Introduction

Ethernet: dominant wired LAN technology. Defines physical and data link layers. Facilitates local area network communication via frame-based data transmission. Emphasizes simplicity, scalability, and interoperability. Standardized by IEEE 802.3. Supports diverse speeds and media types. Basis for most enterprise and home networks.

"Ethernet not only revolutionized local area networking but also set the foundation for modern network communications." -- Robert Metcalfe

History and Evolution

Origins

Developed in 1973 at Xerox PARC by Robert Metcalfe and David Boggs. Designed to connect multiple computers over coaxial cable. Initial speed: 2.94 Mbps. Published as Xerox Ethernet in 1976.

Standardization

IEEE 802.3 committee formed in 1983. Adopted 10 Mbps base standard. Introduced Carrier Sense Multiple Access with Collision Detection (CSMA/CD). Allowed vendor interoperability.

Speed Advancements

10 Mbps → 100 Mbps (Fast Ethernet, 1995) → 1 Gbps (Gigabit Ethernet, late 1990s) → 10 Gbps and beyond (10G, 40G, 100G Ethernet). Each iteration supports backward compatibility.

Media Evolution

From thick coaxial cables to twisted pair (Cat5, Cat6) and fiber optics. Increased transmission distance and reduced interference.

Ethernet Architecture

Layer Model

Operates at OSI layers 1 (Physical) and 2 (Data Link). Data Link subdivided into Logical Link Control (LLC) and Media Access Control (MAC). Ethernet defines MAC sublayer and physical interface.

Components

Nodes: devices with unique MAC addresses. Network medium: coaxial cable, twisted pair, or fiber. Repeaters, hubs, switches for connectivity. Network interface cards (NICs) implement Ethernet protocol.

Frame Transmission

Frames encapsulate data. Sender listens to channel before transmission (Carrier Sense). If idle, transmits frame. Collision detection ensures retransmission on conflict.

Frame Structure

Ethernet II Frame Format

Consists of preamble, destination MAC, source MAC, EtherType, payload, and frame check sequence (FCS).

FieldSize (bytes)Description
Preamble7Synchronization pattern
Start Frame Delimiter (SFD)1Indicates frame start
Destination MAC6Receiver address
Source MAC6Sender address
EtherType2Protocol identifier
Payload46-1500Data carried by frame
Frame Check Sequence (FCS)4Error detection CRC

Frame Check Sequence (FCS)

32-bit cyclic redundancy check (CRC) for error detection. Ensures data integrity. Calculated by sender, verified by receiver. Invalid frames discarded.

MAC Addressing

Format

48-bit (6 bytes) globally unique identifier. Divided into Organizationally Unique Identifier (OUI) and Network Interface Controller (NIC) specific part. Expressed in hexadecimal, e.g., 00:1A:2B:3C:4D:5E.

Types

Unicast: single device. Multicast: group of devices. Broadcast: all devices on LAN (FF:FF:FF:FF:FF:FF). Used for frame delivery decisions.

Address Assignment

Manufactured by vendors, burned into NIC hardware. Can be overridden by software. Key for device identification and filtering.

Access Method: CSMA/CD

Carrier Sense Multiple Access

Nodes sense carrier before transmission. If medium busy, defer sending. Ensures minimal collision probability.

Collision Detection

While transmitting, node monitors medium. On detecting collision, abort transmission immediately. Reduces wasted time and bandwidth.

Backoff Algorithm

After collision, nodes wait random time before retrying. Uses binary exponential backoff. Mitigates repeated collisions under high load.

Backoff Time = Random(0, 2^k - 1) × Slot Timek = min(number of collisions, 10)Slot Time = 512 bit times (e.g., 51.2 µs at 10 Mbps)

Physical Layer Specifications

Media Types

Coaxial cable (10BASE2, 10BASE5), twisted pair (10BASE-T, 100BASE-TX), fiber optic (100BASE-FX, 10GBASE-SR). Each supports different speeds and distances.

Signaling

Baseband signaling: digital pulses directly represent bits. Encoding schemes vary: Manchester encoding for 10 Mbps, MLT-3 for 100 Mbps, PAM-5 for Gigabit Ethernet.

Speed and Distance

StandardSpeedMax Segment LengthMedia
10BASE-T10 Mbps100 mTwisted pair
100BASE-TX100 Mbps100 mTwisted pair
1000BASE-SX1 Gbps220-500 mMultimode fiber
10GBASE-LR10 Gbps10 kmSingle-mode fiber

Switching and Hubs

Hubs

Physical layer repeaters. Broadcast incoming signals to all ports. No frame filtering. Collisions common. Legacy technology.

Switches

Operate at data link layer. Maintain MAC address table. Forward frames only to intended recipient port. Reduce collisions. Enable full-duplex communication.

Impact on CSMA/CD

Switches eliminate collisions by segmenting collision domains. CSMA/CD obsolete in full-duplex switched Ethernet.

Performance and Throughput

Raw Bandwidth vs Throughput

Raw bandwidth: maximum bit rate (e.g., 100 Mbps). Throughput: actual data delivered after protocol overhead and retransmissions. Usually lower than bandwidth.

Collision Impact

Collisions reduce throughput. Backoff delays increase latency. Full-duplex switching mitigates collision effects.

Utilization Optimization

Use switches, full-duplex links. Minimize collision domains. Employ flow control and Quality of Service (QoS) techniques.

Network Topologies

Bus Topology

Original Ethernet design. Single coaxial cable shared by all nodes. Simple but prone to collisions and cable faults.

Star Topology

Nodes connect individually to a central hub or switch. Easier troubleshooting. Scalability and reliability improved.

Hybrid Topologies

Combination of bus and star. Large networks segmented into smaller stars interconnected by routers or switches.

Ethernet Standards and IEEE 802.3

IEEE 802.3 Overview

Defines physical layer and MAC sublayer specifications. Maintained and updated by IEEE LAN/MAN Standards Committee.

Common Amendments

10BASE-T, 100BASE-TX, 1000BASE-T, 10GBASE-T, Power over Ethernet (PoE), Energy-Efficient Ethernet (EEE). Each addresses speed, media, or power delivery.

Interoperability

Standards ensure multi-vendor compatibility. Devices negotiate link speed and duplex mode via auto-negotiation protocol.

Security Considerations

Vulnerabilities

MAC spoofing allows device impersonation. Eavesdropping possible on shared media. Man-in-the-middle attacks on hubs.

Mitigation Techniques

Use switches to segment network. Implement port security and MAC filtering. Employ VLANs for segmentation. Use encryption at higher layers.

Physical Security

Restrict physical access to network devices and cables. Prevent unauthorized tapping and device connection.

References

  • Metcalfe, R.M., Boggs, D.R., "Ethernet: Distributed Packet-Switching for Local Computer Networks," Communications of the ACM, vol. 19, no.7, 1976, pp. 395-404.
  • IEEE Standards Association, "IEEE Standard for Ethernet," IEEE Std 802.3-2018, 2018, pp.1-5600.
  • Spurgeon, C., "Ethernet: The Definitive Guide," O'Reilly Media, 2nd Edition, 2000, pp. 45-130.
  • Stallings, W., "Data and Computer Communications," 10th Edition, Pearson, 2013, pp. 290-320.
  • Tanenbaum, A.S., Wetherall, D.J., "Computer Networks," 5th Edition, Pearson, 2011, pp. 225-260.