pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Ethernet

Ethernet was developed in the mid 1970s by the Xerox Corporation, and in 1979 Digital Equipment Corporation DEC) and Intel joined forces with Xerox to standardize the system. The first specification by the three companies called the Ethernet Blue Book was released in 1980, it was also known as the DIX standard after the collaborators’ initials. It was a 10 Mbit/s system that used a large coaxial cable backbone cable running throughout a building, with smaller coaxial cables tapped off at 2.5m intervals to connect to workstations. The large coaxial cable – usually yellow in colour – became known as Thick Ethernet or 10Base5. The key to this nomenclature is as follows: the 10 refers to the speed (10 Mbit/s), the Base refers to the fact that it is a baseband system and the 5 is short for the system’s maximum cable length run of 500m.

The Institute of Electrical and Electronic Engineers (IEEE) released the official Ethernet standard in 1983 called the IEEE 802.3 after the name of the working group responsible for its development, and in 1985 version 2 (IEEE 802.3a) was released. This second version is commonly known as Thin Ethernet or 10Base2, in this case the maximum length is 185m even though the 2 suggest that it should be 200m.

In the years since, Ethernet has proven to be an enduring technology, in no small part due to its tremendous flexibility and relative simplicity to implement and understand. It has proven to have such staying power and popularity that companies like Megapath are improving upon the current technology. Indeed, it has become so popular that a specification for LAN connection or network card generally implies Ethernet without explicitly saying so. The reason for its success is that Ethernet strikes a good balance between speed, cost and ease of installation. In particular, the ability of the 10BaseT version to support operation at 10 Mbit/s over unshielded twisted pair (UTP) telephone wiring made it an ideal choice for many Small Office/Home Office (SOHO) environments.

Ethernet’s Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Media Access Control (MAC) protocol defines the rules of access for the shared network. The protocol name itself implies how the traffic control process actually works. Devices attached to the network first check, or sense, the carrier (wire) before transmitting. If the network is in use, the device waits before transmitting. Multiple access refers to the fact that many devices share the same network medium. If, by chance, two devices attempt to transmit at exactly the same time and a collision occurs, collision detection mechanisms direct both devices to wait a random interval and then retransmit.

With Switched Ethernet, each sender and receiver pair have the full bandwidth. Implementation is usually in either an interface card or in circuitry on a primary circuit board. Ethernet cabling conventions specify the use of a transceiver to attach a cable to the physical network medium. The transceiver performs many of the physical-layer functions, including collision detection. The transceiver cable connects end stations to a transceiver.

Ethernet’s popularity grew throughout the 1990s until the technology was all but ubiquitous. By the end of 1997 it was estimated that more than 85% of all installed network connections were Ethernet and the following year the technology reportedly accounted for 86% of network equipment shipments. Several factors have contributed to Ethernet’s success, not least its scalability. This characteristic was established in the mid-1990s when Fast Ethernet offered a 10-fold improvement over the original standard and reinforced a few years later by the emergence of Gigabit Ethernet, which increased performance a further 10-fold to support data transfer rates of 1000 Mbit/s.

  • OSI Model
  • Network Topologies
  • FDDI Networking
  • Token Ring Networks
  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Peer to Peer Network Architecture
  • Client/Server Architecture
  • P2P Networking
  • Network Hardware
  • NIC Cards
  • Hubs and Repeaters
  • Bridges
  • Routers
  • Network Switches
  • Network Transceivers
  • Cabling
  • Home Networking
  • Ethernet Networks
  • Phone-line Networks
  • Power-line Networks
  • IEEE 802.11
  • Wireless Networks
  • Technology Comparison

Filed Under: Networking

Latest Articles

Riser architectures for motherboards

In the late 1990s, the PC industry developed a need for a riser architecture that would contribute towards reduced overall system costs and at the same time increase the flexibility of the system manufacturing process. The Audio/Modem Riser AMR) specification, introduced in the summer of 1998, was … [Read More...]

Registry Booster 2011 Review

PC Mechanic 2016

The biggest news about Registry Boost is it's now called PC Mechanic 2015. This was most likely done because over the years registry cleaners have evolved into PC optimization tools. They are not so much about cleaning out the registry but more about PC optimization PROS: As a stand alone … [Read More...]

Remove Windows Oversight Center

Windows Oversight Center is a fake security program.  While it looks real and has the Windows 7 looks logo and the words Windows in the name, it's all a scam to trick you into making a purchase of Windows Oversight Center.  To delete Windows Oversight Center we recommend you attempt a … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

How to Remove AV Guard Online

AV Guard Online AV Guard Online is a bogus security client. Like most other malware clients this program shows you false and exaggerated scan … [Read More...]

An Overview of ADSL – What It Is and How It Works

ADSL has several similarities to ISDN. Both technologies require that copper phone lines be electrically clean and both … [Read More...]

Intel Mobile Pentium II technology guide

The natural progression of the low-power Deschutes family of Pentium II processors to the portable PC market took place … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors