pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Ethernet

Ethernet was developed in the mid 1970s by the Xerox Corporation, and in 1979 Digital Equipment Corporation DEC) and Intel joined forces with Xerox to standardize the system. The first specification by the three companies called the Ethernet Blue Book was released in 1980, it was also known as the DIX standard after the collaborators’ initials. It was a 10 Mbit/s system that used a large coaxial cable backbone cable running throughout a building, with smaller coaxial cables tapped off at 2.5m intervals to connect to workstations. The large coaxial cable – usually yellow in colour – became known as Thick Ethernet or 10Base5. The key to this nomenclature is as follows: the 10 refers to the speed (10 Mbit/s), the Base refers to the fact that it is a baseband system and the 5 is short for the system’s maximum cable length run of 500m.

The Institute of Electrical and Electronic Engineers (IEEE) released the official Ethernet standard in 1983 called the IEEE 802.3 after the name of the working group responsible for its development, and in 1985 version 2 (IEEE 802.3a) was released. This second version is commonly known as Thin Ethernet or 10Base2, in this case the maximum length is 185m even though the 2 suggest that it should be 200m.

In the years since, Ethernet has proven to be an enduring technology, in no small part due to its tremendous flexibility and relative simplicity to implement and understand. It has proven to have such staying power and popularity that companies like Megapath are improving upon the current technology. Indeed, it has become so popular that a specification for LAN connection or network card generally implies Ethernet without explicitly saying so. The reason for its success is that Ethernet strikes a good balance between speed, cost and ease of installation. In particular, the ability of the 10BaseT version to support operation at 10 Mbit/s over unshielded twisted pair (UTP) telephone wiring made it an ideal choice for many Small Office/Home Office (SOHO) environments.

Ethernet’s Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Media Access Control (MAC) protocol defines the rules of access for the shared network. The protocol name itself implies how the traffic control process actually works. Devices attached to the network first check, or sense, the carrier (wire) before transmitting. If the network is in use, the device waits before transmitting. Multiple access refers to the fact that many devices share the same network medium. If, by chance, two devices attempt to transmit at exactly the same time and a collision occurs, collision detection mechanisms direct both devices to wait a random interval and then retransmit.

With Switched Ethernet, each sender and receiver pair have the full bandwidth. Implementation is usually in either an interface card or in circuitry on a primary circuit board. Ethernet cabling conventions specify the use of a transceiver to attach a cable to the physical network medium. The transceiver performs many of the physical-layer functions, including collision detection. The transceiver cable connects end stations to a transceiver.

Ethernet’s popularity grew throughout the 1990s until the technology was all but ubiquitous. By the end of 1997 it was estimated that more than 85% of all installed network connections were Ethernet and the following year the technology reportedly accounted for 86% of network equipment shipments. Several factors have contributed to Ethernet’s success, not least its scalability. This characteristic was established in the mid-1990s when Fast Ethernet offered a 10-fold improvement over the original standard and reinforced a few years later by the emergence of Gigabit Ethernet, which increased performance a further 10-fold to support data transfer rates of 1000 Mbit/s.

  • OSI Model
  • Network Topologies
  • FDDI Networking
  • Token Ring Networks
  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Peer to Peer Network Architecture
  • Client/Server Architecture
  • P2P Networking
  • Network Hardware
  • NIC Cards
  • Hubs and Repeaters
  • Bridges
  • Routers
  • Network Switches
  • Network Transceivers
  • Cabling
  • Home Networking
  • Ethernet Networks
  • Phone-line Networks
  • Power-line Networks
  • IEEE 802.11
  • Wireless Networks
  • Technology Comparison

Filed Under: Networking

Latest Articles

Guide to Deciphering Hard Drive Error Messages

Hard disk errors can cause immense damage. But you can take precautions and, if in doubt, correct them - if you notice. We explain what you can do to prevent errors and what to do if the hard disk has a defect. However, it is always advisable to make a backup of the data before the hard disk gets a … [Read More...]

Object Oriented Programming – Examples

Earlier we developed a class inheritance tree for some game characters in a maze game, but we need to design another class, or class hierarchy, for the maze. Since we want the mazes to have different levels of difficulty, each level of maze will require slightly different functions. We can … [Read More...]

Background Principles to Creating a Good Digital Music Management System

Background Principles The following aims and requirements are met by this DMMS. They are in no particular order of priority or preference. A centralised music repository Ability to access music from a variety of locations within the home Ability to use a variety of portable and fixed music … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

How to Remove Total Protect

Easiest Removal Option: Remote Repair: Paying an expert to remove this threat is always the easiest option. It's also the most expensive. … [Read More...]

Motherboard form factors

Early PCs used the AT form factor and 12in wide motherboards. The sheer size of an AT motherboard caused problems for upgrading PCs and did not … [Read More...]

Pentium 4 PSU

Power supplies must comply with either the ATX12V or SFX12V design guidelines and supply additional current on the 12V power rail through a new 2x2 … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors