pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Gigabit Ethernet

The next step in Ethernet’s evolution was driven by the Gigabit Ethernet Alliance, formed in 1996. The ratification of associated Gigabit Ethernet standards was completed in the summer of 1999, specifying a physical layer that uses a mixture of proven technologies from the original Ethernet Specification and the ANSI X3T11 Fibre Channel Specification:

The 1000Base-X standard is based on the Fibre Channel Physical Layer and defines an interconnection technology for connecting workstations, supercomputers, storage devices and peripherals using different fibre optic and copper STP media types to support varying cable run lengths.

1000Base-T is a standard for Gigabit Ethernet over long haul copper UTP.

Gigabit Ethernet follows the same form, fit and function as its 10 Mbit/s and 100 Mbit/s Ethernet precursors, allowing a straightforward, incremental migration to higher-speed networking. All three Ethernet speeds use the same IEEE 802.3 frame format, full-duplex operation and flow control methods. In half-duplex mode, Gigabit Ethernet employs the same fundamental CSMA/CD access method to resolve contention for the shared media.

Use of the same variable-length (64- to 1514-byte packets) IEEE 802.3 frame format found in Ethernet and Fast Ethernet is key to the ease with which existing lower-speed Ethernet devices can be connected to Gigabit Ethernet devices, using LAN switches or routers to adapt one physical line speed to the other.

Gigabit

The topology rules for 1000Base-T are the same as those used for 100Base-T, Category 5 link lengths being limited to 100 metres and only one CSMA/CD repeater being allowed in a collision domain. Migration to 1000Base-T is further simplified both by the fact that 1000Base-T uses the same auto-negotiation system employed by 100Base-TX, and the availability of product components capable of both 100 Mbit/s and 1000 Mbit/s operation.

Fast Ethernet achieves 100 Mbit/s operation by sending three-level binary encoded symbols across the link at 125 Mbaud. 100Base-TX uses two pairs: one for transmit, one for receive. 1000Base-T also uses a symbol rate of 125 Mbaud, but it uses all four pairs for the link and a more sophisticated five-level coding scheme. In addition, it sends and receives simultaneously on each pair. Combining 5-level coding and 4 pairs allows 1000Base-T to send one byte in parallel at each signal pulse. 4 pairs x 125 Msymbols/sec x 2 bits/symbol equals 1Gbit/s.

The maximum cable length permitted in vanilla Ethernet is 2.5 km, with a maximum of four repeaters on any path. As the bit rate increases, the sender transmits the frame faster. As a result, if the same frames sizes and cable lengths are maintained, then a station may transmit a frame too fast and not detect a collision at the other end of the cable. To avoid this, one of three things has to be done:

  • maintain the maximum cable length and increase the slot time (and therefore, minimum frame size)
  • maintain the slot time same and decrease the maximum cable length or,
  • both increase the slot time and decrease the maximum cable length.

In Fast Ethernet, the maximum cable length is reduced to a maximum of 100 metres, with the minimum frame size and slot time left intact. maintains the minimum and maximum frame sizes of Ethernet. Since it’s 10 times faster than Fast Ethernet, for Gigabit Ethernet to maintain the same slot size, the maximum cable length would have to be reduced to about 10 metres, which is impractical. Instead, Gigabit Ethernet uses a larger slot size of 512 bytes. To maintain compatibility with Ethernet, the minimum frame size is not increased, and a process known as Carrier Extension used. With this, if the frame is shorter than 512 bytes it is padded with extension symbols, special symbols, which cannot occur in the data stream.

  • OSI Model
  • Network Topologies
  • FDDI Networking
  • Token Ring Networks
  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Peer to Peer Network Architecture
  • Client/Server Architecture
  • P2P Networking
  • Network Hardware
  • NIC Cards
  • Hubs and Repeaters
  • Bridges
  • Routers
  • Network Switches
  • Network Transceivers
  • Cabling
  • Home Networking
  • Ethernet Networks
  • Phone-line Networks
  • Power-line Networks
  • IEEE 802.11
  • Wireless Networks
  • Technology Comparison

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Networking

Latest Articles

What is Level 1 (L1) Cache Memory?

The Level 1 cache, or primary cache, is on the CPU and is used for temporary storage of instructions and data organised in blocks of 32 bytes. Primary cache is the fastest form of storage. Because it's built in to the chip with a zero wait-state (delay) interface to the processor's … [Read More...]

Windows privacy module

Windows Privacy Module Welcome! If you've found your way here, it probably means that you've gotten infected with Windows Privacy Module. Windows Privacy Module is another one of the delightful fake antivirus infection variants. Each of these infections can go by a variety of names. The aim of an … [Read More...]

Color Calibration

One of the frustrations of using a desktop scanner is that a scanned image can look different on screen than it does when printed, and both can vary quite a bit from the original. The solution to this problem is a colour calibration (or colour … [Read More...]

Comments

  1. Sharon thomas says

    July 3, 2012 at 8:49 am

    I had no knowledge on Gigabit Ethernet. In your article you have given a detailed description and it was useful to me. Basically it gives a higher speed which is going to be the main attraction for its success.


4 Very Useful CAD Hacks You Might Not Be Using

The market for CAD design is growing around 7% a year. It is expected to be worth $7.3 billion by 2022. CAD experts have a lot of job security, … [Read More...]

What Are the Best eSports Games to Watch in 2020?

The esports industry is growing at a remarkable rate.  According to Statistica, the global market for esports is expected to reach $1.79 billion … [Read More...]

Choosing the Safest Crypto Wallet for the New Year

 There are a number of excellent benefits of cryptocurrencies.  They are extremely convenient and offer a tremendous amount of privacy. … [Read More...]

Guidelines on Troubleshooting Python Code

Whenever we write a computer program we need to verify that it works as expected. Usually we execute the code, if necessary we provide some inputs, … [Read More...]

Developing a Python to Extract Data from Your Smartphone

Many times we ask ourselves: "What part of the universe is this phone from?", even if we already know where it is, but we don't know which operator. … [Read More...]

Most Demanding Heroes to Play in Dota 2

Dota 2 is one of the most popular multi-player online combat games. It had an average player count of 485,000 throughout most of 2018. The peak number … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Guide to UMPCs – Ultra Mobile Personal Computers

UMPC is an acronym for 'Ultra-Mobile Personal Computer'. A UMPC device is a small form factor personal computer that meets minimum specifications set … [Read More...]

Waterfall Software Life Cycle Model

he following diagram draws from the sphere of engineering, showing the traditional (also known as classic) and most straightforward approach to … [Read More...]

SCSI Adapters

The SCSI host adapter we're going to be installing is a model capable of supporting SCSI-1, SCSI-2 and Fast SCSI-2 devices. This provides a level of … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors