Question:
what is ethernet?
1970-01-01 00:00:00 UTC
what is ethernet?
Fifteen answers:
chandu d
2006-06-22 04:36:25 UTC
Ethernet is interface that physically connects another systems.
2014-12-18 18:01:25 UTC
the best trading software http://tradingsolution.info

i have attended a lot of seminars, read counless books on forex trading and it all cost me thousands of dollars. the worst thing was i blew up my first account. after that i opened another account and the same thing happened again. i started to wonder why i couldn,t make any money in forex trading. at first i thought i knew everything about trading. finally i found that the main problem i have was i did not have the right mental in trading. as we know that psychology has great impact on our trading result. apart from psychology issue, there is another problem that we have to address. they are money management, market analysis, and entry/exit rules. to me money management is important in trading. i opened another account and start to trade profitably after i learnt from my past mistake. i don't trade emotionally anymore.

if you are serious about trading you need to address your weakness and try to fix it. no forex guru can make you Professional trader unless you want to learn from your mistake.
layla
2006-06-22 04:16:49 UTC
A trademark for a LAN protocol.

n : a type of networking technology for local area networks; coaxial cable carries radio frequency signals between computers at a rate of 10 megabits per second
doable_rods
2006-06-22 04:12:00 UTC
Boyfriend of Internet.....
goodbye
2006-06-22 04:11:57 UTC
Ethernet is the most widely installed local network technology. It was first created by Xerox.
gentle_cute_man
2006-06-22 04:11:47 UTC
Ethernet is the network card and software which enables one computer to be connected to another thru network.
?
2006-06-22 04:11:40 UTC
I want to learn the awnser to this one too!!
2006-06-22 04:11:21 UTC
Ethernet is a PROTOCOL.



it describes the rules for talking on a net... down to physical specs and packet and frame contents.
2006-06-22 04:10:19 UTC
Local Area Network (LAN) system.
2006-06-22 04:10:47 UTC
Ethernet is a large and diverse family of frame-based computer networking technologies for local area networks (LANs). The name comes from the physical concept of the ether. It defines a number of wiring and signaling standards for the physical layer, two means of network access at the Media Access Control (MAC)/data link layer, and a common addressing format.



Ethernet has been standardized as IEEE 802.3. Its star-topology, twisted-pair wiring form became the most widespread LAN technology in use from the 1990s to the present, largely replacing competing LAN standards such as Coaxial-cable Ethernet, Token Ring, FDDI, and ARCNET. The primary competitor to Ethernet in the Local Area Network market of the present is WiFi, the wireless LAN standardized by IEEE 802.11.



Ethernet was originally developed as one of the many pioneering projects at Xerox PARC. A common story states that Ethernet was invented in 1972, when Robert Metcalfe wrote a memo to his bosses at PARC about Ethernet's potential. But Metcalfe claims Ethernet was actually invented over a period of several years. In 1976, Metcalfe and his assistant David Boggs published a paper titled Ethernet: Distributed Packet-Switching For Local Computer Networks.
2006-06-22 04:11:42 UTC
Ethernet is a frame-based computer networking technology for local area networks (LANs). The name comes from the physical concept of ether. ... is claimed that some older (Xerox?) Ethernet specification had a 16-bit length field, although the ... AppleTalk protocol suite on Ethernet ***NOT FOR ADVERTISING****Yahoo answers....
2015-01-24 14:20:18 UTC
Binary options let users trade in currency pairs and stocks for various predetermined time-periods, minimal of which is 30 seconds. Executing trades is straightforward. The system uses user-friendly interfaces, which even an 8 years old kid, can operate without having to read any instructions. But winning trades is Not easy.

Binary trading is advertised as the only genuine system that lets users earn preposterous amounts of money in ridiculously short period of time. Advertisers try to implicate as if you can make $350 every 60 seconds; if it was true then binary trading would truly be an astonishing business.

However, does it make any sense? Can every trader make tons of money in binary trading? Who is actually paying all the money or the profit to traders?

The first challenge is finding a trustworthy binary broker; secondly, you need to find a binary trading strategy, which you can use to make profits consistently. Without an effective trading strategy, there is no way you can make money in this business.

Learning a profitable trading strategy is possible, You should watch this presentation video https://tr.im/03f02

It's probably the best way to learn how to win with binary option
Matthew
2015-09-17 00:09:13 UTC
Ethernet is a standard communications protocol embedded in software and hardware devices, intended for building a local area network (LAN).
?
2014-10-03 20:19:49 UTC
I'm making good profit with a binary option signal software called "autobinary signal". It's great!! Check here for more information ( http://forexsignal.kyma.info )
Jeff J
2006-06-22 04:13:23 UTC
Ethernet

From Wikipedia, the free encyclopedia

Jump to: navigation, search

Internet protocol suite Layer Protocols

Application DNS, TLS/SSL, TFTP, FTP, HTTP, IMAP, IRC, NNTP, POP3, SIP, SMTP, SNMP, SSH, TELNET, BitTorrent, RTP, rlogin, …

Transport TCP, UDP, DCCP, SCTP, IL, RUDP, …

Network IP (IPv4, IPv6), ICMP, IGMP, ARP, RARP, …

Link Ethernet, Wi-Fi, Token ring, PPP, SLIP, FDDI, ATM, DTM, Frame Relay, SMDS, …

Ethernet is a large and diverse family of frame-based computer networking technologies for local area networks (LANs). The name comes from the physical concept of the ether. It defines a number of wiring and signaling standards for the physical layer, two means of network access at the Media Access Control (MAC)/data link layer, and a common addressing format.



Ethernet has been standardized as IEEE 802.3. Its star-topology, twisted-pair wiring form became the most widespread LAN technology in use from the 1990s to the present, largely replacing competing LAN standards such as Coaxial-cable Ethernet, Token Ring, FDDI, and ARCNET. The primary competitor to Ethernet in the Local Area Network market of the present is WiFi, the wireless LAN standardized by IEEE 802.11.



Contents [hide]

1 General description

2 Physical layer

3 Dealing with multiple users

3.1 CSMA/CD shared medium Ethernet

3.2 Ethernet repeaters and hubs

3.3 Bridging and Switching

3.4 Dual speed hubs

3.5 More advanced networks

4 Autonegotiation

5 Ethernet frame types and the EtherType field

6 Varieties of Ethernet

7 History

8 Related standards

9 See also

10 Implementations

11 References

12 External links







[edit]

General description



A 1990s Ethernet network interface card. This is a combo card that supports both coaxial-based 10BASE2 (BNC connector, left) and Twisted-pair-based 10BASE-T (RJ-45 connector, right).Ethernet was originally based on the idea of computers communicating over a shared coaxial cable acting as a broadcast transmission medium. The methods used show some similarities to radio systems (though there are major differences, like the fact that it is much easier to detect collisions in a cable broadcast system than a radio broadcast). The common cable providing the communication channel was likened to the ether (a reference to the luminiferous ether) and it was from this reference that the name 'Ethernet' was derived.



From this early and comparatively simple concept Ethernet evolved into the complex networking technology that today powers the vast majority of local computer networks. The coaxial cable was later replaced with point-to-point links connected together by hubs and/or switches in order to reduce installation costs, increase reliability, and enable point-to-point management and troubleshooting. StarLAN was the first step in the evolution of Ethernet from a coaxial cable bus to a hub-managed, twisted pair network. The advent of twisted-pair wiring enabled Ethernet to become a commercial success.



On top of the physical layer Ethernet stations communicate to each other by sending each other data packets, small blocks of data that are individually sent and delivered. As with other IEEE 802 LANs, each Ethernet station is given a single 48-bit MAC address, which is used both to specify the destination and the source of each data packet. Network interface cards (NICs) or chips normally do not accept packets addressed to other Ethernet stations. Adapters generally come programmed with a globally unique address but this can be overridden either to avoid an address change when an adapter is replaced or to use locally administered addresses.



Despite the huge changes in Ethernet from a thick coaxial cable bus running at 10 Mbit/s to point-to-point links running at 1 Gbit/s and beyond, the different variants remain essentially the same from the programmer's point of view and are easily interconnected using readily available inexpensive hardware. This is because the frame format remains the same, even though network access procedures are radically different.



Due to the ubiquity of Ethernet, the ever-decreasing cost of the hardware needed to support it and the reduced panel space needed by twisted pair Ethernet, most manufacturers now build the functionality of an Ethernet card directly into PC motherboards obviating the installation of a separate network card.



[edit]

Physical layer

Ethernet evolved over a considerable time span and encompasses quite a few physical media interfaces. The commonly installed Gigabit Ethernet over copper wiring use a PAM-5 modulation scheme and over fiber uses 8B/10B encoding.



For more details on this topic, see Ethernet physical layer.

[edit]

Dealing with multiple users

[edit]

CSMA/CD shared medium Ethernet

Ethernet originally used a shared coaxial cable (the shared medium) winding around a building or campus to every attached machine. A scheme known as carrier sense multiple access with collision detection (CSMA/CD) governed the way the computers share the channel. The scheme was relatively simple compared to competing technologies token ring or Token Bus. When one computer wanted to send some information, it followed the following algorithm:



Main procedure



Frame ready for transmission

Is medium idle? If not, wait until it becomes ready and wait the Interframe gap period (9.6 µs in 10 Mbit/s Ethernet).

Start transmitting

Does a collision occur? If so, go to collision detected procedure.

End successful transmission

Collision detected procedure



Continue transmission until minimum packet time is reached (jam signal) to ensure that all receivers detect the collision

Is maximum number of transmission attempts reached? If so, abort transmission.

Calculate and wait random backoff period

Re-enter main procedure at stage 1

This works something like a dinner party, where all the guests talk to each other through a common medium (the air). Before speaking, each guest politely waits for the current guest to finish. If two guests start speaking at the same time, both stop and wait for short, random periods of time (measured in microseconds). The hope is that by each choosing a random period of time, both guests will not choose the same time to try to speak again, thus avoiding another collision. Exponentially increasing back-off times (determined using the truncated binary exponential backoff algorithm) are used when there is more than one failed attempt to transmit.



Computers were connected to an Attachment Unit Interface (AUI) transceiver, which in turn connected to the cable. While a simple passive wire was highly reliable for small Ethernets, it was not reliable for large extended networks, where damage to the wire in a single place, or a single bad connector could make the whole Ethernet segment unusable. Multipoint systems are also prone to very strange failure modes when an electrical discontinuity reflects the signal in such a manner that some nodes would work just fine while others would work slowly due to excessive retries or not at all (see standing wave for an explanation of why); these could be much more painful to diagnose than a complete failure of the segment. Debugging such failures often involved several people crawling around wiggling connectors while others watched the displays of computers running ping and shouted out reports as performance changed.



Since all communications happen on the same wire, any information sent by one computer is received by all, even if that information was intended for just one destination. The network interface card filters out information not addressed to it, interrupting the CPU only when applicable packets are received unless the card is put into "promiscuous mode". This "one speaks, all listen" property is a security weakness of shared-medium Ethernet, since a node on an Ethernet network can eavesdrop on all traffic on the wire if it so chooses. Use of a single cable also means that the bandwidth is shared, so that network traffic can slow to a crawl when, for example, the network and nodes restart after a power failure.



[edit]

Ethernet repeaters and hubs

For signal degradation and timing reasons, coaxial Ethernet segments had a restricted size which depended on the medium used. For example, 10BASE5 coax cables had a maximum length of 500 metres (1,640 feet). Also, as was the case with most other high-speed buses, Ethernet segments had to be terminated with a resistor at both ends. For coaxial cable based Ethernet, each end of the cable had a 50-ohm resistor and heat sink attached. Typically this was built into a male BNC or N connector and attached to the last device on the bus (or if vampire taps were in use to a socket mounted on the end of the cable just past the last device). If this was not done or if there was a break in the cable the AC signal on the bus was reflected, rather than dissipated, when it reached the end. This reflected signal was indistinguishable from a collision, and so no communication could take place.



A greater length could be obtained by an Ethernet repeater, which took the signal from one Ethernet cable and repeated it onto another cable. If a collision was detected, the repeater transmitted a jam signal onto all ports to ensure collision detection. Repeaters could be used to connect segments such that there were up to five Ethernet segments between any two hosts, three of which could have attached devices. Repeaters could detect an improperly terminated link from the continuous collisions and stop forwarding data from it. Hence they alleviated the problem of cable breakages: when an Ethernet coax segment broke, while all devices on that segment were unable to communicate, repeaters allowed the other segments to continue working (though depending on which segment was broken and the layout of the network the partitioning that resulted may have made other segments unable to reach important servers and thus effectively useless).



People recognized the advantages of cabling in a star topology (primarily that only faults at the star point will result in a badly partitioned network), and network vendors started creating repeaters having multiple ports, thus reducing the number of repeaters required at the star point; multiport Ethernet repeaters became known as "hubs". Network vendors such as DEC and SynOptics sold hubs that connected many 10BASE-2 thin coaxial segments. There were also "multi-port transceivers" or "fan-outs". These could be connected to each other and/or a coax backbone. The best-known early example was DEC's DELNI. These devices allowed multiple hosts with AUI connections to share a single transceiver. They also allowed creation of a small standalone Ethernet segment without using a coaxial cable.





A Twisted pair 10BASE-T Cable is used to transmit 10BASE-T EthernetEthernet on unshielded twisted-pair cables (UTP), beginning with StarLAN and continuing with 10BASE-T was designed for point-point links only and all termination was built into the device. This changed hubs from a specialist device used at the center of large networks to a device that every twisted pair-based network with more than two machines had to use. This structure made Ethernet networks more reliable by preventing faults with (but not deliberate misbehaviour of) one peer or its associated cable from affecting other devices on the network (though a failure of a hub or an inter hub link could still affect lots of users). Also as twisted-pair ethernet is point-to-point and terminated inside the hardware the total empty panel space required around a port is much reduced (making it easier to design hubs with lots of ports and to integrate ethernet onto computer motherboards).



Despite the physical star topology, hubbed Ethernet networks use half-duplex and CSMA/CD, with only minimal activity by the hub, primarily the Collision Enforcement signal, in dealing with packet collisions. Every packet is sent to every port on the hub, so bandwidth and security problems aren't addressed. The total throughput of the hub is limited to that of a single link and all links must operate at the same speed.



Collisions reduce throughput by their very nature. In the worst case, when there are lots of hosts with long cables that attempt to transmit many short frames, excessive collisions can reduce throughput dramatically. However, a Xerox report in 1980 summarized the results of having 20 fast nodes attempting to transmit packets of various sizes as quickly as possible on the same Ethernet segment[citation needed] . The results showed that, even for minimal Ethernet frames (64B), 90% throughput on the LAN was the norm. This is in comparison with token passing LANs (Token Ring, Token Bus), all of which suffer throughput degradation as each new node comes into the LAN, due to token waits.



This report was wildly controversial, as modeling showed that collision-based networks became unstable under loads as low as 40% of nominal capactity.



Full-duplex Ethernet, introduced with the 10BASET standard, performs close to 200% of nominal capacity.



[edit]

Bridging and Switching

While repeaters could isolate some aspects of Ethernet segments, such as cable breakages, they still forwarded all traffic to all Ethernet devices. This created significant limits on how many machines could communicate on an Ethernet network. To alleviate this, bridging was created to communicate at the data link layer while isolating the physical layer. With bridging, only well-formed packets are forwarded from one Ethernet segment to another; collisions and packet errors are isolated. Bridges learn where devices are, by watching MAC addresses, and do not forward packets across segments when they know the destination address is not located in that direction.



Early bridges examined each packet one by one, and were significantly slower than hubs (repeaters) at forwarding traffic, especially when handling many ports at the same time. In 1989 the networking company Kalpana introduced their EtherSwitch, the first Ethernet switch. An Ethernet switch does bridging in hardware, allowing it to forward packets at full wire speed. Bridges and switches also allow mixing of speeds, an imporant feature when equipment of mixed age is in use. Even more importantly (especially with fast ethernet) they overcome the cascading limits of hubs as a collision does not have to be detected by equipment on the other side of the switch or bridge.



Initially, Ethernet bridges and switches work somewhat like Ethernet hubs, with all traffic being echoed to all ports. However, as the switch "learns" the end-points associated with each port, it ceases to send non-broadcast traffic to ports other than the intended destination. In this way, Ethernet switching can allow the full wire speed of Ethernet to be used by any given pair of ports on a single switch.



Since packets are typically only delivered to the port they are intended for, traffic on a switched Ethernet is slightly less public than on shared-medium Ethernet. Despite this, switched Ethernet should still be regarded as an insecure network technology, because it is easy to subvert switched Ethernet systems by means such as ARP spoofing and MAC flooding. The bandwidth advantages, the slightly better isolation of devices from each other and the elimination of the chaining limits inherent in hubbed Ethernet have made switched Ethernet the dominant network technology.



When only a single device (anything but a hub) is connected to a switch port, full-duplex Ethernet becomes possible. In full duplex mode both devices can transmit to each other at the same time and there is no collision domain. This doubles the aggregate bandwidth of the link and was sometimes advertised as double the link speed (e.g. 200 Mbit/s) to account for this. However, this is misleading as performance will only double if traffic patterns are symmetrical (which in reality they rarely are). The elimination of the collision domain also means that all the link's bandwidth can be used (collisions can occupy a lot of bandwidth as links get busy) and that segment length is not limited by the need for correct collision detection (this is most significant with some of the fiber variants of Ethernet).



[edit]

Dual speed hubs

In the early days of Fast Ethernet, fast ethernet switches were relatively expensive devices. However, hubs suffered from the problem that if there were any 10BASE-T devices connected then the whole system would have to run at 10 Mbit. Therefore a compromise between a hub and a switch appeared known as a dual speed hub. These effectively split the network into two sections, each acting like a hubbed network at its respective speed then acted as a two port switch between those two sections. This meant they allowed mixing of the two speeds without the cost of a Fast Ethernet switch.



[edit]

More advanced networks

Simple switched Ethernet networks still suffer from a number of issues:



They suffer from single points of failure; e.g., if one link or switch goes down in the wrong place the network ends up partitioned.

It is possible to trick switches or hosts into sending data to your machine even if it's not intended for it, as indicated above.

It is possible for any host to flood the network with broadcast traffic forming a denial of service attack against any hosts that run at the same or lower speed as the attacking device.

They suffer from bandwidth choke points where a lot of traffic is forced down a single link.

Some Managed switches offer a variety of tools to combat these issues including:



spanning-tree protocol to maintain the active links of the network as a tree while allowing physical loops for redundancy.

Various port protection features (as it is far more likely an attacker will be on an end system port than on a switch-switch link)

VLANs to keep different classes of users separate while using the same physical infrastructure.

fast routing at higher levels (to route between those VLANs).

Link aggregation to add bandwidth to overloaded links and to provide some measure of redundancy, although the links won't protect against switch failure because they connect the same pair of switches.

[edit]

Autonegotiation

It is essential that both the switch port and the device connected to it use the same speed and duplex settings. To that end, autonegotiation was introduced in 1995 as an option for 100BASE-TX devices (802.3u). Although it worked correctly in many applications, it had two problems. One mistake was that its implementation was optional which led to some devices incapable of using autonegotiation. Secondly, a portion of the specification was not tightly written. Although most manufacturers implemented it one way, some including network giant Cisco, implemented it the other way. This unfortunately led to autonegotiation getting a bad name and, moreover, for Cisco to basically recommend to its customers and administrators to not use it.



The debatable portions of the autonegotiation specifications were eliminated by the 1998 release of 802.3z (1000BASE-X) followed by the negotiation protocols over twisted pair being significantly enhanced for 802.3ab (1000BASE-T). More notably, the new standard specified that to achieve gigabit speed over copper wiring, it was required for autonegotiation to be enabled. Now, all network equipment manufacturers—including Cisco[1]—recommend to use autonegotiation whenever possible.



Note that some switch OSes, as well as some card drivers, still have the option to disable autonegotiation and force a twisted pair connection to 1000Full or 1000Half, but doing that is against specification and should never be used as you won't properly negotiate any of the other parameters. Instead the proper way, for example, to force gigabit ethernet over a Cat 5 connection is to still specify autonegotiation, but limit the advertised capabilities to only 1000Base-T[2].



In cases of very old equipment that has trouble with autonegotiation it is recommended to disable autonegotiation and force the same speed and duplex on both sides of the connection. If this is not possible (e.g. one end is an unmanaged switch) the end with autonegotiation disabled should generally be set to half duplex.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...