INTRODUCTION to ETHERNET ETHERNET FRAMES the Two Types of Ethernet Frames Ethernet for Control—Understanding the Basics Used in Industry Are Similar

Total Page:16

File Type:pdf, Size:1020Kb

INTRODUCTION to ETHERNET ETHERNET FRAMES the Two Types of Ethernet Frames Ethernet for Control—Understanding the Basics Used in Industry Are Similar Volume 1 • Issue 3 Fall 1999 This article appears in The Industrial Ethernet Book, issue 1, published by Fieldbus.pub. For more information on The Industrial Ethernet Book, please the contact Adrian Chesney, [email protected] or +44 (0) 1329 846166. EXTENSION A Technical Supplement to control NETWORK INTRODUCTION TO ETHERNET ETHERNET FRAMES The two types of Ethernet frames Ethernet for Control—Understanding the Basics used in industry are similar. The DIX V2.0 frame, frequently referred to as the Ethernet II frame, consists of an eight-byte preamble, six-byte INTRODUCTION and Electronic Engineers (IEEE) was attempting to develop open source and destination addresses, a There has been much discussion network standards through the 802 two-byte type field used to identify recently regarding the applicability committee. In 1985 the IEEE 802.3 higher layer protocols, a variable of using Ethernet at various levels committee published “IEEE 802.3 data byte field followed by a four- of the control hierarchy. Since Carrier Sense Multiple Access with byte frame check sequence (FCS) Ethernet is so prevalent in the Collision Detection (CSMA/CD) field. The IEEE 802.3 frame divides office and frequently used as the Access Method and Physical Layer the preamble into a seven-byte enterprise network for high-end Specifications.” This technology is preamble followed by a single byte controllers, it would seem to be called 802.3 CSMA/CD and not start of frame delimiter (SFD). The a natural to use Ethernet at the Ethernet; however, it is frequently two-byte type field now becomes a control level or even at the device referred to as Ethernet even two-byte length field. The data level as proposed by some in our though the frame definition differs field now includes an 802.2 logical industry. The arguments for its use from DIX V2.0. Although 802.3 and link control (LLC) field that include low cost, good connectivity DIX frames can coexist on the precedes the actual data. The FCS and simple migration to higher same cable, interoperability is not remains the same. speed networks. The cry to use assured. Therefore, when “standard” Ethernet for control discussing “Ethernet,” it is Preamble applications requires an necessary to clarify 802.3 frames or understanding of the basics of DIX V2.0 frames. The DIX preamble consists of 64 Ethernet. bits of alternating “1s” and “0s” but To further confuse issues, standard ending with two “1s” to indicate Ethernet sometimes means an that a valid frame is to begin. This What is standard attached protocol—mainly TCP/IP. creates a 10 Mhz signal that Ethernet? Ethernet only defines the data link synchronizes the receivers on the We are not sure what standard and physical layers of the Open network before actual data arrives. Ethernet is but it certainly is not Systems Interconnect (OSI) Ethernet uses Manchester the 2.94 Mbps version that came Reference Model whereas TCP/IP encoding. out of Xerox’s Palo Alto Research defines the transport and network Center (PARC) in the early 70s. In layers respectively of the same 1980, Digital Equipment model. Therefore, when the The IEEE redefined the preamble Corporation (DEC), Intel and Xerox suggestion is made to use standard to be seven bytes of preamble, the published the DIX V1.0 standard Ethernet for control does this mean same as the DIX preamble, which boosted the speed of TCP/IP connectivity as well? followed by a one-byte start of frame delimiter (SFD) which looks Ethernet to 10 Mbps while APPLICATION like the last byte of the DIX maintaining Ethernet’s thick trunk PRESENTATION cabling scheme. In 1982 the DIX preamble. There is no change in SESSION V2.0 standard was released which operation between the DIX TRANSPORT is now commonly referred to as preamble and the IEEE preamble Ethernet II. Xerox then NETWORK and SFD byte. Both preambles are relinquished its trademark. DATA LINK not considered part of the frame PHYSICAL when calculating the size of the At the time of the first DIX overall frame. standard, the Institute of Electrical Figure 1—Ethernet defines the lower two layers of the OSI Reference Model. 1 Ethernet II DIX Frame What is important here is that since 64 bits 48 bits 48 bits 16 bits 368 to 12000 bits 32 bits DIX and IEEE frames are identical (46 to 1500 bytes) Preamble Individual/ Destination Source Type Data Frame in terms of the number of bits and Group Address Address Check length of fields, both frames can Address Bit Sequence coexist on the same network but may not be able to communicate to IEEE 802.3 Frame one another. Much of the existing 56 bits 8 bits 48 bits 48 bits 16 bits 368 to 12000 bits 32 bits TCP/IP software that binds to (46 to 1500 bytes) Preamble SFD Individual/ Globally/ Destination Source Length LLC/Data Frame Ethernet uses DIX frames and not Group Locally Address Address Check 802.3 frames, so care must be Address Administered Sequence exercised when selecting or Bit Address Bit developing software or claiming Figure 2—Two types of Ethernet frames are used in industry. interoperability. Destination Address good recordkeeping, will assign Data Field In the DIX standard the first bit of sequential numbers to each adapter A raw Ethernet frame (no the 48-bit destination address card he makes thereby creating a encapsulated protocol or LLC) can be indicates if the address is a worldwide unique address. With 24- up to 1500 bytes long but no less multicast address or a physical bits to work with, a lot of adapters than 46 bytes. This is the DIX frame. address. A “0” indicates a unicast can be produced from a single transmission to the indicated manufacturer. A list of OUI destination while a “1” indicates a assignments can be found on the Although the total available length multicast or group address. Internet. of the IEEE data field is the same as the DIX frame, the LLC header reduces the amount of field The IEEE standard further defines Type and Length Field available for actual data or payload the second bit of the 48-bit as it is sometimes referred to. If the destination to indicate if the address The original intention of Ethernet LLC header and actual payload are is locally administered or globally was never to use its data link layer less than 46 bytes, the data field administered. This bit is a “0” when as the means for providing must be padded to 46 bytes to the address is globally administered; guaranteed delivery of data. It was ensure that the transmission is not that is, assigned by the Ethernet always the intent that a higher layer interpreted as a runt packet or interface manufacturer. protocol would do that service. Therefore it was only necessary to packet fragment. identify by number which higher A 48-bit address of all “1s” is a layer protocol was being used Frame Check Sequence broadcast address in both DIX and through the two-byte field in the IEEE formats indicating that the DIX frame. Originally, Xerox Both the DIX and IEEE standard transmission is directed to all maintained the assignments and use four bytes to hold the CRC-32 devices on the network. now IEEE provides the check on the complete frame from administration. destination address all the way to the end of the data field. The Source Address receiving station calculates its own The 48-bit source address is The 802.3 standard does not include CRC-32, checks on the received appended to the transmission as an the type field but instead defines it data and compares the results with aid to the higher layer protocols. It as a length field. Per the 802.3 the transmitted CRC-32 value for a is not used for medium access standard, a value in this field of match indicating a successful control. To avoid duplicate node 1518 or less indicates the length of reception. Note that there is no IDs for global addresses, the the data field, while values above inherent mechanism in the Ethernet Ethernet adapter manufacturer this may be ignored, discarded or data link layer protocol to inform obtains an Organizationally Unique used in a private manner. These out the source node that a reception Identifier (OUI) from the IEEE (for of bound values could then be used was accepted or rejected due to a an administration fee). The OUI is to identify higher layer protocols failed CRC-32 check. That task is 24-bits long and is used as the most just like DIX frames. left to the higher layer protocol. significant portion of the 48-bit address. The manufacturer, using 2 ETHERNET PHYSICAL standardized in 1985 as 10BASE2. higher-speed migration, noise LAYERS Thinnet again was a bus topology immunity and electrical isolation. but this time with internal There are three media standards: Although Ethernet was originally transceivers. A thin RG-58/u coaxial designed as a coaxial bus system, cable interconnects up to 30 alternate physical layers have stations to a maximum length of 10BASE-FL—This fiber link evolved since the early 80s. The 185 meters. Segments can be standard replaces older FOIRL IEEE 802 committee has defined repeated up to 740 meters. BNC standard. several physical layers and that is style connectors, terminators and 10BASE-FB—This backbone why it is important to specify the taps are used to cable the system. standard is not very popular. correct option when selecting Although easier to install than Ethernet. 10BASE-FP—This passive hub 10BASE5, the focus on new technology is also not popular.
Recommended publications
  • On Ttethernet for Integrated Fault-Tolerant Spacecraft Networks
    On TTEthernet for Integrated Fault-Tolerant Spacecraft Networks Andrew Loveless∗ NASA Johnson Space Center, Houston, TX, 77058 There has recently been a push for adopting integrated modular avionics (IMA) princi- ples in designing spacecraft architectures. This consolidation of multiple vehicle functions to shared computing platforms can significantly reduce spacecraft cost, weight, and de- sign complexity. Ethernet technology is attractive for inclusion in more integrated avionic systems due to its high speed, flexibility, and the availability of inexpensive commercial off-the-shelf (COTS) components. Furthermore, Ethernet can be augmented with a variety of quality of service (QoS) enhancements that enable its use for transmitting critical data. TTEthernet introduces a decentralized clock synchronization paradigm enabling the use of time-triggered Ethernet messaging appropriate for hard real-time applications. TTEther- net can also provide two forms of event-driven communication, therefore accommodating the full spectrum of traffic criticality levels required in IMA architectures. This paper explores the application of TTEthernet technology to future IMA spacecraft architectures as part of the Avionics and Software (A&S) project chartered by NASA's Advanced Ex- ploration Systems (AES) program. Nomenclature A&S = Avionics and Software Project AA2 = Ascent Abort 2 AES = Advanced Exploration Systems Program ANTARES = Advanced NASA Technology Architecture for Exploration Studies API = Application Program Interface ARM = Asteroid Redirect Mission
    [Show full text]
  • Mikrodenetleyicili Endüstriyel Seri Protokol Çözümleyici Sisteminin Programi
    YILDIZ TEKNİK ÜNİVERSİTESİ FEN BİLİMLERİ ENSTİTÜSÜ MİKRODENETLEYİCİLİ ENDÜSTRİYEL SERİ PROTOKOL ÇÖZÜMLEYİCİ SİSTEMİNİN PROGRAMI Elektronik ve Haberleşme Müh. Kemal GÜNSAY FBE Elektronik ve Haberleşme Anabilim Dalı Elektronik Programında Hazırlanan YÜKSEK LİSANS TEZİ Tez Danışmanı : Yrd. Doç. Dr. Tuncay UZUN (YTÜ) İSTANBUL, 2009 YILDIZ TEKNİK ÜNİVERSİTESİ FEN BİLİMLERİ ENSTİTÜSÜ MİKRODENETLEYİCİLİ ENDÜSTRİYEL SERİ PROTOKOL ÇÖZÜMLEYİCİ SİSTEMİNİN PROGRAMI Elektronik ve Haberleşme Müh. Kemal GÜNSAY FBE Elektronik ve Haberleşme Anabilim Dalı Elektronik Programında Hazırlanan YÜKSEK LİSANS TEZİ Tez Danışmanı : Yrd. Doç. Dr. Tuncay UZUN (YTÜ) İSTANBUL, 2009 İÇİNDEKİLER Sayfa KISALTMA LİSTESİ ................................................................................................................ v ŞEKİL LİSTESİ ...................................................................................................................... viii ÇİZELGE LİSTESİ .................................................................................................................... x ÖNSÖZ ...................................................................................................................................... xi ÖZET ........................................................................................................................................ xii ABSTRACT ............................................................................................................................ xiii 1. GİRİŞ ......................................................................................................................
    [Show full text]
  • How to Set up IP Camera by Using a Macintosh Computer
    EDIMAX COMPUTER INC. Edimax IP Camera series How to set up IP Camera by using a Macintosh computer 2011 Edimax Computer 3350 Scott Blvd., Building #15 Santa Clara, California 95054, USA Phone 408-496-1105 • Fax 408-980-1530 www.edimax.us How to setup Edimax IP Camera by a Macintosh computer Introduction The most important thing to setup IP Camera is to assign a static IP address so the camera can work with your network. So far the Edimax IP Cam Admin utility is Windows based only and the program can not work for Macintosh computers. Macintosh users can follow this guide to set up Edimax IP camera. Step 1. Understand the IP address used in your network. Have your Macintosh computer operate as usual. Go into System Preferences. In System Preferences, Go to Network. Select the adapter you are using. It could be an Airport card, a third- party Wireless card, or an Ethernet Adapter. Write down the IP address, subnet mask, Router, and DNS server address. We have a usb wireless card in this example. Its IP address 10.0.1.2 told us that the IP addresses used in the network are 10.0.1.x. All the devices in the network have the first three octets the same, but the last octet number must be different. We decide to give our new camera an IP address 10.0.1.100 because no other computer device use 10.0.1.100. We temporarily disconnect the wireless adapter. You can turn off your Airport adapter if you use it to get on Internet.
    [Show full text]
  • Gigabit Ethernet - CH 3 - Ethernet, Fast Ethernet, and Gigabit Ethern
    Switched, Fast, and Gigabit Ethernet - CH 3 - Ethernet, Fast Ethernet, and Gigabit Ethern.. Page 1 of 36 [Figures are not included in this sample chapter] Switched, Fast, and Gigabit Ethernet - 3 - Ethernet, Fast Ethernet, and Gigabit Ethernet Standards This chapter discusses the theory and standards of the three versions of Ethernet around today: regular 10Mbps Ethernet, 100Mbps Fast Ethernet, and 1000Mbps Gigabit Ethernet. The goal of this chapter is to educate you as a LAN manager or IT professional about essential differences between shared 10Mbps Ethernet and these newer technologies. This chapter focuses on aspects of Fast Ethernet and Gigabit Ethernet that are relevant to you and doesn’t get into too much technical detail. Read this chapter and the following two (Chapter 4, "Layer 2 Ethernet Switching," and Chapter 5, "VLANs and Layer 3 Switching") together. This chapter focuses on the different Ethernet MAC and PHY standards, as well as repeaters, also known as hubs. Chapter 4 examines Ethernet bridging, also known as Layer 2 switching. Chapter 5 discusses VLANs, some basics of routing, and Layer 3 switching. These three chapters serve as a precursor to the second half of this book, namely the hands-on implementation in Chapters 8 through 12. After you understand the key differences between yesterday’s shared Ethernet and today’s Switched, Fast, and Gigabit Ethernet, evaluating products and building a network with these products should be relatively straightforward. The chapter is split into seven sections: l "Ethernet and the OSI Reference Model" discusses the OSI Reference Model and how Ethernet relates to the physical (PHY) and Media Access Control (MAC) layers of the OSI model.
    [Show full text]
  • IEEE 802.1Aq Standard, Is a Computer Networking Technology Intended to Simplify the Creation and Configuration of Networks, While Enabling Multipath Routing
    Brought to you by: Brian Miller Yuri Spillman - Specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing. - Link State Protocol - Based on IS-IS -The standard is the replacement for the older spanning tree protocols such as IEEE 802.1D, IEEE 802.1w, and IEEE 802.1s. These blocked any redundant paths that could result in layer 2(Data Link Layer), whereas IEEE 802.1aq allows all paths to be active with multiple equal cost paths, and provides much larger layer 2 topologies. 802.1aq is an amendment to the "Virtual Bridge Local Area Networks“ and adds Shortest Path Bridging (SPB). Shortest path bridging, which is undergoing IEEE’s standardization process, is meant to replace the spanning tree protocol (STP). STP was created to prevent bridge loops by allowing only one path between network switches or ports. When a network segment goes down, an alternate path is chosen and this process can cause unacceptable delays in a data center network. The ability to use all available physical connectivity, because loop avoidance uses a Control Plane with a global view of network topology Fast restoration of connectivity after failure, again because of Link State routing's global view of network topology Under failure, the property that only directly affected traffic is impacted during restoration; all unaffected traffic just continues Ideas are rejected by IEEE 802.1. accepted by the IETF and the TRILL WG is formed. Whoops, there is a problem. They start 802.1aq for spanning tree based shortest path bridging Whoops, spanning tree doesn’t hack it.
    [Show full text]
  • Application Protocol Data Unit Meaning
    Application Protocol Data Unit Meaning Oracular and self Walter ponces her prunelle amity enshrined and clubbings jauntily. Uniformed and flattering Wait often uniting some instinct up-country or allows injuriously. Pixilated and trichitic Stanleigh always strum hurtlessly and unstepping his extensity. NXP SE05x T1 Over I2C Specification NXP Semiconductors. The session layer provides the mechanism for opening closing and managing a session between end-user application processes ie a semi-permanent dialogue. Uses MAC addresses to connect devices and define permissions to leather and commit data 1. What are Layer 7 in networking? What eating the application protocols? Application Level Protocols Department of Computer Science. The present invention pertains to the convert of Protocol Data Unit PDU session. Network protocols often stay to transport large chunks of physician which are layer in. The term packet denotes an information unit whose box and tranquil is remote network-layer entity. What is application level security? What does APDU stand or Hop sound to rot the meaning of APDU The Acronym AbbreviationSlang APDU means application-layer protocol data system by. In the context of smart cards an application protocol data unit APDU is the communication unit or a bin card reader and a smart all The structure of the APDU is defined by ISOIEC 716-4 Organization. Application level security is also known target end-to-end security or message level security. PDU Protocol Data Unit Definition TechTerms. TCPIP vs OSI What's the Difference Between his Two Models. The OSI Model Cengage. As an APDU Application Protocol Data Unit which omit the communication unit advance a.
    [Show full text]
  • Ethercat – Ultra-Fast Communication Standard
    EtherCAT – ultra-fast communication standard In 2003, Beckhoff introduces its EtherCAT tech- In 2007, EtherCAT is adopted as an IEC standard, EtherCAT: nology into the market. The EtherCAT Technology underscoring how open the system is. To this Group (ETG) is formed, supported initially by day, the specification remains unchanged; it has global standard 33 founder members. The ETG goes on to stan- only been extended and compatibility has been dardize and maintain the technology. The group is retained. As a result, devices from the early years, the largest fieldbus user organization in the world, even from as far back as 2003, are still interopera- for real-time with more than 5000 members (as of 2019) cur- ble with today’s devices in the same networks. rently. In 2005, the Safety over EtherCAT protocol Another milestone is achieved in 2016 Ethernet from the is rolled out, expanding the EtherCAT specification with EtherCAT P, which introduces the ability to to enable safe transmission of safety-relevant carry power (2 x 24 V) on a standard Cat.5 cable field to the I/Os control data. The low-footprint protocol uses a alongside EtherCAT data. This paves the way for so-called Black Channel, making it completely machines without control cabinets. independent of the communication system used. The launch of EtherCAT G/G10 in 2018 in- How it works The key functional principle of EtherCAT lies in how its nodes process Ethernet frames: each node reads the data addressed to it and writes its data back to Flexible topology the frame all while the frame is An EtherCAT network can sup- moving downstream.
    [Show full text]
  • Introduction to Spanning Tree Protocol by George Thomas, Contemporary Controls
    Volume6•Issue5 SEPTEMBER–OCTOBER 2005 © 2005 Contemporary Control Systems, Inc. Introduction to Spanning Tree Protocol By George Thomas, Contemporary Controls Introduction powered and its memory cleared (Bridge 2 will be added later). In an industrial automation application that relies heavily Station 1 sends a message to on the health of the Ethernet network that attaches all the station 11 followed by Station 2 controllers and computers together, a concern exists about sending a message to Station 11. what would happen if the network fails? Since cable failure is These messages will traverse the the most likely mishap, cable redundancy is suggested by bridge from one LAN to the configuring the network in either a ring or by carrying parallel other. This process is called branches. If one of the segments is lost, then communication “relaying” or “forwarding.” The will continue down a parallel path or around the unbroken database in the bridge will note portion of the ring. The problem with these approaches is the source addresses of Stations that Ethernet supports neither of these topologies without 1 and 2 as arriving on Port A. This special equipment. However, this issue is addressed in an process is called “learning.” When IEEE standard numbered 802.1D that covers bridges, and in Station 11 responds to either this standard the concept of the Spanning Tree Protocol Station 1 or 2, the database will (STP) is introduced. note that Station 11 is on Port B. IEEE 802.1D If Station 1 sends a message to Figure 1. The addition of Station 2, the bridge will do ANSI/IEEE Std 802.1D, 1998 edition addresses the Bridge 2 creates a loop.
    [Show full text]
  • SELECTION of CYCLIC REDUNDANCY CODE and CHECKSUM March 2015 ALGORITHMS to ENSURE CRITICAL DATA INTEGRITY 6
    DOT/FAA/TC-14/49 Selection of Federal Aviation Administration William J. Hughes Technical Center Cyclic Redundancy Code and Aviation Research Division Atlantic City International Airport New Jersey 08405 Checksum Algorithms to Ensure Critical Data Integrity March 2015 Final Report This document is available to the U.S. public through the National Technical Information Services (NTIS), Springfield, Virginia 22161. U.S. Department of Transportation Federal Aviation Administration NOTICE This document is disseminated under the sponsorship of the U.S. Department of Transportation in the interest of information exchange. The U.S. Government assumes no liability for the contents or use thereof. The U.S. Government does not endorse products or manufacturers. Trade or manufacturers’ names appear herein solely because they are considered essential to the objective of this report. The findings and conclusions in this report are those of the author(s) and do not necessarily represent the views of the funding agency. This document does not constitute FAA policy. Consult the FAA sponsoring organization listed on the Technical Documentation page as to its use. This report is available at the Federal Aviation Administration William J. Hughes Technical Center’s Full-Text Technical Reports page: actlibrary.tc.faa.gov in Adobe Acrobat portable document format (PDF). Technical Report Documentation Page 1. Report No. 2. Government Accession No. 3. Recipient's Catalog No. DOT/FAA/TC-14/49 4. Title and Subitle 5. Report Date SELECTION OF CYCLIC REDUNDANCY CODE AND CHECKSUM March 2015 ALGORITHMS TO ENSURE CRITICAL DATA INTEGRITY 6. Performing Organization Code 220410 7. Author(s) 8. Performing Organization Report No.
    [Show full text]
  • The Role of CAN in the Age of Ethernet and IOT
    iCC 2017 CAN in Automation The role of CAN in the age of Ethernet and IOT Christian Schlegel, HMS Industrial Networks CAN technology was developed in the 1980s and became available in 1987, just as other industrial fieldbus systems like PROFIBUS or INTERBUS entered the stage of industrial communication. Beside the fact that CAN is a success in the automotive industry and used in all types of cars today, it has also made its way in many other industrial areas. About 15 years ago, new technologies based on Ethernet started to emerge, with ap- pealing and sometimes outstanding features. Some six years ago Ethernet also started to find its way into automobiles. Today, other new communication technologies are showing up on the horizon driven by the omnipresent Industrial Internet of Things. But even now, 30 years after their introduction, these “classic” fieldbus technologies are still alive – with varying success. Since CAN was initially developed with a focus for use in automobiles, CAN has certain features that still make it the best choice for many applications in automobiles and industrial areas – even when compared to the newer technologies. This paper discusses why CAN is still a valid or even better choice for certain applica- tion areas than Ethernet-based technologies, not just focusing on the advanced fea- tures provided by the enhanced capabilities of CAN FD but also highlighting how these applications benefit from the features of “classic” CAN. Looking back into history … the requirement to transmit data between … when CAN was born these ECUs but also to connect sensors and actuators to them.
    [Show full text]
  • IEEE Std 802.3™-2012 New York, NY 10016-5997 (Revision of USA IEEE Std 802.3-2008)
    IEEE Standard for Ethernet IEEE Computer Society Sponsored by the LAN/MAN Standards Committee IEEE 3 Park Avenue IEEE Std 802.3™-2012 New York, NY 10016-5997 (Revision of USA IEEE Std 802.3-2008) 28 December 2012 IEEE Std 802.3™-2012 (Revision of IEEE Std 802.3-2008) IEEE Standard for Ethernet Sponsor LAN/MAN Standards Committee of the IEEE Computer Society Approved 30 August 2012 IEEE-SA Standard Board Abstract: Ethernet local area network operation is specified for selected speeds of operation from 1 Mb/s to 100 Gb/s using a common media access control (MAC) specification and management information base (MIB). The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) MAC protocol specifies shared medium (half duplex) operation, as well as full duplex operation. Speed specific Media Independent Interfaces (MIIs) allow use of selected Physical Layer devices (PHY) for operation over coaxial, twisted-pair or fiber optic cables. System considerations for multisegment shared access networks describe the use of Repeaters that are defined for operational speeds up to 1000 Mb/s. Local Area Network (LAN) operation is supported at all speeds. Other specified capabilities include various PHY types for access networks, PHYs suitable for metropolitan area network applications, and the provision of power over selected twisted-pair PHY types. Keywords: 10BASE; 100BASE; 1000BASE; 10GBASE; 40GBASE; 100GBASE; 10 Gigabit Ethernet; 40 Gigabit Ethernet; 100 Gigabit Ethernet; attachment unit interface; AUI; Auto Negotiation; Backplane Ethernet; data processing; DTE Power via the MDI; EPON; Ethernet; Ethernet in the First Mile; Ethernet passive optical network; Fast Ethernet; Gigabit Ethernet; GMII; information exchange; IEEE 802.3; local area network; management; medium dependent interface; media independent interface; MDI; MIB; MII; PHY; physical coding sublayer; Physical Layer; physical medium attachment; PMA; Power over Ethernet; repeater; type field; VLAN TAG; XGMII The Institute of Electrical and Electronics Engineers, Inc.
    [Show full text]
  • Fact Sheet: Single-Pair Ethernet Trade Article
    Fact sheet Single Pair Ethernet Matthias Fritsche – product manager device connectivity & Jonas Diekmann – technical editor HARTING Technology group – October 2016– November 2016 Wireless technology and optical cable have already been often heralded as the future transmission technology. However, simple twisted pair cable based on plain old copper, often pronounced dead, is the most common transmission medium. Simple, robust, and perhaps with 100GBASE T1 soon to be also incredibly fast. From the beginnings of Ethernet in the 1970s, then via diverse multi-pair Ethernet developments with multiple parallel transmission paths, now apparently we are taking a step back. Back to single twisted-pair. With a new protocol and new PHYs transmission rates of up to 10 Gbit/s and PoDL capacities of up to 60 W are no longer a problem. Ultimately one pair is enough. When the team surrounding David Boggs and Robert Metcalf in the 1970s developed Ethernet at the Xerox Palo Alto Research Center (PARC), no one could foresee that this transmission method would develop so dynamically and dominate data transmission worldwide to this day. The original 10BASE5 Ethernet still used coax cable as the common medium. Today, next to wireless and optical cables, twisted-pair cable, often pronounced dead, is the most frequently used transmission medium. Starting in 1990 with 10BASE-T, the data transmission rate of the IEEE standards increased by a factor of 10 approximately every 5 years over 100BASE-TX and 1000BASE-T up to 10GBASE-T. This series could not be continued for the jump to 100GBASE-T, instead however four new IEEE standards were finalized in 2016.
    [Show full text]