
- If the address is known, it forwards the frame only to that specific port
- If unknown, it floods the frame to all ports (except the source port)
- If the destination is the same port as the source, it drops the frame
- Table Aging: Entries in the MAC address table have a timer (typically 300 seconds). If no frames are received from a MAC address within this time, the entry is removed.
Benefits of Switching:
- Collision Elimination: Each port operates in its own collision domain
- Full Duplex Communication: Devices can send and receive simultaneously
- Bandwidth Multiplication: Each port gets the full bandwidth of the link
- Improved Security: Frames are only sent where needed, reducing eavesdropping opportunities
Today's enterprise switches can handle millions of MAC addresses and make forwarding decisions in microseconds!
Collision Detection vs Full Duplex: From Chaos to Harmony
Understanding the difference between collision detection and full duplex operation is crucial for grasping how Ethernet evolved from a chaotic shared medium to an organized, efficient system.
Half Duplex and CSMA/CD (Collision Detection):
In early Ethernet networks using hubs, all devices shared the same wire, creating a single collision domain. This required a protocol called CSMA/CD (Carrier Sense Multiple Access with Collision Detection):
- Carrier Sense: Before transmitting, a device listens to see if the medium is busy
- Multiple Access: Multiple devices can attempt to access the medium
- Collision Detection: If two devices transmit simultaneously, a collision occurs
- Backoff Algorithm: After detecting a collision, devices wait a random amount of time before retrying
The collision detection process works like this: when transmitting, a device simultaneously monitors the wire. If the signal it receives differs from what it's sending, a collision has occurred. The device then sends a jam signal to notify all stations and implements an exponential backoff algorithm.
Full Duplex Operation:
Modern switched Ethernet operates in full duplex mode, which is like having separate lanes for traffic going in each direction on a highway š£ļø:
- Simultaneous Communication: Devices can send and receive data at the same time
- No Collisions: Since each link is point-to-point, collisions are impossible
- Doubled Throughput: Effective bandwidth is doubled (100 Mbps becomes 200 Mbps of total throughput)
- Flow Control: Pause frames can be sent to temporarily stop transmission if buffers become full
The transition from half duplex to full duplex operation represents one of the most significant improvements in Ethernet technology, essentially doubling network capacity while eliminating the unpredictability of collision-based systems.
Conclusion
Ethernet has transformed from a simple 2.94 Mbps experimental technology into the foundation of modern networking, supporting speeds up to 400 Gbps and beyond. We've explored how Ethernet frames provide structured communication through carefully designed headers and trailers, how MAC addresses serve as unique device identifiers enabling precise data delivery, and how switching technology revolutionized networks by eliminating collisions and enabling full duplex communication. The evolution from collision-prone shared media to intelligent switched networks represents one of the greatest success stories in computer networking, making Ethernet the dominant LAN technology that connects our digital world.
Study Notes
⢠Ethernet Evolution: Started at 2.94 Mbps (1973), standardized at 10 Mbps (1983), now supports up to 400+ Gbps
⢠Frame Structure: Preamble (7B) + SFD (1B) + Dest MAC (6B) + Source MAC (6B) + Length/Type (2B) + Data (46-1500B) + FCS (4B)
⢠Frame Size Limits: Minimum 64 bytes, Maximum 1518 bytes
⢠MAC Address Format: 48-bit address in hexadecimal (XX:XX:XX:XX:XX:XX)
⢠OUI (Organizationally Unique Identifier): First 24 bits identify manufacturer
⢠Switch Learning: Builds MAC address table by examining source addresses of incoming frames
⢠Switch Forwarding: Known unicast (forward to specific port), Unknown unicast (flood), Same port (drop)
⢠MAC Table Aging: Entries typically expire after 300 seconds of inactivity
⢠CSMA/CD: Carrier Sense Multiple Access with Collision Detection (half duplex operation)
⢠Collision Domain: All devices sharing the same collision detection mechanism
⢠Full Duplex Benefits: Simultaneous send/receive, no collisions, doubled effective throughput
⢠Flow Control: Pause frames prevent buffer overflow in full duplex links
⢠Market Dominance: Ethernet used in 85%+ of all local area networks worldwide
