小孩出冷汗是什么原因| 频繁流鼻血是什么原因| 芊芊学子什么意思| 手背上长痣代表什么| pr是什么工作| 唯有读书高的前一句是什么| 坐久了脚肿是什么原因| 积是什么| 4月13号是什么星座| 肾积水有什么症状表现| 余数是什么| 拉肚子适合吃什么| friend什么意思中文| 冠冕堂皇是什么意思| 八段锦什么时候练最好| 肠化什么意思| 银行卡睡眠状态是什么意思| 彩虹什么颜色| 依波手表什么档次| 北海特产有什么值得带| 坚韧不拔是什么生肖| 片反过来念什么| 丙氨酸氨基转移酶高是什么意思| 尼古丁是什么东西| 蜜蜂蜇人后为什么会死去| 震动棒是什么| pda是什么意思| 定性是什么意思| 脉数是什么意思| 牙合是什么字| 天上的星星为什么会发光| 什么来什么去的四字词语| 哈密瓜苦是什么原因| 花甲之年是什么意思| 脸上长痤疮用什么药| 不二法门是什么意思| 梦见自己小便是什么意思| 苦荞是什么| seifini是什么牌子| 什么药治便秘最好最快| 翡翠和玉石有什么区别| size什么意思| 人经常放屁是什么原因| 3.21什么星座| 梦见狗咬我是什么意思| 人体缺钾是什么症状| 甜菊糖苷是什么| 每天泡脚对身体有什么好处| 包菜是什么菜| 观音菩萨叫什么名字| 为什么来姨妈会拉肚子| 成龙真名叫什么名字| 生长激素由什么分泌| 苏州有什么好玩的地方| 痱子长什么样子图片| 程门立雪什么意思| 碱性磷酸酶偏高吃什么能降下来呢| dx什么意思| 男孩学什么技术最好| 粘米是什么米| 3月18日什么星座| 什么是蚂蚁上树| cba是什么意思| 1月7号什么星座| 黑指甲是什么症状图片| 甘油三酯高是什么| 感冒引起的喉咙痛吃什么药| 2月18日什么星座| 什么的枫树| 肿瘤是什么病严重吗| 宜宾燃面为什么叫燃面| 吃什么除湿| 震慑是什么意思| 下一年是什么生肖| 乳和霜有什么区别| 沙门氏菌用什么药| 中国国酒是什么酒| 咿呀咿呀哟是什么歌| 锁骨上有痣代表什么| 盆腔炎用什么药效果好| 11.11什么星座| 口气重是什么原因| 抗核抗体是什么意思| 新股配号数量是什么意思| 生理期不能吃什么水果| 梦见家里办丧事是什么预兆| 菊花什么时候开| 大条是什么意思| 月经前一周是什么期| 卧是什么意思| 网络用语是什么意思| 嗯哼是什么意思| ibm是什么| 什么蘑菇| 什么东西可以减肥| 女主是什么意思| qr是什么意思| 初级会计考什么科目| 儿童咳嗽挂什么科| 毛囊炎是什么症状| 风的孩子叫什么| 脱脂牛奶适合什么人喝| 9.15是什么星座| 梦见网鱼是什么征兆| 尿素氮高吃什么药| 失眠有什么办法解决| 胰腺炎是什么引起的| 夏季吃什么水果| mac是什么牌子口红| 吃什么东西对眼睛好| 属猴的和什么属相最配| 左是什么结构的字| 指甲有竖纹吃什么药| 市盈率和市净率是什么意思| ieg是什么意思| Ecmo医学上是什么意思| 酸笋炒什么好吃| cd138阳性是什么意思| 什么情况下会得甲亢| 男性尿道痒吃什么药| 底线是什么意思| 吃狗肉有什么危害| 平五行属什么| 整编师和师有什么区别| 空腹血糖高吃什么药| 酸菜鱼用什么鱼| 喀秋莎什么意思| 世界上最高的塔是什么塔| 雾化器是干什么用的| 什么的腊梅| 电头是什么| 南字五行属什么| 扑尔敏是什么药| 射手属于什么象星座| 坎什么意思| 小处男是什么意思| 7777什么意思| 六亲不认什么意思| 腺样体是什么意思| 安眠穴在什么位置| 六月十一号是什么星座| 石榴花什么时候开| 晚上喝蜂蜜水有什么好处和坏处| 第二性征是什么意思| 7月14什么星座| 阴道发白是什么原因| 栀子花什么时候开| 风月是什么意思| 脚背肿是什么原因| 过期的维生素e有什么用途| tvt是什么意思| 女人梦见蛇是什么预兆| 龟头敏感吃什么药| 美商是什么意思| 玉兔是什么意思| 胃癌吃什么药| 肺结节手术后吃什么好| 脑内多发缺血灶是什么意思| 鸡胸是什么原因引起的| 腊月初八是什么星座| 买李世民是什么生肖| 一九四六年属什么生肖| 摧枯拉朽什么意思| 腿肿脚肿是什么原因引起的| 肠炎能吃什么食物| 诡异是什么意思| 泸沽湖在什么地方| etf是什么意思| 10月4号是什么星座| 666什么意思| 卡鱼刺去医院挂什么科| 梦见补的牙齿掉了是什么意思| 优雅从容的意思是什么| 伟哥有什么副作用| 芥子是什么意思| 抗日战争什么时候开始的| 青春永驻什么意思| 脚气应该挂什么科| vsop是什么酒| 彼此彼此什么意思| 胯骨在什么位置| 眼睛红肿是什么原因| 什么是太监| 猪心炖什么补气补血| 痛经不能吃什么| 当所有的人离开我的时候是什么歌| 看睾丸去医院挂什么科| 空调不热是什么原因| 发烧吃什么食物比较好| dha每天什么时候吃最好| 粘液丝高是什么原因| 什么是情劫| 11月11号什么星座| 膻是什么意思| 继发性不孕是什么意思| 当你从我眼前慢慢走过是什么歌| 世交是什么意思| pd什么意思| 激光脱毛对身体有什么危害| 果位是什么意思| tp代表什么| 尿白细胞高是什么原因| 消化腺包括什么| 老人脚肿是什么征兆| 痞闷什么意思| 三千烦恼丝什么意思| 杏林指什么| 腿抽筋吃什么药| 姨妈期可以吃什么水果| 水肿吃什么药消肿最快| 壤土适合种植什么植物| 三月20号是什么星座| 什么样的女人不能娶| 蛇为什么怕雄黄| 什么人容易得多囊卵巢| 精卫填海是什么意思| 什么什么的荷叶| 5月27日什么星座| 314是什么日子| 西米是什么东西| 农历8月是什么星座| 什么叫多巴胺| 茄子能治什么病| 什么回大什么| 为什么会失眠| 什么鸟好养又与人亲近| 世界上最大的生物是什么| 上火有什么症状| 蛇蛋是什么样子的| pdi是什么| lyocell是什么面料| 脚后跟疼痛是什么原因| 苹果手机为什么充不进去电| 司南是什么| 2月27是什么星座| 水指什么生肖| scr是什么意思| 五味子不适合什么人喝| 百合花什么时候开花| 标准的青色是什么颜色| 气血不足是什么症状| 开是什么生肖| 得瑟什么意思| 维生素b6吃多了有什么副作用| 蓟什么意思| 血小板减少有什么危害| 黄色上衣配什么颜色裤子| 他是什么意思| 低烧是什么症状和感觉| 吃饱就犯困是什么原因| 真丝丝绒是什么面料| 为什么同房过后会出血| 偷窥什么意思| 淋巴排毒是什么意思| 患得患失什么意思| coa是什么| 夏天做什么菜| 死心是什么意思| 六五年属什么| 十月份出生的是什么星座| 举牌是什么意思| 人造革是什么材质| 一日三餐是什么生肖| hhv是什么病毒| 百度Jump to content

心火旺失眠吃什么药

From Wikipedia, the free encyclopedia
百度 3月23日报道《日本时报》网站2月26日发表了美国退役海军上将、曾任北约军事指挥员的詹姆斯·斯塔夫里迪斯题为《低当量核武器构成极高的威胁》的文章,摘编如下:克里斯托弗·克拉克在他追溯第一次世界大战起源的力作《梦游者:欧洲在1914年是如何走向战争的》一书中写道:这些主角是梦游者,他们戒备而又熟视无睹,被梦困扰,却对自己即将带给世界的恐怖现实视而不见。

Symbol used by Apple and Google on some devices to denote an Ethernet connection

Ethernet (/?i?θ?rn?t/ EE-th?r-net) is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).[1] It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3. Ethernet has since been refined to support higher bit rates, a greater number of nodes, and longer link distances, but retains much backward compatibility. Over time, Ethernet has largely replaced competing wired LAN technologies such as Token Ring, FDDI and ARCNET.

The original 10BASE5 Ethernet uses a thick coaxial cable as a shared medium. This was largely superseded by 10BASE2, which used a thinner and more flexible cable that was both less expensive and easier to use. More modern Ethernet variants use twisted pair and fiber optic links in conjunction with switches. Over the course of its history, Ethernet data transfer rates have been increased from the original 2.94 Mbit/s[2] to the latest 800 Gbit/s, with rates up to 1.6 Tbit/s under development. The Ethernet standards include several wiring and signaling variants of the OSI physical layer.

Systems communicating over Ethernet divide a stream of data into shorter pieces called frames. Each frame contains source and destination addresses, and error-checking data so that damaged frames can be detected and discarded; most often, higher-layer protocols trigger retransmission of lost frames. Per the OSI model, Ethernet provides services up to and including the data link layer.[3] The 48-bit MAC address was adopted by other IEEE 802 networking standards, including IEEE 802.11 (Wi-Fi), as well as by FDDI. EtherType values are also used in Subnetwork Access Protocol (SNAP) headers.

Ethernet is widely used in homes and industry, and interworks well with wireless Wi-Fi technologies. The Internet Protocol is commonly carried over Ethernet and so it is considered one of the key technologies that make up the Internet.

History

[edit]
Accton Etherpocket-SP parallel port Ethernet adapter (c.?1990). Supports both coaxial (10BASE2) and twisted pair (10BASE-T) cables. Power is drawn from a PS/2 port passthrough cable.

Ethernet was developed at Xerox PARC between 1973 and 1974[4][5] as a means to allow Alto computers to communicate with each other.[6] It was inspired by ALOHAnet, which Robert Metcalfe had studied as part of his PhD dissertation[7][8] and was originally called the Alto Aloha Network.[6] Metcalfe's idea was essentially to limit the Aloha-like signals inside a cable, instead of broadcasting into the air. The idea was first documented in a memo that Metcalfe wrote on May 22, 1973, where he named it after the luminiferous aether once postulated to exist as an "omnipresent, completely passive medium for the propagation of electromagnetic waves."[4][9][10]

In 1975, Xerox filed a patent application listing Metcalfe, David Boggs, Chuck Thacker, and Butler Lampson as inventors.[11] In 1976, after the system was deployed at PARC, Metcalfe and Boggs published a seminal paper.[12][a] Ron Crane, Yogen Dalal,[14] Robert Garner, Hal Murray, Roy Ogus, Dave Redell and John Shoch facilitated the upgrade from the original 2.94 Mbit/s protocol to the 10 Mbit/s protocol, which was released to the market in 1980.[15]

Metcalfe left Xerox in June 1979 to form 3Com.[4][16] He convinced Digital Equipment Corporation (DEC), Intel, and Xerox to work together to promote Ethernet as a standard. As part of that process Xerox agreed to relinquish their 'Ethernet' trademark.[17] The first standard was published on September 30, 1980, as "The Ethernet, A Local Area Network. Data Link Layer and Physical Layer Specifications". This so-called DIX standard (Digital Intel Xerox)[18] specified 10 Mbit/s Ethernet, with 48-bit destination and source addresses and a global 16-bit Ethertype-type field.[19] Version 2 was published in November 1982[20] and defines what has become known as Ethernet II. Formal standardization efforts proceeded at the same time and resulted in the publication of IEEE 802.3 on June 23, 1983.[21]

Ethernet initially competed with Token Ring and other proprietary protocols. Ethernet was able to adapt to market needs, and with 10BASE2 shift to inexpensive thin coaxial cable, and from 1990 to the now-ubiquitous twisted pair with 10BASE-T. By the end of the 1980s, Ethernet was clearly the dominant network technology.[4] In the process, 3Com became a major company. 3Com shipped its first 10 Mbit/s Ethernet 3C100 NIC in March 1981, and that year started selling adapters for PDP-11s and VAXes, as well as Multibus-based Intel and Sun Microsystems computers.[22]:?9? This was followed quickly by DEC's Unibus to Ethernet adapter, which DEC sold and used internally to build its own corporate network, which reached over 10,000 nodes by 1986, making it one of the largest computer networks in the world at that time.[23] An Ethernet adapter card for the IBM PC was released in 1982, and, by 1985, 3Com had sold 100,000.[16] In the 1980s, IBM's own PC Network product competed with Ethernet for the PC, and through the 1980s, LAN hardware, in general, was not common on PCs. However, in the mid to late 1980s, PC networking did become popular in offices and schools for printer and fileserver sharing, and among the many diverse competing LAN technologies of that decade, Ethernet was one of the most popular. Parallel port based Ethernet adapters were produced for a time, with drivers for DOS and Windows. By the early 1990s, Ethernet became so prevalent that Ethernet ports began to appear on some PCs and most workstations. This process was greatly sped up with the introduction of 10BASE-T and its relatively small modular connector, at which point Ethernet ports appeared even on low-end motherboards.[citation needed]

Since then, Ethernet technology has evolved to meet new bandwidth and market requirements.[24] In addition to computers, Ethernet is now used to interconnect appliances and other personal devices.[4] As Industrial Ethernet it is used in industrial applications and is quickly replacing legacy data transmission systems in the world's telecommunications networks.[25] By 2010, the market for Ethernet equipment amounted to over $16 billion per year.[26]

Standardization

[edit]
An Intel 82574L Gigabit Ethernet NIC, PCI Express ×1 card

In February 1980, the Institute of Electrical and Electronics Engineers (IEEE) started project 802 to standardize local area networks (LAN).[16][27] The DIX group with Gary Robinson (DEC), Phil Arst (Intel), and Bob Printis (Xerox) submitted the so-called Blue Book CSMA/CD specification as a candidate for the LAN specification.[19] In addition to CSMA/CD, Token Ring (supported by IBM) and Token Bus (selected and henceforward supported by General Motors) were also considered as candidates for a LAN standard. Competing proposals and broad interest in the initiative led to strong disagreement over which technology to standardize. In December 1980, the group was split into three subgroups, and standardization proceeded separately for each proposal.[16]

Delays in the standards process put at risk the market introduction of the Xerox Star workstation and 3Com's Ethernet LAN products. With such business implications in mind, David Liddle (General Manager, Xerox Office Systems) and Metcalfe (3Com) strongly supported a proposal of Fritz R?scheisen (Siemens Private Networks) for an alliance in the emerging office communication market, including Siemens' support for the international standardization of Ethernet (April 10, 1981). Ingrid Fromm, Siemens' representative to IEEE 802, quickly achieved broader support for Ethernet beyond IEEE by the establishment of a competing Task Group "Local Networks" within the European standards body ECMA TC24. In March 1982, ECMA TC24 with its corporate members reached an agreement on a standard for CSMA/CD based on the IEEE 802 draft.[22]:?8? Because the DIX proposal was most technically complete and because of the speedy action taken by ECMA which decisively contributed to the conciliation of opinions within IEEE, the IEEE 802.3 CSMA/CD standard was approved in December 1982.[16] IEEE published the 802.3 standard as a draft in 1983 and as a standard in 1985.[28]

Approval of Ethernet on the international level was achieved by a similar, cross-partisan action with Fromm as the liaison officer working to integrate with International Electrotechnical Commission (IEC) Technical Committee 83 and International Organization for Standardization (ISO) Technical Committee 97 Sub Committee 6. The ISO 8802-3 standard was published in 1989.[29]

Evolution

[edit]

Ethernet has evolved to include higher bandwidth, improved medium access control methods, and different physical media. The multidrop coaxial cable was replaced with physical point-to-point links connected by Ethernet repeaters or switches.[30]

Ethernet stations communicate by sending each other data packets: blocks of data individually sent and delivered. As with other IEEE 802 LANs, adapters come programmed with globally unique 48-bit MAC address so that each Ethernet station has a unique address.[b] The MAC addresses are used to specify both the destination and the source of each data packet. Ethernet establishes link-level connections, which can be defined using both the destination and source addresses. On reception of a transmission, the receiver uses the destination address to determine whether the transmission is relevant to the station or should be ignored. A network interface normally does not accept packets addressed to other Ethernet stations.[c][d]

An EtherType field in each frame is used by the operating system on the receiving station to select the appropriate protocol module (e.g., an Internet Protocol version such as IPv4). Ethernet frames are said to be self-identifying, because of the EtherType field. Self-identifying frames make it possible to intermix multiple protocols on the same physical network and allow a single computer to use multiple protocols together.[31] Despite the evolution of Ethernet technology, all generations of Ethernet (excluding early experimental versions) use the same frame formats.[32] Mixed-speed networks can be built using Ethernet switches and repeaters supporting the desired Ethernet variants.[33]

Due to the ubiquity of Ethernet, and the ever-decreasing cost of the hardware needed to support it, by 2004 most manufacturers built Ethernet interfaces directly into PC motherboards, eliminating the need for a separate network card.[34]

Shared medium

[edit]
Older Ethernet equipment. Clockwise from top-left: An Ethernet transceiver with an in-line 10BASE2 adapter, a similar model transceiver with a 10BASE5 adapter, an AUI cable, a different style of transceiver with 10BASE2 BNC T-connector, two 10BASE5 end fittings (N connectors), an orange vampire tap installation tool (which includes a specialized drill bit at one end and a socket wrench at the other), and an early model 10BASE5 transceiver (h4000) manufactured by DEC. The short length of yellow 10BASE5 cable has one end fitted with an N connector and the other end prepared to have an N connector shell installed; the half-black, half-grey rectangular object through which the cable passes is an installed vampire tap.

Ethernet was originally based on the idea of computers communicating over a shared coaxial cable acting as a broadcast transmission medium. The method used was similar to those used in radio systems,[e] with the common cable providing the communication channel likened to the Luminiferous aether in 19th-century physics, and it was from this reference that the name Ethernet was derived.[35]

Original Ethernet's shared coaxial cable (the shared medium) traversed a building or campus to every attached machine. A scheme known as carrier-sense multiple access with collision detection (CSMA/CD) governed the way the computers shared the channel. This scheme was simpler than competing Token Ring or Token Bus technologies.[f] Computers are connected to an Attachment Unit Interface (AUI) transceiver, which is in turn connected to the cable (with thin Ethernet the transceiver is usually integrated into the network adapter). While a simple passive wire is highly reliable for small networks, it is not reliable for large extended networks, where damage to the wire in a single place, or a single bad connector, can make the whole Ethernet segment unusable.[g]

Through the first half of the 1980s, Ethernet's 10BASE5 implementation used a coaxial cable 0.375 inches (9.5 mm) in diameter, later called thick Ethernet or thicknet. Its successor, 10BASE2, called thin Ethernet or thinnet, used the RG-58 coaxial cable. The emphasis was on making installation of the cable easier and less costly.[36]:?57?

Since all communication happens on the same wire, any information sent by one computer is received by all, even if that information is intended for just one destination.[h] The network interface card interrupts the CPU only when applicable packets are received: the card ignores information not addressed to it.[c] Use of a single cable also means that the data bandwidth is shared, such that, for example, available data bandwidth to each device is halved when two stations are simultaneously active.[37]

A collision happens when two stations attempt to transmit at the same time. They corrupt transmitted data and require stations to re-transmit. The lost data and re-transmission reduces throughput. In the worst case, where multiple active hosts connected with maximum allowed cable length attempt to transmit many short frames, excessive collisions can reduce throughput dramatically. However, a Xerox report in 1980 studied performance of an existing Ethernet installation under both normal and artificially generated heavy load. The report claimed that 98% throughput on the LAN was observed.[38] This is in contrast with token passing LANs (Token Ring, Token Bus), all of which suffer throughput degradation as each new node comes into the LAN, due to token waits. This report was controversial, as modeling showed that collision-based networks theoretically became unstable under loads as low as 37% of nominal capacity. Many early researchers failed to understand these results. Performance on real networks is significantly better.[39]

In a modern Ethernet, the stations do not all share one channel through a shared cable or a simple repeater hub; instead, each station communicates with a switch, which in turn forwards that traffic to the destination station. In this topology, collisions are only possible if station and switch attempt to communicate with each other at the same time, and collisions are limited to this link. Furthermore, the 10BASE-T standard introduced a full duplex mode of operation which became common with Fast Ethernet and the de facto standard with Gigabit Ethernet. In full duplex, switch and station can send and receive simultaneously, and therefore modern Ethernets are completely collision-free.

Repeaters and hubs

[edit]
A 1990s ISA network interface card supporting both coaxial-cable-based 10BASE2 (BNC connector, left) and twisted-pair-based 10BASE-T (8P8C connector, right)

For signal degradation and timing reasons, coaxial Ethernet segments have a restricted size.[40] Somewhat larger networks can be built by using an Ethernet repeater. Early repeaters had only two ports, allowing, at most, a doubling of network size. Once repeaters with more than two ports became available, it was possible to wire the network in a star topology. Early experiments with star topologies (called Fibernet) using optical fiber were published by 1978.[41]

Shared cable Ethernet is always hard to install in offices because its bus topology is in conflict with the star topology cable plans designed into buildings for telephony. Modifying Ethernet to conform to twisted-pair telephone wiring already installed in commercial buildings provided another opportunity to lower costs, expand the installed base, and leverage building design, and, thus, twisted-pair Ethernet was the next logical development in the mid-1980s.

Ethernet on unshielded twisted-pair cables (UTP) began with StarLAN at 1 Mbit/s in the mid-1980s. In 1987 SynOptics introduced the first twisted-pair Ethernet at 10 Mbit/s in a star-wired cabling topology with a central hub, later called LattisNet.[16][35]:?29?[42] These evolved into 10BASE-T, which was designed for point-to-point links only, and all termination was built into the device. This changed repeaters from a specialist device used at the center of large networks to a device that every twisted pair-based network with more than two machines had to use. The tree structure that resulted from this made Ethernet networks easier to maintain by preventing most faults with one peer or its associated cable from affecting other devices on the network.[citation needed]

Despite the physical star topology and the presence of separate transmit and receive channels in the twisted pair and fiber media, repeater-based Ethernet networks still use half-duplex and CSMA/CD, with only minimal activity by the repeater, primarily generation of the jam signal in dealing with packet collisions. Every packet is sent to every other port on the repeater, so bandwidth and security problems are not addressed. The total throughput of the repeater is limited to that of a single link, and all links must operate at the same speed.[35]:?278?

Bridging and switching

[edit]
Patch cables with patch fields of two Ethernet switches

While repeaters can isolate some aspects of Ethernet segments, such as cable breakages, they still forward all traffic to all Ethernet devices. The entire network is one collision domain, and all hosts have to be able to detect collisions anywhere on the network. This limits the number of repeaters between the farthest nodes and creates practical limits on how many machines can communicate on an Ethernet network. Segments joined by repeaters have to all operate at the same speed, making phased-in upgrades impossible.[citation needed]

To alleviate these problems, bridging was created to communicate at the data link layer while isolating the physical layer. With bridging, only well-formed Ethernet packets are forwarded from one Ethernet segment to another; collisions and packet errors are isolated. At initial startup, Ethernet bridges work somewhat like Ethernet repeaters, passing all traffic between segments. By observing the source addresses of incoming frames, the bridge then builds an address table associating addresses to segments. Once an address is learned, the bridge forwards network traffic destined for that address only to the associated segment, improving overall performance. Broadcast traffic is still forwarded to all network segments. Bridges also overcome the limits on total segments between two hosts and allow the mixing of speeds, both of which are critical to the incremental deployment of faster Ethernet variants.[citation needed]

In 1989, Motorola Codex introduced their 6310 EtherSpan, and Kalpana introduced their EtherSwitch; these were examples of the first commercial Ethernet switches.[i] Early switches such as this used cut-through switching where only the header of the incoming packet is examined before it is either dropped or forwarded to another segment.[43] This reduces the forwarding latency. One drawback of this method is that it does not readily allow a mixture of different link speeds. Another is that packets that have been corrupted are still propagated through the network. The eventual remedy for this was a return to the original store and forward approach of bridging, where the packet is read into a buffer on the switch in its entirety, its frame check sequence verified and only then the packet is forwarded.[43] In modern network equipment, this process is typically done using application-specific integrated circuits allowing packets to be forwarded at wire speed.[citation needed]

When a twisted pair or fiber link segment is used and neither end is connected to a repeater, full-duplex Ethernet becomes possible over that segment. In full-duplex mode, both devices can transmit and receive to and from each other at the same time, and there is no collision domain.[44] This doubles the aggregate bandwidth of the link and is sometimes advertised as double the link speed (for example, 200 Mbit/s for Fast Ethernet).[j] The elimination of the collision domain for these connections also means that all the link's bandwidth can be used by the two devices on that segment and that segment length is not limited by the constraints of collision detection.

Since packets are typically delivered only to the port they are intended for, traffic on a switched Ethernet is less public than on shared-medium Ethernet. Despite this, switched Ethernet should still be regarded as an insecure network technology, because it is easy to subvert switched Ethernet systems by means such as ARP spoofing and MAC flooding.[citation needed][45]

The bandwidth advantages, the improved isolation of devices from each other, the ability to easily mix different speeds of devices and the elimination of the chaining limits inherent in non-switched Ethernet have made switched Ethernet the dominant network technology.[46]

Advanced networking

[edit]
A core Ethernet switch

Simple switched Ethernet networks, while a great improvement over repeater-based Ethernet, suffer from single points of failure, attacks that trick switches or hosts into sending data to a machine even if it is not intended for it, scalability and security issues with regard to switching loops, broadcast radiation, and multicast traffic.[citation needed]

Advanced networking features in switches use Shortest Path Bridging (SPB) or the Spanning Tree Protocol (STP) to maintain a loop-free, meshed network, allowing physical loops for redundancy (STP) or load-balancing (SPB). Shortest Path Bridging includes the use of the link-state routing protocol IS-IS to allow larger networks with shortest path routes between devices.

Advanced networking features also ensure port security, provide protection features such as MAC lockdown[47] and broadcast radiation filtering, use VLANs to keep different classes of users separate while using the same physical infrastructure, employ multilayer switching to route between different classes, and use link aggregation to add bandwidth to overloaded links and to provide some redundancy.[citation needed]

In 2016, Ethernet replaced InfiniBand as the most popular system interconnect of TOP500 supercomputers.[48]

Varieties

[edit]
An Ethernet port on a laptop computer connected to a twisted pair cable with an 8P8C modular connector

The Ethernet physical layer evolved over a considerable time span and encompasses coaxial, twisted pair and fiber-optic physical media interfaces, with speeds from 1 Mbit/s to 400 Gbit/s.[49] The first introduction of twisted-pair CSMA/CD was StarLAN, standardized as 802.3 1BASE5.[50] While 1BASE5 had little market penetration, it defined the physical apparatus (wire, plug/jack, pin-out, and wiring plan) that would be carried over to 10BASE-T through 10GBASE-T.

The most common forms used are 10BASE-T, 100BASE-TX, and 1000BASE-T. All three use twisted-pair cables and 8P8C modular connectors. They run at 10 Mbit/s, 100 Mbit/s, and 1 Gbit/s, respectively.[51][52][53]

Fiber optic variants of Ethernet (that commonly use SFP modules) are also very popular in larger networks, offering high performance, better electrical isolation and longer distance (tens of kilometers with some versions). In general, network protocol stack software will work similarly on all varieties.[54]

Frame structure

[edit]
A close-up of the SMSC LAN91C110 (SMSC 91x) chip, an embedded Ethernet chip

In IEEE 802.3, a datagram is called a packet or frame. Packet is used to describe the overall transmission unit and includes the preamble, start frame delimiter (SFD) and carrier extension (if present).[k] The frame begins after the start frame delimiter with a frame header featuring source and destination MAC addresses and the EtherType field giving either the protocol type for the payload protocol or the length of the payload. The middle section of the frame consists of payload data including any headers for other protocols (for example, Internet Protocol) carried in the frame. The frame ends with a 32-bit cyclic redundancy check, which is used to detect corruption of data in transit.[55]:?sections 3.1.1 and 3.2? Notably, Ethernet packets have no time-to-live field, leading to possible problems in the presence of a switching loop.

Autonegotiation

[edit]

Autonegotiation is the procedure by which two connected devices choose common transmission parameters, e.g. speed and duplex mode. Autonegotiation was initially an optional feature, first introduced with 100BASE-TX (1995 IEEE 802.3u Fast Ethernet standard), and is backward compatible with 10BASE-T. The specification was improved in the 1998 release of IEEE 802.3. Autonegotiation is mandatory for 1000BASE-T and faster.

Error conditions

[edit]

Switching loop

[edit]

A switching loop or bridge loop occurs in computer networks when there is more than one Layer 2 (OSI model) path between two endpoints (e.g. multiple connections between two network switches or two ports on the same switch connected to each other). The loop creates broadcast storms as broadcasts and multicasts are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flooding the network. Since the Layer 2 header does not support a time to live (TTL) value, if a frame is sent into a looped topology, it can loop forever.[56]

A physical topology that contains switching or bridge loops is attractive for redundancy reasons, yet a switched network must not have loops. The solution is to allow physical loops, but create a loop-free logical topology using the SPB protocol or the older STP on the network switches.[citation needed]

Jabber

[edit]

A node that is sending longer than the maximum transmission window for an Ethernet packet is considered to be jabbering. Depending on the physical topology, jabber detection and remedy differ somewhat.

  • An MAU is required to detect and stop abnormally long transmission from the DTE (longer than 20–150 ms) in order to prevent permanent network disruption.[57]
  • On an electrically shared medium (10BASE5, 10BASE2, 1BASE5), jabber can only be detected by each end node, stopping reception. No further remedy is possible.[58]
  • A repeater/repeater hub uses a jabber timer that ends retransmission to the other ports when it expires. The timer runs for 25,000 to 50,000 bit times for 1 Mbit/s,[59] 40,000 to 75,000 bit times for 10 and 100 Mbit/s,[60][61] and 80,000 to 150,000 bit times for 1 Gbit/s.[62] Jabbering ports are partitioned off the network until a carrier is no longer detected.[63]
  • End nodes utilizing a MAC layer will usually detect an oversized Ethernet frame and cease receiving. A bridge/switch will not forward the frame.[64]
  • A non-uniform frame size configuration in the network using jumbo frames may be detected as jabber by end nodes.[citation needed] Jumbo frames are not part of the official IEEE 802.3 Ethernet standard.
  • A packet detected as jabber by an upstream repeater and subsequently cut off has an invalid frame check sequence and is dropped.[65]

Runt frames

[edit]
  • Runts are packets or frames smaller than the minimum allowed size. They are dropped and not propagated.[66]

See also

[edit]

Notes

[edit]
  1. ^ The experimental Ethernet described in the 1976 paper ran at 2.94 Mbit/s and has eight-bit destination and source address fields, so the original Ethernet addresses are not the MAC addresses they are today.[13] By software convention, the 16 bits after the destination and source address fields specify a "packet type", but, as the paper says, "different protocols use disjoint sets of packet types". Thus the original packet types could vary within each different protocol. This is in contrast to the EtherType in the IEEE Ethernet standard, which specifies the protocol being used.
  2. ^ In some cases, the factory-assigned address can be overridden, either to avoid an address change when an adapter is replaced or to use locally administered addresses.
  3. ^ a b Unless it is put into promiscuous mode.
  4. ^ Of course bridges and switches will accept other addresses for forwarding the packet.
  5. ^ There are fundamental differences between wireless and wired shared-medium communication, such as the fact that it is much easier to detect collisions in a wired system than a wireless system.
  6. ^ In a CSMA/CD system packets must be large enough to guarantee that the leading edge of the propagating wave of a message gets to all parts of the medium and back again before the transmitter stops transmitting, guaranteeing that collisions (two or more packets initiated within a window of time that forced them to overlap) are discovered. As a result, the minimum packet size and the physical medium's total length are closely linked.
  7. ^ Multipoint systems are also prone to strange failure modes when an electrical discontinuity reflects the signal in such a manner that some nodes would work properly, while others work slowly because of excessive retries or not at all. See standing wave for an explanation. These could be much more difficult to diagnose than a complete failure of the segment.
  8. ^ This one speaks, all listen property is a security weakness of shared-medium Ethernet, since a node on an Ethernet network can eavesdrop on all traffic on the wire if it so chooses.
  9. ^ The term switch was invented by device manufacturers and does not appear in the IEEE 802.3 standard.
  10. ^ This is misleading, as performance will double only if traffic patterns are symmetrical.
  11. ^ The carrier extension is defined to assist collision detection on shared-media gigabit Ethernet.

References

[edit]
  1. ^ Ralph Santitoro (2003). "Metro Ethernet Services – A Technical Overview" (PDF). mef.net. Archived from the original (PDF) on December 22, 2018. Retrieved January 9, 2016.
  2. ^ Xerox (August 1976). "Alto: A Personal Computer System Hardware Manual" (PDF). Xerox. p. 37. Archived (PDF) from the original on September 4, 2017. Retrieved August 25, 2015.
  3. ^ Charles M. Kozierok (September 20, 2005). "Data Link Layer (Layer 2)". tcpipguide.com. Archived from the original on May 20, 2019. Retrieved January 9, 2016.
  4. ^ a b c d e The History of Ethernet. NetEvents.tv. 2006. Archived from the original on December 11, 2021. Retrieved September 10, 2011.
  5. ^ "Ethernet Prototype Circuit Board". Smithsonian National Museum of American History. 1973. Archived from the original on October 28, 2014. Retrieved September 2, 2007.
  6. ^ a b Joanna Goodrich (November 16, 2023). "Ethernet is Still Going Strong After 50 Years". IEEE Spectrum.
  7. ^ Gerald W. Brock (September 25, 2003). The Second Information Revolution. Harvard University Press. p. 151. ISBN 0-674-01178-3.
  8. ^ Metz, Cade (March 22, 2023). "Turing Award Won by Co-Inventor of Ethernet Technology". The New York Times. Archived from the original on March 23, 2023. Retrieved March 23, 2023.
  9. ^ Cade Metz (March 13, 2009). "Ethernet – a networking protocol name for the ages: Michelson, Morley, and Metcalfe". The Register. p. 2. Archived from the original on November 8, 2012. Retrieved March 4, 2013.
  10. ^ Mary Bellis. "Inventors of the Modern Computer". About.com. Archived from the original on July 11, 2012. Retrieved September 10, 2011.
  11. ^ U.S. patent 4,063,220 "Multipoint data communication system (with collision detection)"
  12. ^ Robert Metcalfe; David Boggs (July 1976). "Ethernet: Distributed Packet Switching for Local Computer Networks" (PDF). Communications of the ACM. 19 (7): 395–405. doi:10.1145/360248.360253. S2CID 429216. Archived (PDF) from the original on March 15, 2016. Retrieved August 25, 2015.
  13. ^ John F. Shoch; Yogen K. Dalal; David D. Redell; Ronald C. Crane (August 1982). "Evolution of the Ethernet Local Computer Network" (PDF). IEEE Computer. 15 (8): 14–26. doi:10.1109/MC.1982.1654107. S2CID 14546631. Archived (PDF) from the original on August 15, 2011. Retrieved April 7, 2011.
  14. ^ Pelkey, James L. (2007). "Yogen Dalal". Entrepreneurial Capitalism and Innovation: A History of Computer Communications, 1968–1988. Archived from the original on September 5, 2019. Retrieved September 5, 2019.
  15. ^ "Introduction to Ethernet Technologies". www.wband.com. WideBand Products. Archived from the original on April 10, 2018. Retrieved April 9, 2018.
  16. ^ a b c d e f von Burg, Urs; Kenney, Martin (December 2003). "Sponsors, Communities, and Standards: Ethernet vs. Token Ring in the Local Area Networking Business" (PDF). Industry & Innovation. 10 (4): 351–375. doi:10.1080/1366271032000163621. S2CID 153804163. Archived from the original (PDF) on December 6, 2011. Retrieved February 17, 2014.
  17. ^ Charles E. Spurgeon (2000). "Chapter 1. The Evolution of Ethernet". Ethernet: The Definitive Guide. ISBN 1565926609. Archived from the original on December 5, 2018. Retrieved December 4, 2018.
  18. ^ "Ethernet: Bridging the communications gap". Hardcopy. March 1981. p. 12.
  19. ^ a b Digital Equipment Corporation; Intel Corporation; Xerox Corporation (September 30, 1980). "The Ethernet, A Local Area Network. Data Link Layer and Physical Layer Specifications, Version 1.0" (PDF). Xerox Corporation. Archived (PDF) from the original on August 25, 2019. Retrieved December 10, 2011. {{cite journal}}: Cite journal requires |journal= (help)
  20. ^ Digital Equipment Corporation; Intel Corporation; Xerox Corporation (November 1982). "The Ethernet, A Local Area Network. Data Link Layer and Physical Layer Specifications, Version 2.0" (PDF). Xerox Corporation. Archived (PDF) from the original on December 15, 2011. Retrieved December 10, 2011. {{cite journal}}: Cite journal requires |journal= (help)
  21. ^ "IEEE 802.3 'Standard for Ethernet' Marks 30 Years of Innovation and Global Market Growth" (Press release). IEEE. June 24, 2013. Archived from the original on January 12, 2014. Retrieved January 11, 2014.
  22. ^ a b Robert Breyer; Sean Riley (1999). Switched, Fast, and Gigabit Ethernet. Macmillan. ISBN 1-57870-073-6.
  23. ^ Jamie Parker Pearson (1992). Digital at Work. Digital Press. p. 163. ISBN 1-55558-092-0.
  24. ^ Rick Merritt (December 20, 2010). "Shifts, growth ahead for 10G Ethernet". E Times. Archived from the original on January 18, 2012. Retrieved September 10, 2011. {{cite journal}}: Cite journal requires |journal= (help)
  25. ^ "My oh My – Ethernet Growth Continues to Soar; Surpasses Legacy". Telecom News Now. July 29, 2011. Archived from the original on November 18, 2011. Retrieved September 10, 2011.
  26. ^ Jim Duffy (February 22, 2010). "Cisco, Juniper, HP drive Ethernet switch market in Q4". Network World. International Data Group. Archived from the original on August 11, 2019. Retrieved August 11, 2019.
  27. ^ Vic Hayes (August 27, 2001). "Letter to FCC" (PDF). Archived from the original (PDF) on July 27, 2011. Retrieved October 22, 2010. IEEE 802 has the basic charter to develop and maintain networking standards... IEEE 802 was formed in February 1980...
  28. ^ IEEE 802.3-2008, p.iv
  29. ^ "ISO 8802-3:1989". ISO. Archived from the original on July 9, 2015. Retrieved July 8, 2015.
  30. ^ Jim Duffy (April 20, 2009). "Evolution of Ethernet". Network World. Archived from the original on June 11, 2017. Retrieved January 1, 2016.
  31. ^ Douglas E. Comer (2000). Internetworking with TCP/IP – Principles, Protocols and Architecture (4th ed.). Prentice Hall. ISBN 0-13-018380-6. 2.4.9 – Ethernet Hardware Addresses, p. 29, explains the filtering.
  32. ^ Iljitsch van Beijnum (July 15, 2011). "Speed matters: how Ethernet went from 3Mbps to 100Gbps... and beyond". Ars Technica. Archived from the original on July 9, 2012. Retrieved July 15, 2011. All aspects of Ethernet were changed: its MAC procedure, the bit encoding, the wiring... only the packet format has remained the same.
  33. ^ Fast Ethernet Turtorial, Lantronix, December 9, 2014, archived from the original on November 28, 2015, retrieved January 1, 2016
  34. ^ Geetaj Channana (November 1, 2004). "Motherboard Chipsets Roundup". PCQuest. Archived from the original on July 8, 2011. Retrieved October 22, 2010. While comparing motherboards in the last issue we found that all motherboards support Ethernet connection on board.
  35. ^ a b c Charles E. Spurgeon (2000). Ethernet: The Definitive Guide. O'Reilly. ISBN 978-1-56592-660-8.
  36. ^ Heinz-Gerd Hegering; Alfred Lapple (1993). Ethernet: Building a Communications Infrastructure. Addison-Wesley. ISBN 0-201-62405-2.
  37. ^ Ethernet Tutorial – Part I: Networking Basics, Lantronix, December 9, 2014, archived from the original on February 13, 2016, retrieved January 1, 2016
  38. ^ Shoch, John F.; Hupp, Jon A. (December 1980). "Measured performance of an Ethernet local network". Communications of the ACM. 23 (12). ACM Press: 711–721. doi:10.1145/359038.359044. ISSN 0001-0782. S2CID 1002624.
  39. ^ Boggs, D.R.; Mogul, J.C. & Kent, C.A. (September 1988). "Measured capacity of an Ethernet: myths and reality" (PDF). DEC WRL. Archived (PDF) from the original on March 2, 2012. Retrieved December 20, 2012. {{cite journal}}: Cite journal requires |journal= (help)
  40. ^ "Ethernet Media Standards and Distances". kb.wisc.edu. Archived from the original on June 19, 2010. Retrieved October 10, 2017.
  41. ^ Eric G. Rawson; Robert M. Metcalfe (July 1978). "Fibemet: Multimode Optical Fibers for Local Computer Networks" (PDF). IEEE Transactions on Communications. 26 (7): 983–990. doi:10.1109/TCOM.1978.1094189. Archived (PDF) from the original on August 15, 2011. Retrieved June 11, 2011.
  42. ^ Urs von Burg (2001). The Triumph of Ethernet: technological communities and the battle for the LAN standard. Stanford University Press. p. 175. ISBN 0-8047-4094-1. Archived from the original on January 9, 2017. Retrieved September 23, 2016.
  43. ^ a b Robert J. Kohlhepp (October 2, 2000). "The 10 Most Important Products of the Decade". Network Computing. Archived from the original on January 5, 2010. Retrieved February 25, 2008.
  44. ^ Nick Pidgeon (April 2000). "Full-duplex Ethernet". How Stuff Works. Archived from the original on June 4, 2020. Retrieved February 3, 2020.
  45. ^ Wang, Shuangbao Paul; Ledley, Robert S. (October 25, 2012). Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems. John Wiley & Sons. ISBN 978-1-118-16883-7. Archived from the original on March 15, 2021. Retrieved October 2, 2020.
  46. ^ "Token Ring-to-Ethernet Migration". Cisco. Archived from the original on July 8, 2011. Retrieved October 22, 2010. Respondents were first asked about their current and planned desktop LAN attachment standards. The results were clear—switched Fast Ethernet is the dominant choice for desktop connectivity to the network
  47. ^ David Davis (October 11, 2007). "Lock down Cisco switch port security". Archived from the original on July 31, 2020. Retrieved April 19, 2020.
  48. ^ "HIGHLIGHTS – JUNE 2016". June 2016. Archived from the original on January 30, 2021. Retrieved February 19, 2021. InfiniBand technology is now found on 205 systems, down from 235 systems, and is now the second most-used internal system interconnect technology. Gigabit Ethernet has risen to 218 systems up from 182 systems, in large part thanks to 176 systems now using 10G interfaces.
  49. ^ "[STDS-802-3-400G] IEEE P802.3bs Approved!". IEEE 802.3bs Task Force. Archived from the original on June 12, 2018. Retrieved December 14, 2017.
  50. ^ "1BASE5 Medium Specification (StarLAN)". cs.nthu.edu.tw. December 28, 1996. Archived from the original on July 10, 2015. Retrieved November 11, 2014.
  51. ^ IEEE 802.3 14. Twisted-pair medium attachment unit (MAU) and baseband medium, type 10BASE-T including type 10BASE-Te
  52. ^ IEEE 802.3 25. Physical Medium Dependent (PMD) sublayer and baseband medium, type 100BASE-TX
  53. ^ IEEE 802.3 40. Physical Coding Sublayer (PCS), Physical Medium Attachment (PMA) sublayer and baseband medium, type 1000BASE-T
  54. ^ IEEE 802.3 4.3 Interfaces to/from adjacent layers
  55. ^ "802.3-2012 – IEEE Standard for Ethernet". IEEE. IEEE Standards Association. December 28, 2012. Archived from the original (PDF) on February 23, 2014. Retrieved February 8, 2014.
  56. ^ "Layer 2 Switching Loops in Network Explained". ComputerNetworkingNotes. Archived from the original on January 8, 2022. Retrieved January 8, 2022.
  57. ^ IEEE 802.3 8.2 MAU functional specifications
  58. ^ IEEE 802.3 8.2.1.5 Jabber function requirements
  59. ^ IEEE 802.3 12.4.3.2.3 Jabber function
  60. ^ IEEE 802.3 9.6.5 MAU Jabber Lockup Protection
  61. ^ IEEE 802.3 27.3.2.1.4 Timers
  62. ^ IEEE 802.3 41.2.2.1.4 Timers
  63. ^ IEEE 802.3 27.3.1.7 Receive jabber functional requirements
  64. ^ IEEE 802.1 Table C-1—Largest frame base values
  65. ^ "3.1.1 Packet format", 802.3-2012 - IEEE Standard for Ethernet (PDF), IEEE Standards Association, December 28, 2012, retrieved July 5, 2015
  66. ^ "Troubleshooting Ethernet". Cisco. Archived from the original on March 3, 2021. Retrieved May 18, 2021.

Further reading

[edit]
[edit]
胆固醇高不能吃什么 长期口臭要看什么科 坚果补充什么营养成分 保护心脏吃什么最好 消失是什么意思
做梦梦到鱼是什么意思 内务是什么意思 拉肚子可以吃什么药 2007是什么年 处理是什么意思
什么人容易得红斑狼疮 印刷厂主要做什么 抗宫炎片主要治什么 左边太阳穴疼是什么原因 哪吒是一个什么样的人
头上出汗多是什么原因 护照和签证有什么区别 贫血做什么检查能查出来 上善若水下一句是什么 嫂嫂是什么意思
点状钙化灶是什么意思hcv8jop4ns2r.cn fte是什么意思wzqsfys.com 人格什么意思hcv9jop1ns3r.cn fda是什么意思hcv9jop1ns9r.cn 心管是什么部位hcv9jop2ns3r.cn
生脉饮适合什么人群hcv8jop9ns2r.cn 番茄是什么520myf.com 北极为什么没有企鹅hcv9jop8ns3r.cn 溦是什么意思hcv9jop7ns9r.cn 三点水一个半读什么hcv7jop6ns1r.cn
空气炸锅能做什么hcv9jop4ns6r.cn 勇气是什么xinjiangjialails.com 来月经为什么会头疼hcv8jop2ns2r.cn 舌面有裂纹是什么原因hcv8jop2ns2r.cn 愿闻其详是什么意思hcv8jop0ns7r.cn
大便黑色什么原因hcv9jop2ns6r.cn 不倒翁是什么意思hcv9jop7ns2r.cn d二聚体是什么hcv7jop7ns2r.cn 什么家庭养出自私冷漠hcv8jop3ns8r.cn 每天喝牛奶有什么好处xinmaowt.com
百度