Home » networking »
Ethernet
Ethernet is the most common type of connection computers use in a Local Area Network (LAN). An Ethernet port looks much like a regular phone jack, but it is slightly wider. This port can be used to connect your computer to another computer, a local network, or an external DSL or cable modem.
Ethernet was originally developed by Xerox from an earlier specification called Alohanet (for the Palo Alto Research Center Aloha network) and then developed further by Xerox, DEC, and Intel. An Ethernet LAN typically uses coaxial cable or special grades of twisted pair wires. Ethernet is also used in wireless LANs.
Two widely-used forms of Ethernet are:
- 10BaseT: In a 10BaseT Ethernet connection, data transfer speeds can reach 10 mbps (megabits per second) through a copper cable.
- 100BaseT: In a 100BaseT Ethernet connection, transfer speeds can get up to 100 mbps.
The most commonly installed Ethernet systems are called 10BASE-T and provide transmission speeds up to 10 Mbps. Devices are connected to the cable and compete for access using a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol.
Ethernet uses a bus or star topology and supports data transfer rates of 10 Mbps. The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers. Ethernet uses the CSMA/CD access method to handle simultaneous demands. It is one of the most widely implemented LAN standards.
Ethernet was named by Robert Metcalfe, one of its developers, for the passive substance called “luminiferous (light-transmitting) ether” that was once thought to pervade the universe, carrying light throughout.
Ethernet was so- named to describe the way that cabling, also a passive medium, could similarly carry data everywhere throughout the network. The name came from the physical concept of the ether. It defines a number of wiring and signaling standards for the Physical Layer of the OSI networking model as well as a common addressing format and Media Access Control at the Data Link Layer.
Posted in
networking
Related posts:
If you enjoyed this article, subscribe to receive more great content just like it.
Recent Stories
Recent Comments
Tag Cloud
Disclaimer
JUST LIKE IN ANY OTHER BLOGGER IN THE BLOG SPHERE, THIS BLOGGER DOES NOT CLAIM OWNERSHIP IN ANY INFORMATION HEREIN POSTED. INFOTECHGUIDE.BLOGSPOT.COM IS DESIGNED TO PROVIDE BASIC INFORMATION ABOUT INFORMATION TECHNOLOGY THAT INTEREST USUAL ONLINE READERS. IF YOU HAVE ANY CONCERN AND SUGGESTION ABOUT THIS SITE PLEASE FEEL FREE TO CONTACT US OR LEAVE A COMMENT FOR THE APPROPRIATE ADJUSTMENT
Labels
- Computer Tips and Tricks (8)
- Content Management System (1)
- Data Structures using Java (15)
- Database Management Systems (2)
- File Formats (7)
- Gadgets Reviews (2)
- Games Reviews (2)
- hardware (16)
- Internet Terms (7)
- Management Information System (5)
- networking (8)
- Programming (15)
- sofware (17)
- Tech News (4)
- Web Design (4)
0 comments for this post
Leave a reply