Current Status and Application Trends of Ethernet Technology
2026-04-06 06:40:39··#1
Statistics show that 85% of the world's networks currently use Ethernet technology. Ethernet's advantages include low cost and flexibility, making its use as a product development platform in the access field an inevitable trend with a potential for dominance. Previously developed Ethernet products, such as Ethernet switches and wireless LAN devices, were mainly used in enterprise environments and cannot adequately meet the needs of commercial applications or enterprise customers' increasingly integrated business and network needs. For example, they lack strong manageability and the ability to identify and control services. Whether in enterprise networks or telecommunications networks, Ethernet products need to be transformed to truly adapt to user needs. I. Ethernet Technology Development Trends 1. End-to-End QoS is the Future Direction After more than a decade of development, new Ethernet services and applications have emerged, meaning increased network resource consumption. Simply ensuring high bandwidth is no longer sufficient. Ensuring end-to-end QoS for network applications has become the biggest challenge facing Ethernet. Traditional network construction models cannot meet the QoS requirements of existing services, and network applications urgently require equipment to support QoS at the edge and access layers. In the past, high QoS meant high price. However, the development of ASIC technology has made it possible for low-end devices to possess powerful QoS capabilities, enabling network QoS to gradually transition from centralized guarantees to end-to-end guarantees. Currently, network edge devices can identify application types based on port, MAC address, VLAN information, IP address, and even higher-layer information, and assign priority tags to data packets (such as modifying IEEE 802.1P and IP DiffServ domains). Core devices no longer need to identify applications; they only need to exchange data based on IP DiffServ and IEEE 802.1P to provide the corresponding quality of service. 2. Controllable Multicast Technology Basic multicast technology has the following problems: Low efficiency: Layer 2 networks do not adequately support multicast, resulting in significant waste of network resources. Difficult authentication: Multicast protocols do not provide user authentication support; users can freely join and leave multicast groups. Difficult management: Multicast sources lack effective means to control the direction and scope of multicast information transmission over the network. Difficult billing: Multicast protocols do not address billing. Multicast sources cannot know when users join or leave, making it impossible to count how many users are watching multicast programs on the network at a given time, thus hindering accurate billing. Controllable multicast technology, where Ethernet switches coordinate control signaling and the forwarding plane to achieve reliable multicast services, meets the needs of multicast management, authentication, and value-added service development. Control of the multicast source and multicast users is a crucial condition for achieving operable multicast. 3. Ethernet will become a more secure network . To address the security vulnerabilities of traditional Ethernet, switches have made significant progress in security technology: access control, user authentication, anti-address spoofing, intrusion detection and prevention, and security management technologies have become fundamental characteristics of Ethernet switches. 4. The Development of Intelligent Identification Technology With the development of chip technology, people's demands for network applications are gradually increasing. They are no longer satisfied with simply using switches to complete basic Layer 2 bridging and Layer 3 forwarding tasks, but are paying more attention to network service needs. They hope that new switches will have intelligent forwarding capabilities, able to identify different user groups and application levels/layers based on packet type, service priority, security requirements, etc., and forward packets accordingly to meet the wide range of needs of different users. Intelligent identification technology will gradually be applied to the Ethernet switch field. 5. Simplified Device Management Due to the low price of access layer devices, convenient management methods can be provided to general enterprise users via the web. Web-based management interfaces make network maintenance and management more user-friendly. However, for operational networks and large enterprises, the number of access layer devices is large, and the maintenance workload is significant. There is an urgent need for a unified management and maintenance method, namely a cluster management protocol. Cluster management can maintain numerous network devices through a single management IP, and has various convenient network maintenance methods such as device topology discovery, device and link failure alarms, and unified device configuration. It is gradually becoming the main means of managing network access layer devices. 6. User Management Functions Become More Complete Ethernet, since its inception as a local area network (LAN), has gradually become a mainstream network technology due to its excellent performance and price advantages. This development has also been accompanied by various challenges, such as the lack of user management mechanisms, frequent network storms and attacks. Therefore, user management technology has been rapidly applied to Ethernet, using authentication technology to ensure the normal operation of legitimate users. Common network authentication technologies include: VLAN + Web Authentication: When using the network, users first verify their legitimate identity through a web server. After authentication, they can obtain the user's SLA service. This authentication method does not require client software and supports more value-added services, making it the mainstream authentication technology. 802.1x Authentication: With the development of 802.1x extended technology, this authentication method can check the legitimacy of users at any time, prevent network fraud, and make time-based billing possible. The emergence of multiple authentication technologies has given Ethernet more practical user management features, thus laying the foundation for the operability and manageability of Ethernet. 7. VPN and other services are shifting from backbone to aggregation. With the development of Ethernet switch chip technology and the improvement of aggregation layer equipment performance, MPLS VPN services originally provided by the backbone layer are gradually being provided by aggregation layer Ethernet switches. The main reason for providing services through backbone equipment was the insufficient performance of aggregation layer equipment. However, the performance of current aggregation layer Ethernet switches has surpassed that of the original backbone equipment. From a service provision perspective, aggregation layer equipment is more numerous and closer to users, making service provision more convenient. From a network reliability perspective, backbone equipment should evolve towards simpler functionality. 8. User control functions are gradually shifting from centralized to distributed. Traditional networking solutions place a BAS device next to a large Ethernet switch. As the number of users continues to increase, centralized control methods have scalability issues and may cause bandwidth waste. Therefore, this centralized user control and access authentication method is gradually evolving towards distributed control. As user control functions gradually move down to the access layer aggregation part, such as the cell exit, user control functions exhibit distributed characteristics. However, user service management, billing, and service authentication are still centrally implemented on the service platform. In distributed mode, simple user control and access authentication functions can gradually be handled by Ethernet switches, while complex user management functions can be handled by distributed BAS. 9. Switches and Routers Will Gradually Converge Switch and router technologies have always developed in parallel during network construction. Switches are conventionally considered devices for LANs, while routers are responsible for interconnecting WANs. With the continuous maturation of ASIC technology and network processors, networks are gradually being unified by IP technology. Ethernet switch technology has moved beyond its initial "bridging" framework and is increasingly being applied to the aggregation and backbone layers: router network interfaces can be provided by switches; the rich routing protocols available in routers are also widely used in switches; the large-capacity routing tables of routers can also be implemented in switches; router technology uses the maximum address matching approach for route lookup, and backbone Layer 3 switches can achieve line-speed forwarding based on maximum matching. With the continuous development of ASIC technology, the gap between switches and routers in terms of routing update capabilities, packet buffering capabilities, and queue scheduling capabilities is gradually narrowing, further improving the cost-effectiveness of high-performance network equipment. II. Development Trends of Ethernet Networks As is well known, the access layer is the most active area in the development of Ethernet switch technology. With the continuous development of ASIC technology, the cost-effectiveness of products has been further improved, giving Ethernet switch technology a broader development space! The following analyzes the development trends of Ethernet network equipment. Due to the initial low installation rate, operators generally have low requirements for the number of switch ports. Some small-port (8/16-port) devices are very popular, and their cascaded ports can also be used for interconnection between corridor switches. Future switches will have dustproof, lightning protection, and moisture-proof functions, good electromagnetic shielding capabilities, and can operate normally in harsh environments. To reduce the impact on residential areas, low operating noise is required for switches, and AC/DC operating modes can be selected to meet the needs of different regions. Access layer switches are widely distributed and have many uncertainties, placing high demands on maintainability: remote fault location capabilities, group management capabilities, multiple configuration methods, and network management functions are indispensable elements. As we all know, business is the guide and the core. Simply competing on network capabilities will only lead to an endless price war. Good performance and business support capabilities are essential for winning users and sustainable development. Therefore, line-speed forwarding, uplink port bonding, multicast functionality, and multi-service applications are indispensable elements of a network. Network security is equally crucial. User isolation, MAC address filtering, broadcast storm suppression, and device security are all important functions that switches must fully consider. The construction of LAN networks is a significant brand for operators in the data service market and a major component of overall broadband solutions. Does solving the above problems mean everything is fine? Of course not! There is a significant difference between an operational network and an unmanaged enterprise network. How to build an operational and manageable network on top of an untrusted network foundation is paramount in network construction. The so-called operational and manageable aspects here include five major components: business, equipment maintenance and management, flexible billing, user access policy control, and user authentication. 1. User authentication using VLAN + Web authentication offers various value-added services and has become the mainstream authentication technology: It employs an authentication method combining account and physical location; utilizes VLAN isolation and encryption to ensure the security of Web authentication; is more efficient than PPPoE; reduces maintenance costs by replacing PPPoE virtual dial-up software with automatically downloaded JAVA programs; and is relevant to services, serving as the foundation for implementing Portal services. 2. User access policies use user-based access control lists, enabling functions including: configuring network segments accessible to users; configuring access and blocking between user groups; and protecting important servers on the network or in the community. 3. Flexible and diverse billing policies: remote authentication (Radius authentication), local authentication, and no authentication; billing methods: different rates based on duration, traffic, priority, and bandwidth, with various preferential policies. 4. Device maintenance and management supports unified network management, enabling zero-maintenance remote configuration (cluster management), providing visual graphical management, stacking management, and supporting PVLAN, Super VLAN, etc. 5. Service delivery is crucial for network development, and bandwidth control, multicast services, and service prioritization are indispensable functional characteristics. III. When Will the Convergence of the Three Networks Arrive? More than a decade ago, the concept of the convergence of the three networks was proposed. Telecommunications networks, IPTV networks, and computer networks arose and developed at different times and under different backgrounds, each with its own distinct era-specific solutions and standards. However, users' demands for comprehensive information have become increasingly clear: to obtain more content and services through a relatively consistent and simple network. The convergence of the three networks is inevitable, but it is not without its challenges. In this process, digital technology unifies different physical signals into binary bit streams, achieving convergence in transmission, switching, routing, and processing; optical communication technology provides ideal bandwidth, reduces transmission costs, and forms a converged transmission platform; software technology enables the three networks and their terminals to support various user-required features, functions, and services through software modifications; and communication protocol engineering research has proposed the goal of "achieving interconnection and interoperability of a large number of heterogeneous networks" and realized cross-platform application protocols represented by TCP/IP. All these technologies have laid the foundation for network convergence. IV. The Concept of IP Interconnection and Interoperability Currently, computer networks, represented by the Internet, mostly employ connectionless point-to-point communication, telecommunications networks mostly use connection-oriented point-to-point communication, and broadcast television networks use standardized connection-oriented broadcast communication. A converged network must be able to effectively accommodate these characteristics. The advantages of IP technology have been fully utilized in the convergence of these three networks. The network formed by the convergence of these three networks is a vast and complex network with heterogeneous components. The initial purpose of IP technology was to achieve interconnection and interoperability between heterogeneous systems. Using IP technology in the intermediate network layer allows for the smooth integration, synthesis, and unification of various service data, hardware and software environments, and communication protocols, thereby enabling comprehensive scheduling and management of network resources. The convergence of these three networks not only achieves integrated service provision in engineering but is also a necessary network architecture for future network evolution. In its research on next-generation networks, the ITU has explicitly referred to the GII (Global Information Infrastructure) as the "center for the convergence of computer, telecommunications, and broadcast technologies," and is conducting research on next-generation networks based on this foundation.