SlideShare una empresa de Scribd logo
1 de 26
LAN - WAN
ARCHITECTURE

1
NETWORK
 Set of devices connected by communication
links.
 No specific taxonomy available in which all
computer networks fit, still two are of vital
importance:
Network Technologies

Transmission Technology

Geographical Span

2
Classification on transmission
technology

Point-to-point Network

Broadcast Network
3
Network topology based on area
Bus topology:

Star topology:

Ring Topology :

Mesh topology:

4
Categories of Network
 LAN -Privately owned and links the devices in
a single office, building or campus.
 MAN -Designed to extend over an entire city
either by cable television network or connecting
many LANs into a larger network.
 WAN -Provides long-distance transmission of
data, voice, image etc. over large geographic
outline may be country or continent or the
world.
5
6
Components of LAN
 A Local Area Network, LAN is a combination of
hardware and software.
 The physical component of the network system
is hardware. The invisible part, that is programs
enabling the network to function properly is the
software.
 Ethernet is the most dominant LAN in the
market.
7
LAN Protocol
Architecture
 Lower layers of OSI model
 IEEE 802 reference model, is a standardized
protocol architecture for LANs, which describes:




Physical layer.
Logical link control (LLC) sub-layer,
Media access control (MAC) sub-layer.

Data Link Layer

8
OSI Model
• Provides for reliable transfer of

IEEE 802 Reference Model

information across the physical link
• Sends blocks (frames) with necessary
synchronization
• Error control, flow control

Application
Presentation
Session
Transport
Network
Data Link
Physical

IEEE 802 committee developed, revises, and
extends standards
Use a three-layer protocol hierarchy: physical,
medium access control (MAC), and logical link
control (LLC)

• Concerned with transmission of bit

stream
• Deal with mechanical, electrical
functionality
• Procedural characteristics to 9
access physical medium
ETHERNET
 Most widely used data communication standard
 Physical Medium – Carry signal between
computers.
 MAC rules embedded in each interface that
allow multiple computers to access shared
channel.
 Ethernet frame of standardized set of bits used
to carry data over the system.
 Uses Star topology and 1-persistent CSMA/CD
10
access method.
Logical Link Control
 Acts as interface between MAC and upper
layer.
 Accountable for flow control.
 Manages error control and error detection.
 Independent of topology and medium.
 Specifies method of addressing whether
unicast multicast or broadcast.
11
MAC Sublayer
Governs the operation of access method and
frames data from upper layer and passes them
for encoding. Access method is 1-persistent
CSMA/CD.
Frame format

12
Physical Layer
 Encoding/decoding of signals mostly using
Manchester coding.
 Bit transmission/reception
 Specification of the transmission medium.
 Preamble generation/removal
 Transmission medium and topology

13
Data Transfer through Ethernet
LAN
Twisted pair or fiber optics with RJ-45 plug or sockets.
Data rate range from 100Mbits/s to 1000Mbits/s
To network multiple devices, switch is required where
devices are connected to it using regular network
cable.
 Registers MAC address of each devices connected to
it. When switch receives data, it forwards it only to the
port that is connected to the device with appropriate
destination MAC address.




14
Token Ring Network









Originally developed by IBM in 1970’s
Still IBM’s primary LAN technology
In cases of heavy traffic, the token ring
network has higher throughput than
Ethernet due to the deterministic (nonrandom) nature of the medium access
Is used in applications in which delay
when sending data must be predictable
Is a robust network i.e. it is fault
tolerant through fault management
mechanisms
Can support data rates of around 16
Mbps
Typically uses twisted pair
15
FDDI (Fiber Distributed Data
Interface)
 FDDI is a standard developed by the
American National Standards Institute
(ANSI) for transmitting data on optical
fibers
 Supports transmission rates of up to 200
Mbps
 Uses a dual ring
 First ring used to carry data at 100
Mbps. Second ring used for primary
backup in case first ring fails
 If no backup is needed, second ring
can also carry data, increasing the data
rate up to 200 Mbps
 Supports up to 1000 nodes

16
Wide Area Network
 Contains collection of machines called hosts running
user program and the host are connected by subnet
which carries message from host to host.
 Host owned by customers and subnet by ISP.
 Subnet consists of transmission lines and switching
element.
 Switching computers are called routers

17
Wide Area Network
(Contd.)

 Packets sent from receiver to sender may be stored at
intermediate router till the required output line is busy.
 This principle is known as “Store-n-Forward” which is
implemented by almost all WAN except using Satellite.
 Sender cuts the data into packets bearing a number
and injected into network one at a time and at the
receiver they are reassembled into original message.

18
WAN TECHNOLOGY
 Devices on subscriber premises are called Customer

Premises Equipment owned by the subscriber.
 Copper or fiber cable connects CPE to Central
Office (CO) which is known as local loop.

19
20
WAN Link Options

21
Circuit Switched
 When a subscriber makes a telephone call, the dialed
number is used to set switches in the exchanges
along the route of the call so that there is a continuous
circuit from the originating caller to that of the called
party where the internal path is shared by a number of
conversations.
 Time division multiplexing (TDM) is used to give each
conversation a share of the connection in turn.

22
PACKET SWITCHING
 An alternative is to allocate the capacity to the traffic
only when it is needed. Share the available capacity
between many users
 Huge data converted into packets which passes from
exchange to exchange through network.
 Allows same data path to be shared between various
users in the network.

23
Leased Lines
 A point-to-point link provides a pre-established WAN
communications path from the customer premises
through the provider network to a remote destination.
 Point-to-point lines are usually leased from a carrier
and are called leased lines.
 Leased lines provide direct point-to-point connections
between LANs and connect individual branches to a
packet-switched network.

24
WAN Considerations
 Many WANs are connected to the Internet to provide
alternative for inter-branch connections.
 Since the Internet probably exists everywhere that the
enterprise has LANs, there are two principal ways that
this traffic can be carried.
 Each LAN can have a connection to its local ISP, or
there can be a single connection from one of the core
routers to an ISP.
 The advantage is that traffic is carried on the Internet
rather than on the enterprise network, possibly leading
to smaller WAN links.
25
Thank You!!
26

Más contenido relacionado

La actualidad más candente

Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular networkMaulik Patel
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingAbhiram Subhagan
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksBala Lavanya
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkShubhamTakkar
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
zigbee technology
zigbee technology zigbee technology
zigbee technology N.CH Karthik
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor networkrasyidi usman
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnologyvineetkathan
 

La actualidad más candente (20)

Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
wireless cellular network
wireless cellular networkwireless cellular network
wireless cellular network
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
Computer network
Computer networkComputer network
Computer network
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnology
 

Destacado

Cubase Presentation Cain
Cubase Presentation CainCubase Presentation Cain
Cubase Presentation CainZoe Harris
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networkskavish dani
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesRishabh Dangwal
 
Designing of media player
Designing of media playerDesigning of media player
Designing of media playerNur Islam
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentationbwire sedrick
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LANAhmar Hashmi
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchiLeandro Uglar
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processingbwire sedrick
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & controlbwire sedrick
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksSatish Reddy
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management DevicesRahul P
 

Destacado (20)

Cubase Presentation Cain
Cubase Presentation CainCubase Presentation Cain
Cubase Presentation Cain
 
Wrou01
Wrou01Wrou01
Wrou01
 
Сүлжээ1
Сүлжээ1Сүлжээ1
Сүлжээ1
 
Advanced multihoming
Advanced multihomingAdvanced multihoming
Advanced multihoming
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
 
Chapter3
Chapter3Chapter3
Chapter3
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration Devices
 
Designing of media player
Designing of media playerDesigning of media player
Designing of media player
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchi
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
Nms chapter 01
Nms chapter 01Nms chapter 01
Nms chapter 01
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & control
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 

Similar a Lan wan

Networks classification
Networks classificationNetworks classification
Networks classificationMukesh Chinta
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptunnipb1
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptgauravgoswami78
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.pptrakesh132809
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptxSelfUse
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptnilesh405711
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 

Similar a Lan wan (20)

IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.ppt
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).ppt
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 

Más de Nur Islam

Overview of iso 9001
Overview of iso 9001Overview of iso 9001
Overview of iso 9001Nur Islam
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & qualityNur Islam
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimationNur Islam
 
Organization and team structures
Organization and team structuresOrganization and team structures
Organization and team structuresNur Islam
 
Halsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical techniqueHalsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical techniqueNur Islam
 
Cellular automata
Cellular automataCellular automata
Cellular automataNur Islam
 

Más de Nur Islam (7)

Gsm
GsmGsm
Gsm
 
Overview of iso 9001
Overview of iso 9001Overview of iso 9001
Overview of iso 9001
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimation
 
Organization and team structures
Organization and team structuresOrganization and team structures
Organization and team structures
 
Halsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical techniqueHalsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical technique
 
Cellular automata
Cellular automataCellular automata
Cellular automata
 

Último

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Último (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Lan wan

  • 2. NETWORK  Set of devices connected by communication links.  No specific taxonomy available in which all computer networks fit, still two are of vital importance: Network Technologies Transmission Technology Geographical Span 2
  • 4. Network topology based on area Bus topology: Star topology: Ring Topology : Mesh topology: 4
  • 5. Categories of Network  LAN -Privately owned and links the devices in a single office, building or campus.  MAN -Designed to extend over an entire city either by cable television network or connecting many LANs into a larger network.  WAN -Provides long-distance transmission of data, voice, image etc. over large geographic outline may be country or continent or the world. 5
  • 6. 6
  • 7. Components of LAN  A Local Area Network, LAN is a combination of hardware and software.  The physical component of the network system is hardware. The invisible part, that is programs enabling the network to function properly is the software.  Ethernet is the most dominant LAN in the market. 7
  • 8. LAN Protocol Architecture  Lower layers of OSI model  IEEE 802 reference model, is a standardized protocol architecture for LANs, which describes:    Physical layer. Logical link control (LLC) sub-layer, Media access control (MAC) sub-layer. Data Link Layer 8
  • 9. OSI Model • Provides for reliable transfer of IEEE 802 Reference Model information across the physical link • Sends blocks (frames) with necessary synchronization • Error control, flow control Application Presentation Session Transport Network Data Link Physical IEEE 802 committee developed, revises, and extends standards Use a three-layer protocol hierarchy: physical, medium access control (MAC), and logical link control (LLC) • Concerned with transmission of bit stream • Deal with mechanical, electrical functionality • Procedural characteristics to 9 access physical medium
  • 10. ETHERNET  Most widely used data communication standard  Physical Medium – Carry signal between computers.  MAC rules embedded in each interface that allow multiple computers to access shared channel.  Ethernet frame of standardized set of bits used to carry data over the system.  Uses Star topology and 1-persistent CSMA/CD 10 access method.
  • 11. Logical Link Control  Acts as interface between MAC and upper layer.  Accountable for flow control.  Manages error control and error detection.  Independent of topology and medium.  Specifies method of addressing whether unicast multicast or broadcast. 11
  • 12. MAC Sublayer Governs the operation of access method and frames data from upper layer and passes them for encoding. Access method is 1-persistent CSMA/CD. Frame format 12
  • 13. Physical Layer  Encoding/decoding of signals mostly using Manchester coding.  Bit transmission/reception  Specification of the transmission medium.  Preamble generation/removal  Transmission medium and topology 13
  • 14. Data Transfer through Ethernet LAN Twisted pair or fiber optics with RJ-45 plug or sockets. Data rate range from 100Mbits/s to 1000Mbits/s To network multiple devices, switch is required where devices are connected to it using regular network cable.  Registers MAC address of each devices connected to it. When switch receives data, it forwards it only to the port that is connected to the device with appropriate destination MAC address.    14
  • 15. Token Ring Network        Originally developed by IBM in 1970’s Still IBM’s primary LAN technology In cases of heavy traffic, the token ring network has higher throughput than Ethernet due to the deterministic (nonrandom) nature of the medium access Is used in applications in which delay when sending data must be predictable Is a robust network i.e. it is fault tolerant through fault management mechanisms Can support data rates of around 16 Mbps Typically uses twisted pair 15
  • 16. FDDI (Fiber Distributed Data Interface)  FDDI is a standard developed by the American National Standards Institute (ANSI) for transmitting data on optical fibers  Supports transmission rates of up to 200 Mbps  Uses a dual ring  First ring used to carry data at 100 Mbps. Second ring used for primary backup in case first ring fails  If no backup is needed, second ring can also carry data, increasing the data rate up to 200 Mbps  Supports up to 1000 nodes 16
  • 17. Wide Area Network  Contains collection of machines called hosts running user program and the host are connected by subnet which carries message from host to host.  Host owned by customers and subnet by ISP.  Subnet consists of transmission lines and switching element.  Switching computers are called routers 17
  • 18. Wide Area Network (Contd.)  Packets sent from receiver to sender may be stored at intermediate router till the required output line is busy.  This principle is known as “Store-n-Forward” which is implemented by almost all WAN except using Satellite.  Sender cuts the data into packets bearing a number and injected into network one at a time and at the receiver they are reassembled into original message. 18
  • 19. WAN TECHNOLOGY  Devices on subscriber premises are called Customer Premises Equipment owned by the subscriber.  Copper or fiber cable connects CPE to Central Office (CO) which is known as local loop. 19
  • 20. 20
  • 22. Circuit Switched  When a subscriber makes a telephone call, the dialed number is used to set switches in the exchanges along the route of the call so that there is a continuous circuit from the originating caller to that of the called party where the internal path is shared by a number of conversations.  Time division multiplexing (TDM) is used to give each conversation a share of the connection in turn. 22
  • 23. PACKET SWITCHING  An alternative is to allocate the capacity to the traffic only when it is needed. Share the available capacity between many users  Huge data converted into packets which passes from exchange to exchange through network.  Allows same data path to be shared between various users in the network. 23
  • 24. Leased Lines  A point-to-point link provides a pre-established WAN communications path from the customer premises through the provider network to a remote destination.  Point-to-point lines are usually leased from a carrier and are called leased lines.  Leased lines provide direct point-to-point connections between LANs and connect individual branches to a packet-switched network. 24
  • 25. WAN Considerations  Many WANs are connected to the Internet to provide alternative for inter-branch connections.  Since the Internet probably exists everywhere that the enterprise has LANs, there are two principal ways that this traffic can be carried.  Each LAN can have a connection to its local ISP, or there can be a single connection from one of the core routers to an ISP.  The advantage is that traffic is carried on the Internet rather than on the enterprise network, possibly leading to smaller WAN links. 25