What Is Ethernet?

What Is Ethernet?

Ethernet technology provides rules that allow network-connected devices to talk to one another without talking over each other. In a verbal conversation, when two people speak at the same time, each may have difficulty understanding what the other is saying. This is amplified when, say, 10 people are talking at once. Imagine 100 or 1000 at once.

The same is true for a data network. If two or more connected devices on a shared network attempt to transmit data packets at the same time, a packet collision occurs. The pulses of electricity or photons that make up a packet overlap when sent at the same time over a shared copper or optical cable. This jumbles the sequence of “on” pulses and “off” voids that are sent to indicate the bits and bytes of 1s and 0s that make up a packet.

Ethernet was designed to solve the problem of packet collision. It provides network devices with a set of rules that essentially says: “Make sure no one else is talking before you talk. If you hear someone talking while you’re talking, stop, listen, and wait for the talking to end before you talk again.”

Ethernet is commonly associated with connected devices in a wired LAN or WAN. Using a wired Ethernet cable, devices are connected to an Ethernet switch. Ethernet has the ability to use both wired and fiber cables, delivering not only data but also power, now up to 90W with UPOE+.

More formally, Ethernet is a common name for the IEEE 802.3 standard based on the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) protocol. CSMA/CD defines when to transmit and what is to happen if a collision is detected, as well as endpoint addressing, transmission speeds, and media. Ethernet has evolved dramatically since its first application. Today it’s the de facto protocol for IP-based networks.

Where did Ethernet originate?

The concept of Ethernet has its roots in the late 1960s and the University of Hawaii’s Aloha Network. Aloha was a pioneering, experimental radio-communications network connecting the Hawaiian Islands to a central time-shared computer on the main campus, in Oahu.

Aloha was often referred to as one of the first wireless packet networks. It used two radio frequencies, separating send and receive data that passed between user terminals and the main hub connected to the computer. Designed for simplicity, the network followed these rules:

  • Send a packet when you’re ready and wait for a receipt acknowledgement.
  • If no acknowledgement occurs, resend at some random time.

As use of the network grew, it became obvious that packet collision would severely limit the capacity of the network as designed. Researching the problem for his doctoral thesis, a young computer science student, Bob Metcalfe, devised a solution. His innovation earned him not only his Harvard Ph.D. but a place in history as the inventor of Ethernet. Metcalfe’s solution: Listen before you talk.

In 1972, Metcalfe took Ethernet from idea to fruition with the first experimental Ethernet system, created at Xerox PARC. The network had an initial speed of 2.94 Mbps and linked Xerox Altos mainframes, servers, and printers using inexpensive coaxial cable.

At the time, Ethernet competed with Token Ring, ARCnet, Fiber Distributed Data Interface (FDDI), and other proprietary protocols. It quickly rose to dominance as it was open and reliable, yet inexpensive. Today, it supports speeds from 1 Mbps to 400 Gbps and beyond.

When was the Ethernet standard created?

Ethernet was formalized in 1983 as the IEEE 802.3 Ethernet standard. It is one of 12 in the IEEE 802 family of variable-size packet LAN standards. IEEE 802 services and protocols focus on the physical and data link layers of a network. In the Open Systems Interconnection (OSI) networking model, those layers are known as Layer 1 and Layer 2, respectively.

Based on the addressing scheme used in early implementations of Ethernet, the IEEE 802 standards use Media Access Control (MAC) addresses, which are unique identifiers typically assigned to endpoint access hardware by device manufacturers. The most significant part of a MAC address identifies the manufacturer, which assigns the remainder of the address, potentially providing a unique address. This makes it possible for frames to be delivered within a network that interconnects sender and receiver through some combination of Ethernet switches.

Routers are used to pass packets between networks and use IP addresses rather than MAC addresses to tag packets’ origination and destination points. Using the U.S. Postal Service as an analogy, IP addresses are like ZIP codes, while MAC addresses are like street addresses or post office boxes.

What are Ethernet frames?

In an Ethernet network, data is broken into packets, with each packet transmitted using the CSMA/CD algorithm until it arrives at its destination without colliding with any other packet. The first open slot after a transmission is reserved for an acknowledge packet. A device or node is either transmitting or receiving at any instant.

When sending data to another device on an Ethernet network, the MAC sublayer (data link sublayer):

  • Encapsulates higher-level frames into frames appropriate for the transmission medium
  • Adds a frame check sequence to identify transmission errors
  • Forwards the data to the physical layer as soon as the CSMA/CD protocol permits, waiting as necessary to avoid collisions.
  • Is responsible for compensating for collisions by starting retransmission when a collision (jam signal) is detected.

When receiving data from the physical layer, the frame check sequence in the MAC block is used to ensure data integrity. It strips off the sender’s Ethernet-packet preamble and padding before passing the data to the higher layers.

The Ethernet switch creates the frame by encapsulating the Ethernet packet with a preamble, which is used to synchronize the sender and receiver, followed by a 1-octet start-frame delimiter byte.

The Ethernet packet includes the data encapsulated by a header and a frame check value. The MAC header provides the source and destination MAC addresses as well as a 2-octet EtherType code indicating IPv4 or IPv6, MACsec encryption, etc. The frame ends with a frame check sequence (FCS), which is a 32-bit cyclic redundancy check used to detect any in-transit corruption of data.

What is a CSMA/CD protocol?

When a frame is ready, the transmitting station checks to see whether the channel is idle or busy. If the channel is busy, the station waits until the channel becomes idle. If the channel is idle, the station starts transmitting and continually monitors the channel to detect collision.