pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Ethernet

Ethernet was developed in the mid 1970s by the Xerox Corporation, and in 1979 Digital Equipment Corporation DEC) and Intel joined forces with Xerox to standardize the system. The first specification by the three companies called the Ethernet Blue Book was released in 1980, it was also known as the DIX standard after the collaborators’ initials. It was a 10 Mbit/s system that used a large coaxial cable backbone cable running throughout a building, with smaller coaxial cables tapped off at 2.5m intervals to connect to workstations. The large coaxial cable – usually yellow in colour – became known as Thick Ethernet or 10Base5. The key to this nomenclature is as follows: the 10 refers to the speed (10 Mbit/s), the Base refers to the fact that it is a baseband system and the 5 is short for the system’s maximum cable length run of 500m.

The Institute of Electrical and Electronic Engineers (IEEE) released the official Ethernet standard in 1983 called the IEEE 802.3 after the name of the working group responsible for its development, and in 1985 version 2 (IEEE 802.3a) was released. This second version is commonly known as Thin Ethernet or 10Base2, in this case the maximum length is 185m even though the 2 suggest that it should be 200m.

In the years since, Ethernet has proven to be an enduring technology, in no small part due to its tremendous flexibility and relative simplicity to implement and understand. It has proven to have such staying power and popularity that companies like Megapath are improving upon the current technology. Indeed, it has become so popular that a specification for LAN connection or network card generally implies Ethernet without explicitly saying so. The reason for its success is that Ethernet strikes a good balance between speed, cost and ease of installation. In particular, the ability of the 10BaseT version to support operation at 10 Mbit/s over unshielded twisted pair (UTP) telephone wiring made it an ideal choice for many Small Office/Home Office (SOHO) environments.

Ethernet’s Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Media Access Control (MAC) protocol defines the rules of access for the shared network. The protocol name itself implies how the traffic control process actually works. Devices attached to the network first check, or sense, the carrier (wire) before transmitting. If the network is in use, the device waits before transmitting. Multiple access refers to the fact that many devices share the same network medium. If, by chance, two devices attempt to transmit at exactly the same time and a collision occurs, collision detection mechanisms direct both devices to wait a random interval and then retransmit.

With Switched Ethernet, each sender and receiver pair have the full bandwidth. Implementation is usually in either an interface card or in circuitry on a primary circuit board. Ethernet cabling conventions specify the use of a transceiver to attach a cable to the physical network medium. The transceiver performs many of the physical-layer functions, including collision detection. The transceiver cable connects end stations to a transceiver.

Ethernet’s popularity grew throughout the 1990s until the technology was all but ubiquitous. By the end of 1997 it was estimated that more than 85% of all installed network connections were Ethernet and the following year the technology reportedly accounted for 86% of network equipment shipments. Several factors have contributed to Ethernet’s success, not least its scalability. This characteristic was established in the mid-1990s when Fast Ethernet offered a 10-fold improvement over the original standard and reinforced a few years later by the emergence of Gigabit Ethernet, which increased performance a further 10-fold to support data transfer rates of 1000 Mbit/s.

  • OSI Model
  • Network Topologies
  • FDDI Networking
  • Token Ring Networks
  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Peer to Peer Network Architecture
  • Client/Server Architecture
  • P2P Networking
  • Network Hardware
  • NIC Cards
  • Hubs and Repeaters
  • Bridges
  • Routers
  • Network Switches
  • Network Transceivers
  • Cabling
  • Home Networking
  • Ethernet Networks
  • Phone-line Networks
  • Power-line Networks
  • IEEE 802.11
  • Wireless Networks
  • Technology Comparison

Filed Under: Networking

Latest Articles

Best DNS Providers of 2021 (Part 2)

We previously talked about some of the best DNS providers of 2021. We started with an introduction to the topic, but we decided to have a more in-depth discussion and cover some more. Google DNS Created at the end of 2009, it is focused on the most inexperienced users, and offers all the … [Read More...]

Adding Animation and Multimedia to Your PowerPoint Files

Many people are not aware of all of the features that are available with PowerPoint. There is a rich array of media features that you can use to create awesome presentations. Adding Audio and Animation Files to PowerPoint Presentations A PowerPoint slide show will be more successful if you add … [Read More...]

How to Remove Unlimited Defender

THREAT OVERVIEW: Unlimited Defender is a fake security application that has been designed by cyber criminals with the objective of stealing money from unsuspecting users. This is not a real security client reason why once detected it is recommended to conduct all the necessary steps to … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Five Tips to Convert Servers to Virtualization

Virtualization has become a popular topic in the business world. It makes sense on so many levels, and, therefore, it has been on the mind of many … [Read More...]

Armored Warfare

Armored Warfare Armored Warfare is a free-to-play multiplayer tank game Obsidian. You have a wide range of games modes, maps and different tanks to … [Read More...]

PC Speed Maximizer Review

PROS: As a stand alone registry cleaner, PC Speed Maximizer is easy to you and gives accurate registry repairs that can be counted on. CONS: PC … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors