Ethernet describes a tech­no­logy for cabled data networks that connect software and/or hardware with each other. This mostly takes place via LAN cables, which is why Ethernet is also sometimes referred to as LAN tech­no­logy. In this way, Ethernet enables data exchanges between end devices. These could be computers, printers, servers, routers, or others. When combined into a local network, these devices establish con­nec­tions via the Ethernet protocol and can exchange data packages with one another. The current and most widely dis­trib­uted protocol is IEEE 802.3.

Ethernet was developed back in the early 1970s, but the network system was ori­gin­ally only used in­tern­ally by the company Xerox. At the start of the 1980s, Ethernet was developed into a stand­ard­ised product. However, Ethernet still wasn’t widely used until the middle of the decade when several man­u­fac­tur­ing companies started to work with Ethernet and related products. The tech­no­logy made a sig­ni­fic­ant con­tri­bu­tion to the way that the personal computer re­volu­tion­ised the working world. Today, the widely-dis­trib­uted IEEE standard 802.3 is used in offices, private house­holds, con­tain­ers, and carriers.

While the first version of the tech­no­logy only had a speed of 3 megabits per second, Ethernet protocol today enables speeds of up to 1.000 megabits per second. Earlier Ethernets were limited to a building, but today Ethernet can cover a range of just over 6 miles with the use of fiber optic cables. Over the course of its de­vel­op­ment, Ethernet has taken over a dominant role among LAN tech­no­logy and out­per­formed various com­pet­it­ors. In addition, today real-time Ethernet is the industry standard for com­mu­nic­a­tion ap­plic­a­tions.

Defin­i­tion

Ethernet refers to a tech­no­logy that allows devices connected by cables within a data network to com­mu­nic­ate with one another. In an Ethernet, connected devices can build a network and exchange data packages. In this way, a local network (LAN) is created via Ethernet con­nec­tions.

How does Ethernet work? Then and now

Every device in an Ethernet network receives its own 48-bit address, called the MAC address. Par­ti­cipants in the same network can exchange high-frequency messages. For this, Ethernet uses baseband and mul­ti­plex­ing. The smooth CSMA/CD (carrier sense multiple access/collision detection) algorithm is used for com­mu­nic­a­tion with one another. The network topology of Ethernet is logical, so the structure can be im­ple­men­ted as a bus or star, for example.

Com­mu­nic­a­tion with this algorithm is similar to a round table dis­cus­sion, where each par­ti­cipant lets the other speak out. If two messages collide, then the par­ti­cipants try to send them out again at random intervals. Because a com­mu­nic­a­tion has to be sent as well as received to be suc­cess­ful, there can’t be any data jams – for example, if a sent message is too strong for a re­l­at­ively weak reception per­form­ance. Otherwise, data may be lost. Signal speed and transfer rates control the smooth com­mu­nic­a­tion by defining rules for the data frames.

To prevent a data collision, a cor­res­pond­ing signal has to reach the receiver before the data package. Because most networks these days function in full-duplex mode, though, this is rarely a problem. But it was quite important for the earlier de­vel­op­ment of the Ethernet tech­no­logy.

Ori­gin­ally, each message that was sent within a network went to all connected devices. These then had to filter through all received data and decide whether it was relevant to them. This common bus enabled broadcast messages, but also recorded all data traffic for each member – clearly a security gap of early Ethernet. Data could be encrypted, but data traffic itself couldn’t be in­di­vidu­ally con­trolled. Hubs also couldn’t close this security gap. Bridges and switches are a solution in modern networks, as they can be used to segment the Ethernet.

This tech­no­logy doesn’t solve all problems, though. Abuse by MAC flooding or MAC spoofing, for example, still poses a danger for the stability of the network and the security of the com­mu­nic­ated data packages. Working securely with Ethernet therefore requires serious use of all connected systems and regular data analysis (e.g. LAN analysis) to uncover potential cases of misuse or dis­turb­ances.

As long as an Ethernet’s data amount isn’t at capacity, it functions well. Capacity util­isa­tion rates of more than 50 percent can cause data jams, though. As personal computers developed tech­no­lo­gic­ally and con­tinu­ously increased their data volume, Ethernet networks also had to develop further to keep pace with the progress of tech­no­logy. Switches are re­spons­ible for ef­fi­ciently dividing data packages and min­im­ising the risk of col­li­sions. Modern cable tech­no­lo­gies like twisted pair and fiber optic have higher transfer rates meet the modern re­quire­ments for a network.

Another in­nov­a­tion is ‘Ethernet flow control’. With this mechanism, data transfer can tem­por­ar­ily be stopped to alleviate data flow from another location. This is es­pe­cially practical in full-duplex mode when a network serves a re­l­at­ively high number of end devices. The flow control for specific members of the network is tem­por­ar­ily cut off to optimise the overall re­li­ab­il­ity of the network. This can also cause losses in speed, though, which can then be stemmed by other mech­an­isms such as the trans­mis­sion control protocol.

In the past, Ethernet primarily used con­ven­tion­al coaxial cables. Today, twisted pair copper cables and fiber optical cables are the industry standard, as they enable much faster transfer rates and a larger range. Another advantage is that copper cables can also supply power to connected devices. This method, called ‘power over Ethernet’ (PoE), is specified in IEEE 802.3af and enables energy-efficient networks.

The history of Ethernet

Ethernet developed from ALOHAnet, a radio-based network from the Uni­ver­sity of Hawaii. In the Xerox Palo Alto Research Center, the visionary Robert Metcalfe was already working on an early version of the cabled Ethernet protocol at the beginning of the 1970s. It was intended to make work within the company easier first, and then be actively tested. The test phase peaked in 1976 with a sci­entif­ic paper, published by Metcalfe together with David Boggs. It described local networks of connected personal computers.

In 1979, Metcalfe founded his own company 3com to push forward with the de­vel­op­ment of computers and LAN and establish Ethernet as standard. In 1980, he made his break­through with the adoption of Ethernet 1.0, which was then further developed by the Institute of Elec­tric­al and Elec­tron­ics Engineers (IEEE). This process led to the invention of other tech­no­lo­gies, including the CSMA/CD (carrier sense multiple access/collision detection) protocol, which later became known as IEEE 802.3. It also brought about the ground­break­ing protocols token bus (802.4) and token ring (802.5).

Between 1983 and 1986, the in­nov­a­tions Chea­p­er­net, Ethernet-on-Broadband, and StarLAN arrived on the scene before the Ethernet standard had started to receive more attention from many man­u­fac­tur­ers. As a result, some small companies started to use Ethernet networks in the workplace, but still via telephone-based four-wire lines. Ethernet con­nec­tions via twisted pair and fiber optic cables weren’t developed until the early 1990s, which lead to the in­tro­duc­tion of the 100 MB/s standard for Ethernet according to IEEE 802.3u in 1995. A standard for wireless LAN (802.11) was adopted at the same time. 1995 is con­sidered the birth year of the modern internet.

Overview: Ethernet tech­no­lo­gies and terms

Tech­no­logy/Term Ex­plan­a­tion
LAN (local area network) Computer network that locally connects multiple systems with one another
Switching Switching regulates the path of a data package in the network; Entrances and exits for packages are defined according to sender and receiver
Ethernet flow control Data transfer in the Ethernet is tem­por­ar­ily stopped; The goal is less data loss and more ef­fi­ciency
CSMA/CD (carrier sense multiple access/collision detection) Media access method that de­term­ines which systems in a network may access a transfer medium; prevents col­li­sions
Ethernet frame/data frame Protocol unit that contains important in­form­a­tion for data trans­mis­sion, including MAC address
MAC address/device address Uniquely assigned address for each device in the computer network
PoE (power over Ethernet) The Ethernet cable can provide the target device with power
Coaxial cable Two-layer cable, up to 10 MB/s (outdated tech­no­logy)
Twisted pair cable Cable with twisted wire pairs, enables PoE, up to 10 GB/s
Fiber optic cable Optical fiber, high range, enormous trans­mis­sion rates possible (the­or­et­ic­ally up to 70 TB/s)
Half-duplex mode Com­mu­nic­a­tion can only be sent in one rotating direction
Full-duplex mode Com­mu­nic­a­tion is sent in both direction at the same time

Overview: Ethernet standards

Ethernet standard Des­ig­na­tion Data rate Cable tech­no­logy Release year
802.3 10Base5 10 MB/s Coaxial cable 1983
802.3a 10Base2 10 MB/s Coaxial cable 1988
802.3i 10Base-T 10 MB/s Twisted pair cable 1990
802.3j 10Base-FL 10 MB/s Fiber optic cable 1992
802.3u 100Base-TX100Base-FX100Base-SX 100 MB/s Twisted pair cable, fiber optic cable 1995
802.3z 1000Base-SX1000Base-LX 1 GB/s Fiber optic cable 1998
802.3ab 1000Base-T 1 GB/s Twisted pair cable 1999
802.3ae 10GBase-SR10GBase-SW10GBase-LR10GBase-LW10GBase-ER10GBase-EW10GBase-LX4 10 GB/s Fiber optic cable 2002
802.an 10GBase-T 10 GB/s Twisted pair cable 2006
Go to Main Menu