SlideShare una empresa de Scribd logo
1 de 49
WELCOME
       TO
  PANDU GROUP
PRESENTATION

WORLD
LAN (Local Area Network)


                by: Vishwa
LAN (Local Area Networks)
 A LAN is a computer network that covers a small area (home, office,
  building, campus)
   o a few kilometers
 LANs have higher data rates (10Mbps to 10Gbps) as compared to
  WANs
 LANs (usually) do not involve leased lines; cabling and equipments belong
  to the LAN owner.
 A LAN consists of
    o Shared transmission medium
        •   now so valid today due to switched LANs
    o regulations for orderly access to the medium
    o set of hardware and software for the interfacing devices
WORKING OF LAN
 LAN usually broadcast their message to all hosts on
  that LAN.
 This hosts shares a single transmission media.
 This broadcast network can be a static or dynamic
  method.
 In this static method each host is given a fixed time
  slides to send the information. This is the most popular
  method used.
 In the dynamic method a host can send a frame any time.
 If the two hosts send a frame at the same time the two
  frames could collide with each other.
 Dynamic method can be further sub-divided in 2
  categories:
  1. Centralized
     a. Carrier Sensing
     b. Token Passing
   2. Decentralized: Protocols are used to implement media
                      access control.
LAN Protocol Architecture
 Corresponds to lower two layers of OSI model
   o But mostly LANs do not follow OSI model

 Current LANs are most likely to be based on Ethernet protocols developed
  by IEEE 802 committee

  IEEE 802 reference model
    o Logical link control (LLC)
    o Media access control (MAC)
    o Physical
LAN PROTOCOLS IN CONTEXT
LAN Interconnection
Traditional LAN interconnection devices
 Repeater – it operates at OSI layer 1 and transmits data bits over a physical
   medium.
 Bridge – it operates at OSI layer 2 and is commonly used to connect similar
   LAN segments.
 Switch – it operates at OSI layer 2 or layer 3 and is used to interconnect
   multiple similar or dissimilar LANs.
 Router – it operates at OSI layer 3. A router is used to interconnect individual
   networks whose sizes vary from very small to very large. Routers may be
   categorized into backbone router (or core router), border router and access
   router depending on their role in the network.
LAN Architecture
 TOPOLOGIES
  • Star
  • Bus
  • Ring

 Transmission medium
 Layout
 Medium access control
LAN TOPOLOGIES
Advantages
 Long Distances Possible
10 Base-5 allows distances up to 500 meters (1650 feet). This
makes it very useful as a "backbone" technology for wiring
together multiple locations within a building without the use of
repeaters
 Noise Immunity
Since 10 Base-5 uses a very heavily shielded cable, it can be used
in electrically noisy environments which can cause other network
types to fail.
 Conceptually Simple
Since all devices on a 10 Base-5 network are simply chained
together on a common coaxial cable, it is a simple matter to plan
the routing of the cable
Disadvantages

 Inflexible
10 Base-5 networks do not lend themselves well to installations
where the setup of the network will change much after the initial
installation. It can be very difficult to add or move a node once it
is connected to the coaxial cable.
 Fault Intolerant
Since 10 Base-5 uses a common physical cable to interconnect all
the nodes, the failure of any part of the coaxial cable or any node
has the ability to cause the collapse of the entire network.
Bluetooth Technology



        by: PANDU
Bluetooth Birth
                              The Name –Bluetooth?
                                  The name is
                                   attributed to
                                   Harald Bluetooth
                                   was king of
                                   Denmark around
                                   the turn of the last
                                   millennium.



Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
What Is Bluetooth?
• Designed to be used to connect both mobile devices and
  peripherals that currently require a wire.

• “USB without wires”

• Short range wireless radio
technology.


- operate range of 100
   meters.
         Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Who Started Bluetooth?

 Ericsson Mobile Communication

               • Bluetooth Special Interest Group (SIG)
                  -5 founding members
                  -Ericsson, Nokia, IBM, Intel & Toshiba

               • Promoter’s Group
                  - 3COM, Lucent, Microsoft, Motorola

               • Now over 1900 members
   Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
How Does It Work?
• Bluetooth is a standard
for tiny, radio frequency
chips that can be plugged
into your devices
• These chips were designed to
take all of the information that
your wires normally send, and
transmit it at a special
        frequency to a receiver
            Bluetooth chip.

        Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth @ Home
                                                             er

  gita
      lC ame
             ra
                       NO WIRES
                          Computer
                                                        Scann

Di




     Inkjet
     Printer
                                                          xDSL
                                                          Access Point




                                           Player
                                           MP3
 Home Audio System                         PDA                    Cordless Phone
                                           Cell Phone             Base Station


       Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth Products                                 1

• Bluetooth-enabled
  PC Card




   Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth Products                                 2

• Bluetooth-enabled
  PDA




   Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth Products                                  3
• Bluetooth-enabled
  Cell Phone




    Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth Products                                  4

• Bluetooth-enabled
  Head Set




    Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Advantages (+)


• Wireless (No Cables)
• No Setup Needed
• Low Power Consumption (1 Milliwat)
• Industry Wide Support


Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Disadvantages (-)

• Short range (10 meters)
• Small throughput rates
   - Data Rate 1.0 Mbps
• Mostly for personal use
  (PANs)
• Fairly Expensive
Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
WIRELESS LAN

WIRLESS LOCAL AREA
     NETWORK
Wireless LANs
WIRELESS LAN
Introduction
Wireless Technology
Wireless LAN
Configuration
Differences between wired LAN vs
wireless LAN
INTRODUCTION
Data communications system
Alternates wired LAN
Transmits and receives data over the air
 Minimize the need for wired connections
Become more popular in general-purpose
alternative of business customers.
Benefited several industries in productivity
and mobility
WHY WIRELESS?
Advantages:

 MOBILITY
 INSTALLATION
 COST
 SCALABILITY
MOBILITY
Real-time information access from
anywhere at any time
Increases productivity and flexibility
HOW IT WORKS
Use electromagnetic airwaves to
communicate information
Data imposed on radio carrier (radio wave)

RF electromagnetic wave can easily
pass through ordinary wall, it needs to
implement with heavy concrete or metal
screening.
WIRELESS TECHNOLOGY
 Satellite-Based System
 – Geosynchronous Earth Orbiting (GEO)
 – Low Earth Orbiting (LEO)
 Land-Based Network Access System
 – Wireless WAN
 – Wireless LAN
WIRELESS WAN
Provide nationwide or citywide
coverage
Example: Ricochet Micro-Cell
WIRELESS LAN
Wireless LAN Topology
– 2 main components
      Access Points
      Adapters
– Roaming
Wireless LAN Technology
–   Types
–   Standard
–   Configuration
ACCESS POINTS
Connects to the wired network
single access point can support a small
group of users within a range of several
hundred feet

       Wireless Clients Connected to LAN
          via Access Point
WIRELESS LAN
    TECHNOLOGY
Narrowband Technology
Spread Spectrum Technology
– Frequency-Hopping Spread Spectrum
  Technology
– Direct-Sequence Spread Spectrum
  Technology
Infrared Technology
INFRARED (IR)
     TECHNOLOGY
Little used in commercial wireless LANs
Use very high frequencies
Inexpensive, but provide very limited
range (3ft)
Typically used for personal area
networks
Used only to implement fixed
subnetworks
CONFIGURATION
Peer-to-peer network
Client and Access point
Multiple access points and roaming
Using an extension point
Using directional antennas
•

       Star Topology



    by:CH.Mahesh
Star Topology:

• The star network configuration is the most popular
  physical topology
• In a star configuration, all computers or stations are
  wired directly to a central location:
   – Concentrator (a.k.a. hub)
   – Multistation Access Unit (MAU)
• A data signal from any station goes directly to this
  central device, which transmits the signal according
  to the established network access method for the
  type of network
Physical Topologies:
                        Star


Figure-2:
Star topology
Star
Star topology advantages:

– A break in one cable does not affect all other
  stations as it does in bus technologies
– Problems are easier to locate because symptoms
  often point to one station
– The second-easiest topology to design and install
– Does not require manual termination
   • Instead the media is terminated in the station at the
     transceiver on the NIC and in the hub or MAU
Star topology disadvantages:

– Hubs, which are required for a star topology, are
  more expensive than bus connectors
– A failure at the hub can affect the entire
  configuration and all connected stations
– Uses more cable than bus topologies
WORKING OF LAN
WORKING OF LAN

Más contenido relacionado

La actualidad más candente

Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyAman Jaiswal
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 
Exploitation of Local Area Network Services
Exploitation of Local Area Network ServicesExploitation of Local Area Network Services
Exploitation of Local Area Network ServicesMohammed El Hedhly
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Designnakomuri
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsAndriy Berestovskyy
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
Point to point.48
Point to point.48Point to point.48
Point to point.48myrajendra
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesOnline
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Librarysanjay thakur
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Securitydpd
 
Lan basic
Lan basicLan basic
Lan basicOnline
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 

La actualidad más candente (20)

Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Lan wan
Lan wanLan wan
Lan wan
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
Exploitation of Local Area Network Services
Exploitation of Local Area Network ServicesExploitation of Local Area Network Services
Exploitation of Local Area Network Services
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
 
Vo ip
Vo ipVo ip
Vo ip
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Chapter1
Chapter1Chapter1
Chapter1
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Point to point.48
Point to point.48Point to point.48
Point to point.48
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
 
Lan basic
Lan basicLan basic
Lan basic
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 

Similar a WORKING OF LAN

Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologyRohit Roy
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptxPratik Gohel
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth AplicationEr Bhaduri
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]Raul Soto
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.pptssuser1d7ef1
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technologySuman Bhattacharyya
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technologydeepak kumar
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-securityAnand Dhana
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & SecurityHimangshu Hazra
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUNArun Franco
 

Similar a WORKING OF LAN (20)

Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth Aplication
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Más de myrajendra (20)

Fundamentals
FundamentalsFundamentals
Fundamentals
 
Data type
Data typeData type
Data type
 
Hibernate example1
Hibernate example1Hibernate example1
Hibernate example1
 
Jdbc workflow
Jdbc workflowJdbc workflow
Jdbc workflow
 
2 jdbc drivers
2 jdbc drivers2 jdbc drivers
2 jdbc drivers
 
3 jdbc api
3 jdbc api3 jdbc api
3 jdbc api
 
4 jdbc step1
4 jdbc step14 jdbc step1
4 jdbc step1
 
Dao example
Dao exampleDao example
Dao example
 
Sessionex1
Sessionex1Sessionex1
Sessionex1
 
Internal
InternalInternal
Internal
 
3. elements
3. elements3. elements
3. elements
 
2. attributes
2. attributes2. attributes
2. attributes
 
1 introduction to html
1 introduction to html1 introduction to html
1 introduction to html
 
Headings
HeadingsHeadings
Headings
 
Forms
FormsForms
Forms
 
Css
CssCss
Css
 
Views
ViewsViews
Views
 
Views
ViewsViews
Views
 
Views
ViewsViews
Views
 
Starting jdbc
Starting jdbcStarting jdbc
Starting jdbc
 

Último

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

WORKING OF LAN

  • 1. WELCOME TO PANDU GROUP PRESENTATION WORLD
  • 2. LAN (Local Area Network) by: Vishwa
  • 3. LAN (Local Area Networks)  A LAN is a computer network that covers a small area (home, office, building, campus) o a few kilometers  LANs have higher data rates (10Mbps to 10Gbps) as compared to WANs  LANs (usually) do not involve leased lines; cabling and equipments belong to the LAN owner.  A LAN consists of o Shared transmission medium • now so valid today due to switched LANs o regulations for orderly access to the medium o set of hardware and software for the interfacing devices
  • 4. WORKING OF LAN  LAN usually broadcast their message to all hosts on that LAN.  This hosts shares a single transmission media.  This broadcast network can be a static or dynamic method.  In this static method each host is given a fixed time slides to send the information. This is the most popular method used.
  • 5.  In the dynamic method a host can send a frame any time.  If the two hosts send a frame at the same time the two frames could collide with each other.  Dynamic method can be further sub-divided in 2 categories: 1. Centralized a. Carrier Sensing b. Token Passing 2. Decentralized: Protocols are used to implement media access control.
  • 6. LAN Protocol Architecture  Corresponds to lower two layers of OSI model o But mostly LANs do not follow OSI model  Current LANs are most likely to be based on Ethernet protocols developed by IEEE 802 committee  IEEE 802 reference model o Logical link control (LLC) o Media access control (MAC) o Physical
  • 8. LAN Interconnection Traditional LAN interconnection devices  Repeater – it operates at OSI layer 1 and transmits data bits over a physical medium.  Bridge – it operates at OSI layer 2 and is commonly used to connect similar LAN segments.  Switch – it operates at OSI layer 2 or layer 3 and is used to interconnect multiple similar or dissimilar LANs.  Router – it operates at OSI layer 3. A router is used to interconnect individual networks whose sizes vary from very small to very large. Routers may be categorized into backbone router (or core router), border router and access router depending on their role in the network.
  • 9. LAN Architecture  TOPOLOGIES • Star • Bus • Ring  Transmission medium  Layout  Medium access control
  • 11. Advantages  Long Distances Possible 10 Base-5 allows distances up to 500 meters (1650 feet). This makes it very useful as a "backbone" technology for wiring together multiple locations within a building without the use of repeaters  Noise Immunity Since 10 Base-5 uses a very heavily shielded cable, it can be used in electrically noisy environments which can cause other network types to fail.  Conceptually Simple Since all devices on a 10 Base-5 network are simply chained together on a common coaxial cable, it is a simple matter to plan the routing of the cable
  • 12. Disadvantages  Inflexible 10 Base-5 networks do not lend themselves well to installations where the setup of the network will change much after the initial installation. It can be very difficult to add or move a node once it is connected to the coaxial cable.  Fault Intolerant Since 10 Base-5 uses a common physical cable to interconnect all the nodes, the failure of any part of the coaxial cable or any node has the ability to cause the collapse of the entire network.
  • 13.
  • 14. Bluetooth Technology by: PANDU
  • 15. Bluetooth Birth  The Name –Bluetooth?  The name is attributed to Harald Bluetooth was king of Denmark around the turn of the last millennium. Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 16. What Is Bluetooth? • Designed to be used to connect both mobile devices and peripherals that currently require a wire. • “USB without wires” • Short range wireless radio technology. - operate range of 100 meters. Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 17. Who Started Bluetooth? Ericsson Mobile Communication • Bluetooth Special Interest Group (SIG) -5 founding members -Ericsson, Nokia, IBM, Intel & Toshiba • Promoter’s Group - 3COM, Lucent, Microsoft, Motorola • Now over 1900 members Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 18. How Does It Work? • Bluetooth is a standard for tiny, radio frequency chips that can be plugged into your devices • These chips were designed to take all of the information that your wires normally send, and transmit it at a special frequency to a receiver Bluetooth chip. Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 19. Bluetooth @ Home er gita lC ame ra NO WIRES Computer Scann Di Inkjet Printer xDSL Access Point Player MP3 Home Audio System PDA Cordless Phone Cell Phone Base Station Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 20. Bluetooth Products 1 • Bluetooth-enabled PC Card Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 21. Bluetooth Products 2 • Bluetooth-enabled PDA Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 22. Bluetooth Products 3 • Bluetooth-enabled Cell Phone Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 23. Bluetooth Products 4 • Bluetooth-enabled Head Set Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 24. Advantages (+) • Wireless (No Cables) • No Setup Needed • Low Power Consumption (1 Milliwat) • Industry Wide Support Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 25. Disadvantages (-) • Short range (10 meters) • Small throughput rates - Data Rate 1.0 Mbps • Mostly for personal use (PANs) • Fairly Expensive Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 26.
  • 29. WIRELESS LAN Introduction Wireless Technology Wireless LAN Configuration Differences between wired LAN vs wireless LAN
  • 30. INTRODUCTION Data communications system Alternates wired LAN Transmits and receives data over the air Minimize the need for wired connections Become more popular in general-purpose alternative of business customers. Benefited several industries in productivity and mobility
  • 31. WHY WIRELESS? Advantages: MOBILITY INSTALLATION COST SCALABILITY
  • 32. MOBILITY Real-time information access from anywhere at any time Increases productivity and flexibility
  • 33. HOW IT WORKS Use electromagnetic airwaves to communicate information Data imposed on radio carrier (radio wave) RF electromagnetic wave can easily pass through ordinary wall, it needs to implement with heavy concrete or metal screening.
  • 34. WIRELESS TECHNOLOGY Satellite-Based System – Geosynchronous Earth Orbiting (GEO) – Low Earth Orbiting (LEO) Land-Based Network Access System – Wireless WAN – Wireless LAN
  • 35. WIRELESS WAN Provide nationwide or citywide coverage Example: Ricochet Micro-Cell
  • 36. WIRELESS LAN Wireless LAN Topology – 2 main components Access Points Adapters – Roaming Wireless LAN Technology – Types – Standard – Configuration
  • 37. ACCESS POINTS Connects to the wired network single access point can support a small group of users within a range of several hundred feet Wireless Clients Connected to LAN via Access Point
  • 38. WIRELESS LAN TECHNOLOGY Narrowband Technology Spread Spectrum Technology – Frequency-Hopping Spread Spectrum Technology – Direct-Sequence Spread Spectrum Technology Infrared Technology
  • 39. INFRARED (IR) TECHNOLOGY Little used in commercial wireless LANs Use very high frequencies Inexpensive, but provide very limited range (3ft) Typically used for personal area networks Used only to implement fixed subnetworks
  • 40. CONFIGURATION Peer-to-peer network Client and Access point Multiple access points and roaming Using an extension point Using directional antennas
  • 41.
  • 42. Star Topology by:CH.Mahesh
  • 43. Star Topology: • The star network configuration is the most popular physical topology • In a star configuration, all computers or stations are wired directly to a central location: – Concentrator (a.k.a. hub) – Multistation Access Unit (MAU) • A data signal from any station goes directly to this central device, which transmits the signal according to the established network access method for the type of network
  • 44. Physical Topologies: Star Figure-2: Star topology
  • 45. Star
  • 46. Star topology advantages: – A break in one cable does not affect all other stations as it does in bus technologies – Problems are easier to locate because symptoms often point to one station – The second-easiest topology to design and install – Does not require manual termination • Instead the media is terminated in the station at the transceiver on the NIC and in the hub or MAU
  • 47. Star topology disadvantages: – Hubs, which are required for a star topology, are more expensive than bus connectors – A failure at the hub can affect the entire configuration and all connected stations – Uses more cable than bus topologies