Misplaced Pages

Wake-on-LAN

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
#147852

127-567: Wake-on-LAN ( WoL or WOL ) is an Ethernet or Token Ring computer networking standard that allows a computer to be turned on or awakened from sleep mode by a network message. It is based upon AMD 's Magic Packet Technology , which was co-developed by AMD and Hewlett-Packard, following its proposal as a standard in 1995. The standard saw quick adoption thereafter through IBM , Intel and others. Equivalent terms include wake on WAN , remote wake-up , power on by LAN , power up by LAN , resume by LAN , resume on LAN and wake up on LAN . If

254-459: A datagram is called a packet or frame . Packet is used to describe the overall transmission unit and includes the preamble , start frame delimiter (SFD) and carrier extension (if present). The frame begins after the start frame delimiter with a frame header featuring source and destination MAC addresses and the EtherType field giving either the protocol type for the payload protocol or

381-464: A subnet . Wake-on-LAN can, however, operate across any network in practice, given appropriate configuration and hardware, including remote wake-up across the Internet. In order for Wake-on-LAN to work, parts of the network interface need to stay on. This consumes a small amount of standby power . To further reduce power consumption, the link speed is usually reduced to the lowest possible speed (e.g.

508-552: A CRC on both the received data and the FCS, which will result in a fixed non-zero "verify" value. (The result is non-zero because the CRC is post complemented during CRC generation). Since the data is received least significant bit first, and to avoid having to buffer octets of data, the receiver typically uses the right shifting CRC-32. This makes the "verify" value (sometimes called "magic check") 0x2144DF1C. However, hardware implementation of

635-413: A Gigabit Ethernet NIC maintains only a 10 Mbit/s link). Disabling Wake-on-LAN, when not needed, can slightly reduce power consumption on computers that are switched off but still plugged into a power socket. The power drain becomes a consideration on battery-powered devices such as laptops as this can deplete the battery even when the device is completely shut down. The magic packet is a frame that

762-710: A LAN to cause a WoL packet to be sent to a host when that machine accesses one of the host's shared resources. Wake-on-LAN support may be changed using a subfunction of the ethtool command, for example: In the early days of Wake-on-LAN the situation was relatively simple: a machine was connected to power but switched off, and it was arranged that a special packet be sent to switch the machine on. Since then many options have been added and standards agreed upon. A machine can be in seven power states from S0 (fully on) through S5 (powered down but plugged in) and disconnected from power (G3, Mechanical Off), with names such as "sleep", "standby", and "hibernate". In some reduced-power modes

889-515: A buffer on the switch in its entirety, its frame check sequence verified and only then the packet is forwarded. In modern network equipment, this process is typically done using application-specific integrated circuits allowing packets to be forwarded at wire speed . When a twisted pair or fiber link segment is used and neither end is connected to a repeater, full-duplex Ethernet becomes possible over that segment. In full-duplex mode, both devices can transmit and receive to and from each other at

1016-515: A coaxial cable 0.375 inches (9.5 mm) in diameter, later called thick Ethernet or thicknet . Its successor, 10BASE2 , called thin Ethernet or thinnet , used the RG-58 coaxial cable. The emphasis was on making installation of the cable easier and less costly. Since all communication happens on the same wire, any information sent by one computer is received by all, even if that information

1143-429: A computer with an attacker's boot image, bypassing any security of the installed operating system and granting access to unprotected, local disks over the network. The use of Wake-on-LAN technology on enterprise networks can sometimes conflict with network access control solutions such as 802.1X MAC-based authentication, which may prevent magic packet delivery if a machine's WoL hardware has not been designed to maintain

1270-581: A doubling of network size. Once repeaters with more than two ports became available, it was possible to wire the network in a star topology . Early experiments with star topologies (called Fibernet ) using optical fiber were published by 1978. Shared cable Ethernet is always hard to install in offices because its bus topology is in conflict with the star topology cable plans designed into buildings for telephony. Modifying Ethernet to conform to twisted-pair telephone wiring already installed in commercial buildings provided another opportunity to lower costs, expand

1397-431: A formal IEEE standardization process, the EtherType field was changed to a (data) length field in the new 802.3 standard. Since the recipient still needs to know how to interpret the frame, the standard required an IEEE 802.2 header to follow the length and specify the type. Many years later, the 802.3x-1997 standard, and later versions of the 802.3 standard, formally approved of both types of framing. Ethernet II framing

SECTION 10

#1732771980148

1524-536: A greater number of nodes, and longer link distances, but retains much backward compatibility . Over time, Ethernet has largely replaced competing wired LAN technologies such as Token Ring , FDDI and ARCNET . The original 10BASE5 Ethernet uses a thick coaxial cable as a shared medium . This was largely superseded by 10BASE2 , which used a thinner and more flexible cable that was both cheaper and easier to use. More modern Ethernet variants use twisted pair and fiber optic links in conjunction with switches . Over

1651-516: A live authentication session while in a sleep state. Some PCs include technology built into the chipset to improve security for Wake-on-LAN. For example, Intel AMT (a component of Intel vPro technology). AMT uses TLS encryption to secure an out-of-band communication tunnel to an AMT-based PC for remote management commands such as Wake-on-LAN. AMT secures the communication tunnel with Advanced Encryption Standard (AES) 128-bit encryption and RSA keys with modulus lengths of 2,048 bits. Because

1778-759: A local client often become known as "The Wake On LAN Server" to users. Additionally, software that administers WoL capabilities from the host OS side may be carelessly referred to as a client on occasion; Machines running WoL generally tend to be end-user desktops, and as such, are clients in IT parlance. Software to send WoL magic packets is available for all modern platforms, including Windows, Macintosh and Linux, plus many smartphones . Examples include: Wake On LAN GUI, LAN Helper, Magic Packet Utility, NetWaker for Windows, Nirsoft WakeMeOnLAN, WakeOnLANx, EMCO WOL, Aquila Tech Wake on LAN, ManageEngine WOL utility, FusionFenix and SolarWinds WOL Tool. There are also web sites that allow

1905-413: A logically right shifting CRC may use a left shifting Linear Feedback Shift Register as the basis for calculating the CRC, reversing the bits and resulting in a verify value of 0x38FB2284. Since the complementing of the CRC may be performed post calculation and during transmission, what remains in the hardware register is a non-complemented result, so the residue for a right shifting implementation would be

2032-474: A loop-free logical topology using the SPB protocol or the older STP on the network switches. A node that is sending longer than the maximum transmission window for an Ethernet packet is considered to be jabbering . Depending on the physical topology, jabber detection and remedy differ somewhat. Ethernet frame In computer networking , an Ethernet frame is a data link layer protocol data unit and uses

2159-475: A magic packet to be sent online without charge. Example source code for a developer to add Wake-on-LAN to a program is readily available in many computer languages . The following example is in Python : If the sender is on the same subnet or local area network as the computer to be awakened there are generally no issues. When sending over the Internet, and in particular where a network address translation (NAT)

2286-551: A networking layer below typical IP usage. In the NAT router, ARP binding requires a dedicated IP and the MAC address of the destination computer. There are some security implications associated with ARP binding (see ARP spoofing ); however, as long as none of the computers connected to the LAN are compromised, an attacker must use a computer that is connected directly to the target LAN (plugged into

2413-695: A power supply. On desktops, the feature is controlled via the System Settings Energy Saver panel. Marking the Wake for network access checkbox enables Wake-on-LAN. It can also be configured through the terminal using the pmset womp (wake on magic packet) command. Apple's Apple Remote Desktop client management system can be used to send Wake-on-LAN packets, but there are also freeware and shareware macOS applications available. A mechanism called Bonjour Sleep Proxy , provided by Apple AirPort access points and Apple TVs, allows other machines on

2540-469: A requirement for a minimum frame transmission of 64 octets (bytes). With header and FCS taken into account, the minimum payload is 42 octets when an 802.1Q tag is present and 46 octets when absent. When the actual payload is less than the minimum, padding octets are added accordingly. IEEE standards specify a maximum payload of 1500 octets. Non-standard jumbo frames allow for larger payloads on networks built to support them. The frame check sequence (FCS)

2667-702: A standard Ethernet frame, which “contains a specific data pattern detected by the Ethernet-controller on the receiving end”. AMD implemented the WoL mechanism in their AMD PCnet II -Family of Ethernet controllers before. The term “Magic Packet” is a AMD trademark. Wake-on-LAN saw wide adoption starting in October 1996, when IBM formed the Advanced Manageability Alliance (AMA) with Intel . In April 1997, this alliance adopted

SECTION 20

#1732771980148

2794-556: A standard for CSMA/CD based on the IEEE 802 draft. Because the DIX proposal was most technically complete and because of the speedy action taken by ECMA which decisively contributed to the conciliation of opinions within IEEE, the IEEE 802.3 CSMA/CD standard was approved in December 1982. IEEE published the 802.3 standard as a draft in 1983 and as a standard in 1985. Approval of Ethernet on

2921-425: A standard. As part of that process Xerox agreed to relinquish their 'Ethernet' trademark. The first standard was published on September 30, 1980, as "The Ethernet, A Local Area Network. Data Link Layer and Physical Layer Specifications". This so-called DIX standard (Digital Intel Xerox) specified 10 Mbit/s Ethernet, with 48-bit destination and source addresses and a global 16-bit Ethertype -type field. Version 2

3048-401: A switching loop. Autonegotiation is the procedure by which two connected devices choose common transmission parameters, e.g. speed and duplex mode. Autonegotiation was initially an optional feature, first introduced with 100BASE-TX (1995 IEEE 802.3u Fast Ethernet standard), and is backward compatible with 10BASE-T. The specification was improved in the 1998 release of IEEE 802.3. Autonegotiation

3175-442: Is 1500 octets (0x05DC). Thus if the field's value is greater than or equal to 1536, the frame must be an Ethernet II frame, with that field being a type field. If it's less than or equal to 1500, it must be an IEEE 802.3 frame, with that field being a length field. Values between 1500 and 1536, exclusive, are undefined. This convention allows software to determine whether a frame is an Ethernet II frame or an IEEE 802.3 frame, allowing

3302-450: Is a four-octet cyclic redundancy check (CRC) that allows detection of corrupted data within the entire frame as received on the receiver side. According to the standard, the FCS value is computed as a function of the protected MAC frame fields: source and destination address, length/type field, MAC client data and padding (that is, all fields except the FCS). Per the standard, this computation

3429-407: Is a four-octet field that indicates virtual LAN (VLAN) membership and IEEE 802.1p priority. The first two octets of the tag are called the T ag P rotocol ID entifier (TPID) and double as the EtherType field indicating that the frame is either 802.1Q or 802.1ad tagged. 802.1Q uses a TPID of 0x8100. 802.1ad uses a TPID of 0x88a8. Payload is a variable-length field. Its minimum size is governed by

3556-618: Is almost never implemented on Ethernet, although it is used on FDDI, Token Ring, IEEE 802.11 (with the exception of the 5.9 GHz band , where it uses EtherType) and other IEEE 802 LANs. IPv6 can also be transmitted over Ethernet using IEEE 802.2 LLC SAP/SNAP, but, again, that's almost never used. By examining the 802.2 LLC header, it is possible to determine whether it is followed by a SNAP header. The LLC header includes two eight-bit address fields, called service access points (SAPs) in OSI terminology; when both source and destination SAP are set to

3683-446: Is also required. The Intel adapter allows "Wake on Directed Packet", "Wake on Magic Packet", "Wake on Magic Packet from power off state", and "Wake on Link". Wake on Directed Packet is particularly useful as the machine will automatically come out of standby or hibernation when it is referenced, without the user or application needing to explicitly send a magic packet. Unfortunately in many networks waking on directed packet (any packet with

3810-458: Is causing the power-up – the device being the soft power switch, the NIC (via Wake-on-LAN), the cover being opened, a temperature change, etc. The three-pin WoL interface on the motherboard consists of: pin 1, +5V DC (red); pin 2, ground (black); pin 3, wake signal (green or yellow). By supplying the pin-3 wake signal with +5V DC the computer will be triggered to power up provided WoL

3937-543: Is commonly carried over Ethernet and so it is considered one of the key technologies that make up the Internet . Ethernet was developed at Xerox PARC between 1973 and 1974 as a means to allow Alto computers to communicate with each other. It was inspired by ALOHAnet , which Robert Metcalfe had studied as part of his PhD dissertation and was originally called the Alto Aloha Network. Metcalfe's idea

Wake-on-LAN - Misplaced Pages Continue

4064-666: Is defined in the IEEE 802.3ac specification and increases the maximum frame by 4 octets. The IEEE 802.1Q tag, if present, is placed between the Source Address and the EtherType or Length fields. The first two octets of the tag are the Tag Protocol Identifier (TPID) value of 0x8100. This is located in the same place as the EtherType/Length field in untagged frames, so an EtherType value of 0x8100 means

4191-496: Is designed to be simple and to be quickly processed by the circuitry present on the network interface controller using minimal power. Because Wake-on-LAN operates below the IP protocol layer, IP addresses and DNS names are meaningless and so the MAC address is required. A principal limitation of standard broadcast Wake-on-LAN is that broadcast packets are generally not routed. This prevents the technique being used in larger networks or over

4318-430: Is done using the left shifting CRC-32 ( polynomial = 0x4C11DB7, initial CRC = 0xFFFFFFFF, CRC is post complemented, verify value = 0x38FB2284) algorithm. The standard states that data is transmitted least significant bit (bit 0) first, while the FCS is transmitted most significant bit (bit 31) first. An alternative is to calculate a CRC using the right shifting CRC-32 (polynomial = 0xEDB88320, initial CRC = 0xFFFFFFFF, CRC

4445-407: Is either dropped or forwarded to another segment. This reduces the forwarding latency. One drawback of this method is that it does not readily allow a mixture of different link speeds. Another is that packets that have been corrupted are still propagated through the network. The eventual remedy for this was a return to the original store and forward approach of bridging, where the packet is read into

4572-494: Is enabled in the BIOS/UEFI configuration. ‹The template Manual is being considered for merging .›   Software that sends a WoL magic packet is referred to in different circles as client or server , which can be a source of confusion. While WoL hardware or firmware is arguably performing the role of a server , Web-based interfaces that act as a gateway through which users can issue WoL packets without downloading

4699-437: Is implemented on the motherboard of a computer and in the network interface controller . It is consequently not dependent on the operating system running on the computer. In order to get Wake-on-LAN to work, enabling this feature on the network interface card or on-board silicon is sometimes required. Details of how to do this depend upon the operating system and the device driver. Wake-on-LAN usually needs to be enabled in

4826-433: Is in turn connected to the cable (with thin Ethernet the transceiver is usually integrated into the network adapter). While a simple passive wire is highly reliable for small networks, it is not reliable for large extended networks, where damage to the wire in a single place, or a single bad connector, can make the whole Ethernet segment unusable. Through the first half of the 1980s, Ethernet's 10BASE5 implementation used

4953-479: Is intended for just one destination. The network interface card interrupts the CPU only when applicable packets are received: the card ignores information not addressed to it. Use of a single cable also means that the data bandwidth is shared, such that, for example, available data bandwidth to each device is halved when two stations are simultaneously active. A collision happens when two stations attempt to transmit at

5080-456: Is involved (as typically in most homes), special settings are often necessary. Further, the WoL protocol operates on a deeper level in the multi-layer networking architecture. To ensure the magic packet gets from source to destination while the destination is sleeping, the ARP binding must typically be set in a NAT router. This allows the router to forward the magic packet to the sleeping computer at

5207-409: Is mandatory for 1000BASE-T and faster. A switching loop or bridge loop occurs in computer networks when there is more than one Layer 2 ( OSI model ) path between two endpoints (e.g. multiple connections between two network switches or two ports on the same switch connected to each other). The loop creates broadcast storms as broadcasts and multicasts are forwarded by switches out every port ,

Wake-on-LAN - Misplaced Pages Continue

5334-442: Is most often sent as a broadcast and that contains anywhere within its payload 6 bytes of all 255 (FF FF FF FF FF FF in hexadecimal ), followed by sixteen repetitions of the target computer's 48-bit MAC address, for a total of 102 bytes. Since the magic packet is only scanned for the string above, and not actually parsed by a full protocol stack, it could be sent as payload of any network- and transport-layer protocol, although it

5461-423: Is not in widespread use on common networks currently, with the exception of large corporate NetWare installations that have not yet migrated to NetWare over IP . In the past, many corporate networks used IEEE 802.2 to support transparent translating bridges between Ethernet and Token Ring or FDDI networks. There exists an Internet standard for encapsulating IPv4 traffic in IEEE 802.2 LLC SAP/SNAP frames. It

5588-621: Is now used to interconnect appliances and other personal devices . As Industrial Ethernet it is used in industrial applications and is quickly replacing legacy data transmission systems in the world's telecommunications networks. By 2010, the market for Ethernet equipment amounted to over $ 16 billion per year. In February 1980, the Institute of Electrical and Electronics Engineers (IEEE) started project 802 to standardize local area networks (LAN). The DIX group with Gary Robinson (DEC), Phil Arst (Intel), and Bob Printis (Xerox) submitted

5715-407: Is post complemented, verify value = 0x2144DF1C), which will result in a CRC that is a bit reversal of the FCS, and transmit both data and the CRC least significant bit first, resulting in identical transmissions. The standard states that the receiver should calculate a new FCS as data is received and then compare the received FCS with the FCS the receiver has calculated. An alternative is to calculate

5842-525: Is relayed through the PCI bus. The power supply must meet ATX 2.01 specifications. Laptops powered by the Intel Centrino processor technology or newer (with explicit BIOS/UEFI support) allow waking up the machine using Wake on Wireless LAN (WoWLAN). In most modern PCs, ACPI is notified of the waking up and takes control of the power-up. In ACPI, OSPM must record the wake source or the device that

5969-436: Is significantly better. In a modern Ethernet, the stations do not all share one channel through a shared cable or a simple repeater hub ; instead, each station communicates with a switch, which in turn forwards that traffic to the destination station. In this topology, collisions are only possible if station and switch attempt to communicate with each other at the same time, and collisions are limited to this link. Furthermore,

6096-412: Is the most common in Ethernet local area networks, due to its simplicity and lower overhead. In order to allow some frames using Ethernet II framing and some using the original version of 802.3 framing to be used on the same Ethernet segment, EtherType values must be greater than or equal to 1536 (0x0600). That value was chosen because the maximum length of the payload field of an Ethernet 802.3 frame

6223-434: Is typically sent as a UDP datagram to port 0 (reserved port number), 7 ( Echo Protocol ) or 9 ( Discard Protocol ), or directly over Ethernet using EtherType 0x0842. A connection-oriented transport-layer protocol like TCP is less suited for this task as it requires establishing an active connection before sending user data. A standard magic packet has the following basic limitations: The Wake-on-LAN implementation

6350-596: Is unsupported in Windows 8 and above, and Windows Server 2012 and above. This is because of a change in the OS behavior which causes network adapters to be explicitly not armed for WoL when shutdown to these states occurs. WOL from a non-hybrid hibernation state (S4) (i.e. when a user explicitly requests hibernation) or a sleep state (S3) is supported. However, some hardware will enable WoL from states that are unsupported by Windows. Modern Mac hardware supports WoL functionality when

6477-412: Is used by the operating system on the receiving station to select the appropriate protocol module (e.g., an Internet Protocol version such as IPv4 ). Ethernet frames are said to be self-identifying , because of the EtherType field. Self-identifying frames make it possible to intermix multiple protocols on the same physical network and allow a single computer to use multiple protocols together. Despite

SECTION 50

#1732771980148

6604-401: Is used to indicate the size of the payload in octets, while values of 1536 and above indicate that it is used as an EtherType, to indicate which protocol is encapsulated in the payload of the frame. When used as EtherType, the length of the frame is determined by the location of the interpacket gap and valid frame check sequence (FCS). The IEEE 802.1Q tag or IEEE 802.1ad tag, if present,

6731-518: Is used. The throughput may be calculated from the efficiency where the physical layer net bit rate (the wire bit rate) depends on the Ethernet physical layer standard, and may be 10 Mbit/s , 100 Mbit/s , 1 Gbit/s or 10 Gbit/s . Maximum throughput for 100BASE-TX Ethernet is consequently 97.53 Mbit/s without 802.1Q, and 97.28 Mbit/s with 802.1Q. Channel utilization is a concept often confused with protocol efficiency. It considers only

6858-518: The 10BASE-T standard introduced a full duplex mode of operation which became common with Fast Ethernet and the de facto standard with Gigabit Ethernet . In full duplex, switch and station can send and receive simultaneously, and therefore modern Ethernets are completely collision-free. For signal degradation and timing reasons, coaxial Ethernet segments have a restricted size. Somewhat larger networks can be built by using an Ethernet repeater . Early repeaters had only two ports, allowing, at most,

6985-632: The Apple Bonjour wake-on-demand ( Sleep Proxy ) feature. The basis for the Wake-on-LAN -industry standard mechanism today, was created around 1994 by AMD in cooperation with Hewlett-Packard , who co-developed AMD's Magic Packet Technology and brought forth their following proposal for it in November 1995 in an AMD whitepaper. It enabled a remote network device to be woken up through the underlying “power management circuitry”, by sending it

7112-559: The OSI model , Ethernet provides services up to and including the data link layer . The 48-bit MAC address was adopted by other IEEE 802 networking standards, including IEEE 802.11 ( Wi-Fi ), as well as by FDDI . EtherType values are also used in Subnetwork Access Protocol (SNAP) headers. Ethernet is widely used in homes and industry, and interworks well with wireless Wi-Fi technologies. The Internet Protocol

7239-583: The Spanning Tree Protocol (STP) to maintain a loop-free, meshed network, allowing physical loops for redundancy (STP) or load-balancing (SPB). Shortest Path Bridging includes the use of the link-state routing protocol IS-IS to allow larger networks with shortest path routes between devices. Advanced networking features also ensure port security, provide protection features such as MAC lockdown and broadcast radiation filtering, use VLANs to keep different classes of users separate while using

7366-465: The protocol overhead for Ethernet as a percentage (packet size including IPG) We may calculate the protocol efficiency for Ethernet Maximum efficiency is achieved with largest allowed payload size and is: for untagged frames, since the packet size is maximum 1500 octet payload + 8 octet preamble + 14 octet header + 4 octet trailer + minimum interpacket gap corresponding to 12 octets = 1538 octets. The maximum efficiency is: when 802.1Q VLAN tagging

7493-431: The Internet. Subnet-directed broadcasts (SDBs) may be used to overcome this limitation. SDB may require changes to the intermediate router configuration. SDBs are treated like unicast network packets until processed by the final (local) router. This router then broadcasts the packet using a layer-2 broadcast. This technique allows a broadcast to be initiated on a remote network but requires all intervening routers to forward

7620-580: The LAN via cable, or by breaking through the Wi‑Fi connection security) to gain access to the LAN. Most home routers are able to send magic packets to a LAN; for example, routers with the DD-WRT , Tomato or PfSense firmware have a built-in Wake-on-LAN client. OpenWrt supports both Linux implementations for WoL. Most WoL hardware functionally is typically blocked by default and needs to be enabled in using

7747-438: The LAN was observed. This is in contrast with token passing LANs (Token Ring, Token Bus), all of which suffer throughput degradation as each new node comes into the LAN, due to token waits. This report was controversial, as modeling showed that collision-based networks theoretically became unstable under loads as low as 37% of nominal capacity. Many early researchers failed to understand these results. Performance on real networks

SECTION 60

#1732771980148

7874-420: The NIC a hexadecimal password of 6 bytes. Clients append this password to the magic packet. The NIC wakes the system only if the MAC address and password are correct. This security measure significantly decreases the risk of successful brute force attacks , by increasing the search space by 48 bits (6 bytes), up to 2 combinations if the MAC address is entirely unknown. However, any network eavesdropping will expose

8001-485: The Power Management section of a PC motherboard's BIOS/UEFI setup utility, although on some systems, such as Apple computers, it is enabled by default. On older systems the BIOS/UEFI setting may be referred to as WoL; on newer systems supporting PCI version 2.2, it may be referred to as PME (Power Management Events, which include WoL). It may also be necessary to configure the computer to reserve standby power for

8128-733: The SDB. When preparing a network to forward SDB packets, care must be taken to filter packets so that only desired (e.g. WoL) SDB packets are permitted – otherwise the network may become a participant in DDoS attacks such as the Smurf attack . Wake-on-LAN can be a difficult technology to implement because it requires appropriate BIOS/ UEFI , network interface hardware and, sometimes, operating system and router support to function reliably. In some cases, hardware may wake from one low-power state but not from others. This means that due to hardware issues

8255-424: The Wake-on-LAN function as reliable as possible. For a machine procured to work in this way, Wake-on-LAN functionality is an important part of the purchase procedure. Some machines do not support Wake-on-LAN after they have been disconnected from power (e.g., when power is restored after a power failure). Use of an uninterruptible power supply (UPS) will give protection against a short period without power, although

8382-448: The Wake-on-LAN technology. Ethernet connections, including home and work networks, wireless data networks, and the Internet itself, are based on frames sent between computers. WoL is implemented using a specially designed frame called a magic packet , which is commonly sent to all computers in a network, among them the computer to be awakened. The magic packet contains the MAC address of

8509-418: The ability to wake from an ACPI S5 power off state), installation of the full driver suite from the network device manufacturer may be necessary, rather than the bare driver provided by Microsoft or the computer manufacturer. In most cases correct BIOS/UEFI configuration is also required for WoL to function. The ability to wake from a hybrid shutdown state (S4) (aka Fast Startup) or a soft powered-off state (S5)

8636-419: The adapter's MAC address or IP address) or on link is likely to cause wakeup immediately after going to a low-power state. Details for any particular motherboard and network adapter are to be found in the relevant manuals; there is no general method. Knowledge of signals on the network may also be needed to prevent spurious wakening. For a machine which is normally unattended, precautions need to be taken to make

8763-461: The battery will discharge during a prolonged power-cut. Ethernet Ethernet ( / ˈ iː θ ər n ɛ t / EE -thər-net ) is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3 . Ethernet has since been refined to support higher bit rates ,

8890-399: The carrier is continually sent between frames; an example is Gigabit Ethernet with its 8b/10b encoding scheme that uses special symbols which are transmitted before and after a frame is transmitted. Interpacket gap (IPG) is idle time between packets. After a packet has been sent, transmitters are required to transmit a minimum of 96 bits (12 octets) of idle line state before transmitting

9017-402: The cleartext password. Abuse of the Wake-on-LAN feature only allows computers to be switched on; it does not in itself bypass password and other forms of security, and is unable to power off the machine once on. However, many client computers attempt booting from a PXE server when powered up by WoL. Therefore, a combination of DHCP and PXE servers on the network can sometimes be used to start

9144-477: The coexistence of both standards on the same physical medium. Novell's "raw" 802.3 frame format was based on early IEEE 802.3 work. Novell used this as a starting point to create the first implementation of its own IPX Network Protocol over Ethernet. They did not use any LLC header but started the IPX packet directly after the length field. This does not conform to the IEEE 802.3 standard, but since IPX always has FF as

9271-502: The complement of 0x2144DF1C = 0xDEBB20E3, and for a left shifting implementation, the complement of 0x38FB2284 = 0xC704DD7B. The end of a frame is usually indicated by the end-of-data-stream symbol at the physical layer or by loss of the carrier signal; an example is 10BASE-T , where the receiving station detects the end of a transmitted frame by loss of the carrier. Later physical layers use an explicit end of data or end of stream symbol or sequence to avoid ambiguity, especially where

9398-538: The computer being awakened is communicating via Wi-Fi , a supplementary standard called Wake on Wireless LAN (WoWLAN) must be employed. The message is usually sent to the target computer by a program executed on a device connected to the same local area network (LAN). It is also possible to initiate the message from another network by using subnet directed broadcasts or a WoL gateway service. The WoL and WoWLAN standards are often supplemented by vendors to provide protocol-transparent on-demand services, for example in

9525-572: The computer is in a sleep state, but it is not possible to wake up a Mac computer from a powered-off state. Mac OS X Snow Leopard and later support WoL, which is called Wake on Demand. On laptops, the feature is controlled via the macOS System Settings Battery panel, in the Options pop-up window. The Wake for network access item can be set to "Always", "Only on Power Adapter", or "Never"; "Always" enables Wake-on-LAN even when on battery power, but "Only on Power Adapter" enables it only when connected to

9652-453: The computer may be wakeable from its soft off state (S5) but doesn't wake from sleep or hibernation or vice versa. Starting with Windows Vista, the operating system logs all wake sources in the System event log. The Event Viewer and the powercfg.exe /lastwake command can retrieve them. Magic packets are sent via the data link or OSI-2 layer , which can be used or abused by anyone on

9779-463: The computer's power supply or motherboard to awaken. This has the same effect as pressing the power button. The magic packet is broadcast on the data link layer to all attached devices on a given network, using the network broadcast address ; the IP address (which relates to the internet layer ) is not used. Because Wake-on-LAN is built upon broadcast messaging, it can generally only be used within

9906-621: The course of its history, Ethernet data transfer rates have been increased from the original 2.94  Mbit/s to the latest 400 Gbit/s , with rates up to 1.6  Tbit/s under development. The Ethernet standards include several wiring and signaling variants of the OSI physical layer . Systems communicating over Ethernet divide a stream of data into shorter pieces called frames . Each frame contains source and destination addresses, and error-checking data so that damaged frames can be detected and discarded; most often, higher-layer protocols trigger retransmission of lost frames. Per

10033-455: The destination and the source of each data packet. Ethernet establishes link-level connections, which can be defined using both the destination and source addresses. On reception of a transmission, the receiver uses the destination address to determine whether the transmission is relevant to the station or should be ignored. A network interface normally does not accept packets addressed to other Ethernet stations. An EtherType field in each frame

10160-453: The destination computer. This is an identifying number, built into each network interface controller (NIC), that enables the NIC to be uniquely recognized and addressed on a network. In computers capable of Wake-on-LAN, the NIC(s) listen to incoming packets, even when the rest of the system is powered down. If a magic packet arrives and is addressed to the device's MAC address, the NIC signals

10287-564: The elimination of the chaining limits inherent in non-switched Ethernet have made switched Ethernet the dominant network technology. Simple switched Ethernet networks, while a great improvement over repeater-based Ethernet, suffer from single points of failure, attacks that trick switches or hosts into sending data to a machine even if it is not intended for it, scalability and security issues with regard to switching loops , broadcast radiation , and multicast traffic. Advanced networking features in switches use Shortest Path Bridging (SPB) or

10414-487: The emerging office communication market, including Siemens' support for the international standardization of Ethernet (April 10, 1981). Ingrid Fromm, Siemens' representative to IEEE 802, quickly achieved broader support for Ethernet beyond IEEE by the establishment of a competing Task Group "Local Networks" within the European standards body ECMA TC24. In March 1982, ECMA TC24 with its corporate members reached an agreement on

10541-806: The encrypted communication is out-of-band, the PC's hardware and firmware receive the magic packet before network traffic reaches the software stack for the operating system (OS). Since the encrypted communication occurs below the OS level, it is less vulnerable to attacks by viruses, worms, and other threats that typically target the OS level. IT shops using Wake-on-LAN through the Intel AMT implementation can wake an AMT PC over network environments that require TLS-based security, such as IEEE 802.1X , Cisco Self Defending Network (SDN), and Microsoft Network Access Protection (NAP) environments. The Intel implementation also works for wireless networks. Wake-on-LAN support

10668-449: The evolution of Ethernet technology, all generations of Ethernet (excluding early experimental versions) use the same frame formats. Mixed-speed networks can be built using Ethernet switches and repeaters supporting the desired Ethernet variants. Due to the ubiquity of Ethernet, and the ever-decreasing cost of the hardware needed to support it, by 2004 most manufacturers built Ethernet interfaces directly into PC motherboards , eliminating

10795-612: The farthest nodes and creates practical limits on how many machines can communicate on an Ethernet network. Segments joined by repeaters have to all operate at the same speed, making phased-in upgrades impossible. To alleviate these problems, bridging was created to communicate at the data link layer while isolating the physical layer. With bridging, only well-formed Ethernet packets are forwarded from one Ethernet segment to another; collisions and packet errors are isolated. At initial startup, Ethernet bridges work somewhat like Ethernet repeaters, passing all traffic between segments. By observing

10922-407: The first two octets (while in IEEE 802.2 LLC that pattern is theoretically possible but extremely unlikely), in practice this usually coexists on the wire with other Ethernet implementations, with the notable exception of some early forms of DECnet which got confused by this. Novell NetWare used this frame type by default until the mid-nineties, and since NetWare was then very widespread, while IP

11049-451: The frame is payload data including any headers for other protocols (for example, Internet Protocol ) carried in the frame. The frame ends with a frame check sequence (FCS), which is a 32-bit cyclic redundancy check used to detect any in-transit corruption of data. A data packet on the wire and the frame as its payload consist of binary data. Ethernet transmits data with the most-significant octet (byte) first; within each octet, however,

11176-532: The frame is tagged, and the true EtherType/Length is located after the Q-tag. The TPID is followed by two octets containing the Tag Control Information (TCI) (the IEEE 802.1p priority ( quality of service ) and VLAN id). The Q-tag is followed by the rest of the frame, using one of the types described above. Ethernet II framing (also known as DIX Ethernet , named after DEC , Intel and Xerox ,

11303-413: The frame. Field sizes for this option are shown in brackets in the table above. IEEE 802.1ad (Q-in-Q) allows for multiple tags in each frame. This option is not illustrated here. An Ethernet packet starts with a seven-octet (56-bit) preamble and one-octet (8-bit) start frame delimiter (SFD). The preamble bit values alternate 1 and 0, allowing receivers to synchronize their clock at the bit-level with

11430-510: The group was split into three subgroups, and standardization proceeded separately for each proposal. Delays in the standards process put at risk the market introduction of the Xerox Star workstation and 3Com's Ethernet LAN products. With such business implications in mind, David Liddle (General Manager, Xerox Office Systems) and Metcalfe (3Com) strongly supported a proposal of Fritz Röscheisen ( Siemens Private Networks) for an alliance in

11557-439: The installed base, and leverage building design, and, thus, twisted-pair Ethernet was the next logical development in the mid-1980s. Ethernet on unshielded twisted-pair cables (UTP) began with StarLAN at 1 Mbit/s in the mid-1980s. In 1987 SynOptics introduced the first twisted-pair Ethernet at 10 Mbit/s in a star-wired cabling topology with a central hub, later called LattisNet . These evolved into 10BASE-T, which

11684-510: The international level was achieved by a similar, cross- partisan action with Fromm as the liaison officer working to integrate with International Electrotechnical Commission (IEC) Technical Committee 83 and International Organization for Standardization (ISO) Technical Committee 97 Sub Committee 6. The ISO 8802-3 standard was published in 1989. Ethernet has evolved to include higher bandwidth, improved medium access control methods, and different physical media. The multidrop coaxial cable

11811-499: The largest computer networks in the world at that time. An Ethernet adapter card for the IBM PC was released in 1982, and, by 1985, 3Com had sold 100,000. In the 1980s, IBM's own PC Network product competed with Ethernet for the PC, and through the 1980s, LAN hardware, in general, was not common on PCs. However, in the mid to late 1980s, PC networking did become popular in offices and schools for printer and fileserver sharing, and among

11938-504: The least-significant bit is transmitted first. The internal structure of an Ethernet frame is specified in IEEE 802.3. The table below shows the complete Ethernet packet and the frame inside, as transmitted, for the payload size up to the MTU of 1500 octets. Some implementations of Gigabit Ethernet and other higher-speed variants of Ethernet support larger frames, known as jumbo frames . The optional 802.1Q tag consumes additional space in

12065-399: The length of the payload. The middle section of the frame consists of payload data including any headers for other protocols (for example, Internet Protocol) carried in the frame. The frame ends with a 32-bit cyclic redundancy check , which is used to detect corruption of data in transit . Notably, Ethernet packets have no time-to-live field , leading to possible problems in the presence of

12192-494: The major participants in its design ), defines the two-octet EtherType field in an Ethernet frame , preceded by destination and source MAC addresses, that identifies an upper layer protocol encapsulated by the frame data. Most notably, an EtherType value of 0x0800 indicates that the frame contains an IPv4 datagram, 0x0806 indicates an ARP datagram, and 0x86DD indicates an IPv6 datagram. See EtherType § Values for more. As this industry-developed standard went through

12319-631: The many diverse competing LAN technologies of that decade, Ethernet was one of the most popular. Parallel port based Ethernet adapters were produced for a time, with drivers for DOS and Windows. By the early 1990s, Ethernet became so prevalent that Ethernet ports began to appear on some PCs and most workstations . This process was greatly sped up with the introduction of 10BASE-T and its relatively small modular connector , at which point Ethernet ports appeared even on low-end motherboards. Since then, Ethernet technology has evolved to meet new bandwidth and market requirements. In addition to computers, Ethernet

12446-401: The mixing of speeds, both of which are critical to the incremental deployment of faster Ethernet variants. In 1989, Motorola Codex introduced their 6310 EtherSpan, and Kalpana introduced their EtherSwitch; these were examples of the first commercial Ethernet switches. Early switches such as this used cut-through switching where only the header of the incoming packet is examined before it

12573-476: The need for a separate network card. Ethernet was originally based on the idea of computers communicating over a shared coaxial cable acting as a broadcast transmission medium. The method used was similar to those used in radio systems, with the common cable providing the communication channel likened to the Luminiferous aether in 19th-century physics, and it was from this reference that the name Ethernet

12700-467: The network card when the system is shut down. With older motherboards, if the network interface is a plug-in card rather than being integrated into the motherboard there may be a header onboard connected to the network card via a special three-pin cable the card. Systems supporting the PCI 2.2 standard and with a PCI 2.2 compliant network adapter card do not usually require a cable as the required standby power

12827-470: The network. Despite the physical star topology and the presence of separate transmit and receive channels in the twisted pair and fiber media, repeater-based Ethernet networks still use half-duplex and CSMA/CD, with only minimal activity by the repeater, primarily generation of the jam signal in dealing with packet collisions. Every packet is sent to every other port on the repeater, so bandwidth and security problems are not addressed. The total throughput of

12954-439: The next packet. There are several types of Ethernet frames: The different frame types have different formats and MTU values but can coexist on the same physical medium. Differentiation between frame types is possible based on the table on the right. In addition, all four Ethernet frame types may optionally contain an IEEE 802.1Q tag to identify what VLAN it belongs to and its priority ( quality of service ). This encapsulation

13081-629: The now-ubiquitous twisted pair with 10BASE-T. By the end of the 1980s, Ethernet was clearly the dominant network technology. In the process, 3Com became a major company. 3Com shipped its first 10 Mbit/s Ethernet 3C100 NIC in March 1981, and that year started selling adapters for PDP-11s and VAXes , as well as Multibus -based Intel and Sun Microsystems computers. This was followed quickly by DEC's Unibus to Ethernet adapter, which DEC sold and used internally to build its own corporate network, which reached over 10,000 nodes by 1986, making it one of

13208-450: The port they are intended for, traffic on a switched Ethernet is less public than on shared-medium Ethernet. Despite this, switched Ethernet should still be regarded as an insecure network technology, because it is easy to subvert switched Ethernet systems by means such as ARP spoofing and MAC flooding . The bandwidth advantages, the improved isolation of devices from each other, the ability to easily mix different speeds of devices and

13335-411: The repeater is limited to that of a single link, and all links must operate at the same speed. While repeaters can isolate some aspects of Ethernet segments , such as cable breakages, they still forward all traffic to all Ethernet devices. The entire network is one collision domain , and all hosts have to be able to detect collisions anywhere on the network. This limits the number of repeaters between

13462-534: The same LAN, unless the L2 LAN equipment is capable of and configured for filtering such traffic to match site-wide security requirements. Firewalls may be used to prevent clients among the public WAN from accessing the broadcast addresses of inside LAN segments, or routers may be configured to ignore subnet-directed broadcasts. Certain NICs support a security feature called "SecureOn". It allows users to store within

13589-549: The same physical infrastructure, employ multilayer switching to route between different classes, and use link aggregation to add bandwidth to overloaded links and to provide some redundancy. In 2016, Ethernet replaced InfiniBand as the most popular system interconnect of TOP500 supercomputers. The Ethernet physical layer evolved over a considerable time span and encompasses coaxial, twisted pair and fiber-optic physical media interfaces, with speeds from 1 Mbit/s to 400 Gbit/s . The first introduction of twisted-pair CSMA/CD

13716-482: The same time, and there is no collision domain. This doubles the aggregate bandwidth of the link and is sometimes advertised as double the link speed (for example, 200 Mbit/s for Fast Ethernet). The elimination of the collision domain for these connections also means that all the link's bandwidth can be used by the two devices on that segment and that segment length is not limited by the constraints of collision detection. Since packets are typically delivered only to

13843-512: The same time. They corrupt transmitted data and require stations to re-transmit. The lost data and re-transmission reduces throughput. In the worst case, where multiple active hosts connected with maximum allowed cable length attempt to transmit many short frames, excessive collisions can reduce throughput dramatically. However, a Xerox report in 1980 studied performance of an existing Ethernet installation under both normal and artificially generated heavy load. The report claimed that 98% throughput on

13970-413: The so-called Blue Book CSMA/CD specification as a candidate for the LAN specification. In addition to CSMA/CD, Token Ring (supported by IBM) and Token Bus (selected and henceforward supported by General Motors ) were also considered as candidates for a LAN standard. Competing proposals and broad interest in the initiative led to strong disagreement over which technology to standardize. In December 1980,

14097-411: The source addresses of incoming frames, the bridge then builds an address table associating addresses to segments. Once an address is learned, the bridge forwards network traffic destined for that address only to the associated segment, improving overall performance. Broadcast traffic is still forwarded to all network segments. Bridges also overcome the limits on total segments between two hosts and allow

14224-482: The switch or switches will repeatedly rebroadcast the broadcast messages flooding the network. Since the Layer 2 header does not support a time to live (TTL) value, if a frame is sent into a looped topology, it can loop forever. A physical topology that contains switching or bridge loops is attractive for redundancy reasons, yet a switched network must not have loops. The solution is to allow physical loops, but create

14351-473: The system BIOS/UEFI. Further configuration from the OS is required in some cases, for example via the Device Manager network card properties on Windows operating systems. Newer versions of Microsoft Windows integrate WoL functionality into the Device Manager. This is available in the Power Management tab of each network device's driver properties. For full support of a device's WoL capabilities (such as

14478-462: The system state is stored in RAM and the machine can wake up very quickly; in others the state is saved to disk and the motherboard powered down, taking at least several seconds to wake up. The machine can be awakened from a reduced-power state by a variety of signals. The machine's BIOS/UEFI must be set to allow Wake-on-LAN. To allow wakeup from powered-down state S5, wakeup on PME (Power Management Event)

14605-533: The system was deployed at PARC, Metcalfe and Boggs published a seminal paper. Ron Crane , Yogen Dalal , Robert Garner, Hal Murray, Roy Ogus, Dave Redell and John Shoch facilitated the upgrade from the original 2.94 Mbit/s protocol to the 10 Mbit/s protocol, which was released to the market in 1980. Metcalfe left Xerox in June 1979 to form 3Com . He convinced Digital Equipment Corporation (DEC), Intel , and Xerox to work together to promote Ethernet as

14732-627: The transmitter. The preamble is followed by the SFD which ends with a 1 instead of 0, to break the bit pattern of the preamble and signal the start of the actual frame. Physical layer transceiver circuitry (PHY for short) is required to connect the Ethernet MAC to the physical medium. The connection between a PHY and MAC is independent of the physical medium and uses a bus from the media-independent interface family ( MII , GMII , RGMII , SGMII , XGMII ). The preamble and SFD representation depends on

14859-464: The underlying Ethernet physical layer transport mechanisms. In other words, a data unit on an Ethernet link transports an Ethernet frame as its payload. An Ethernet frame is preceded by a preamble and start frame delimiter (SFD), which are both part of the Ethernet packet at the physical layer . Each Ethernet frame starts with an Ethernet header, which contains destination and source MAC addresses as its first two fields. The middle section of

14986-494: The use of the channel disregarding the nature of the data transmitted – either payload or overhead. At the physical layer, the link channel and equipment do not know the difference between data and control frames. We may calculate the channel utilization : The total time considers the round trip time along the channel, the processing time in the hosts and the time transmitting data and acknowledgements. The time spent transmitting data includes data and acknowledgements. A runt frame

15113-607: The value 0xAA, the LLC header is followed by a SNAP header. The SNAP header allows EtherType values to be used with all IEEE 802 protocols, as well as supporting private protocol ID spaces. In IEEE 802.3x-1997, the IEEE Ethernet standard was changed to explicitly allow the use of the 16-bit field after the MAC addresses to be used as a length field or a type field. The AppleTalk v2 protocol suite on Ethernet (" EtherTalk ") uses IEEE 802.2 LLC + SNAP encapsulation. We may calculate

15240-540: The width of the bus: ( GMII bus for Gigabit Ethernet transceivers) The SFD is immediately followed by the destination MAC address , which is the first field in an Ethernet frame. The header features destination and source MAC addresses (each six octets in length), the EtherType field and, optionally, an IEEE 802.1Q tag or IEEE 802.1ad tag. The EtherType field is two octets long and it can be used for two different purposes. Values of 1500 and below mean that it

15367-766: Was StarLAN , standardized as 802.3 1BASE5. While 1BASE5 had little market penetration, it defined the physical apparatus (wire, plug/jack, pin-out, and wiring plan) that would be carried over to 10BASE-T through 10GBASE-T. The most common forms used are 10BASE-T, 100BASE-TX, and 1000BASE-T . All three use twisted-pair cables and 8P8C modular connectors . They run at 10 Mbit/s , 100 Mbit/s , and 1 Gbit/s , respectively. Fiber optic variants of Ethernet (that commonly use SFP modules ) are also very popular in larger networks, offering high performance, better electrical isolation and longer distance (tens of kilometers with some versions). In general, network protocol stack software will work similarly on all varieties. In IEEE 802.3,

15494-435: Was derived. Original Ethernet's shared coaxial cable (the shared medium) traversed a building or campus to every attached machine. A scheme known as carrier-sense multiple access with collision detection (CSMA/CD) governed the way the computers shared the channel. This scheme was simpler than competing Token Ring or Token Bus technologies. Computers are connected to an Attachment Unit Interface (AUI) transceiver , which

15621-446: Was designed for point-to-point links only, and all termination was built into the device. This changed repeaters from a specialist device used at the center of large networks to a device that every twisted pair-based network with more than two machines had to use. The tree structure that resulted from this made Ethernet networks easier to maintain by preventing most faults with one peer or its associated cable from affecting other devices on

15748-555: Was essentially to limit the Aloha-like signals inside a cable, instead of broadcasting into the air. The idea was first documented in a memo that Metcalfe wrote on May 22, 1973, where he named it after the luminiferous aether once postulated to exist as an "omnipresent, completely passive medium for the propagation of electromagnetic waves." In 1975, Xerox filed a patent application listing Metcalfe, David Boggs , Chuck Thacker , and Butler Lampson as inventors. In 1976, after

15875-442: Was not, at some point in time most of the world's Ethernet traffic ran over "raw" 802.3 carrying IPX. Since NetWare 4.10, NetWare defaults to IEEE 802.2 with LLC (NetWare Frame Type Ethernet_802.2) when using IPX. Some protocols, such as those designed for the OSI stack , operate directly on top of IEEE 802.2 LLC encapsulation, which provides both connection-oriented and connectionless network services. IEEE 802.2 LLC encapsulation

16002-412: Was published in November 1982 and defines what has become known as Ethernet II . Formal standardization efforts proceeded at the same time and resulted in the publication of IEEE 802.3 on June 23, 1983. Ethernet initially competed with Token Ring and other proprietary protocols . Ethernet was able to adapt to market needs, and with 10BASE2 shift to inexpensive thin coaxial cable, and from 1990 to

16129-407: Was replaced with physical point-to-point links connected by Ethernet repeaters or switches . Ethernet stations communicate by sending each other data packets : blocks of data individually sent and delivered. As with other IEEE 802 LANs, adapters come programmed with globally unique 48-bit MAC address so that each Ethernet station has a unique address. The MAC addresses are used to specify both

#147852