0% found this document useful (0 votes)
34 views31 pages

Lans, Wans, and Internetworks

This document discusses different types of computer networks including local area networks (LANs), wide area networks (WANs), and internetworks. LANs connect devices within a common location, WANs connect LANs over longer distances, and internetworks connect multiple LANs and WANs together to form a global network. Common networking devices that help connect and transmit data between devices on these different types of networks include hubs, bridges, switches, modems, and routers.

Uploaded by

Hassan alla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views31 pages

Lans, Wans, and Internetworks

This document discusses different types of computer networks including local area networks (LANs), wide area networks (WANs), and internetworks. LANs connect devices within a common location, WANs connect LANs over longer distances, and internetworks connect multiple LANs and WANs together to form a global network. Common networking devices that help connect and transmit data between devices on these different types of networks include hubs, bridges, switches, modems, and routers.

Uploaded by

Hassan alla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

LANs, WANs, and Internetworks

Networks come in many sizes and serve a wide


variety of functions. Following are some of the
basic differences:
■ The size of the area covered.
■ The number of users connected.
■ The number and types of services available.
Three distinct groups of networks accommodate
different groups and extend geographic
boundaries: local-area networks (LANs), wide-area
networks (WANs), and internetworks.
Local-Area Networks
• A local-area network (LAN) is a group of end devices
and users under the control of a common
administration.
• The term local first meant that the computers were
grouped geographically close together and had the
same purpose in an organization.
• This is still true in many situations, but as technologies
evolve, the definition of local has evolved as well.
• A LAN can consist of one group of users on one floor,
but the term can also be used to describe all users on a
multi-building campus.
Wide-Area Networks
• A wide-area network (WAN) is a network that is used
to connect LANs that are located geographically far
apart.
• If a company has offices in different cities, it will
contract with a telecommunications service provider
(TSP) to provide data lines between LANs in each city.
• The leased lines will vary in service and bandwidth,
depending on the terms of the contract. The TSP is
responsible for the intermediary devices on the WAN
that transports messages.
• The sole purpose of WANs is to connect LANs, and
there are usually no end users on WANs.
The Internet: A Network of Networks
• An internetwork is a collection of two or more
LANs connected by WANs. Internetworks are
referred to interchangeably as data networks
or simply networks. The most popular
internetwork is the Internet, which is open to
public use. With LANs able to communicate
with other LANs using WANs, many
organizations developed intranets.
The Intranets
• The Intranets is a term often confused with the
Internet, an intranet is a private web of networks
closed to the public but open for employees to
browse.
• For example, many companies use intranets to
share company information and training across
the globe to far-away employees.
• Documents are shared and projects are managed
securely over great distances on an intranet.
Network Devices
When discussing how devices and media connect to
each other, remember these important terms:
• Network interface card (NIC): A NIC, or LAN
adapter, provides the physical connection to the
network at the PC or other host device.
• The media connecting the PC to the networking
device plugs directly into the NIC.
• Each NIC has a unique physical address (MAC
ADDRESS) that identifies it on the LAN.
Network Devices
■ Physical port: A physical port is a connector or
outlet on a networking device where the media is
connected to a host or other networking device.
■ Interface: The term interface refers to how the
device can allow two different networks to
communicate. Routers connect to different
networks, and the specialized NICs on routers are
simply called interfaces. The interface on a router
device has a unique physical address and appears
as a host on the local network
Network Interface Card (NIC)
• This is also known as network adapter card,
Ethernet Card and LAN card. NIC allows our PC
to communicate with other PCs.
• A PC uses parallel data transmission
technology to transmit data between its
internal parts while the media that connects
this PC with other PCs uses serial data
transmission technology.
• A NIC converts parallel data stream into serial
data stream and vice versa serial data stream
is get converted in parallel data stream.
Network Interface Card (NIC)
The Patch Panel
It is used to organize the UTP cables
systematically. It doesn’t interfere in data signal.
The Hub
• A hub, also called a network hub, is a common
connection point for devices in a network.
• Hubs are devices commonly used to
connect segments of a LAN.
• The hub contains multiple ports. When
a packet arrives at one port, it is copied to the
other ports so that all segments of the LAN can
see all packets.
The Hub
The Hub: When hubs receive an electrical signal in one port (step 1 in
Figure), the hub repeats the signal out all other ports (step 2 in the
figure).
When two or more devices send at the same time, an electrical
collision occurs, making both signals corrupt.
As a result, devices must take turns by using carrier sense multiple
access with collision detection (CSMA/CD) logic, so the devices share
the (10-Mbps) bandwidth.
Broadcasts sent by one device are heard by, and processed by, all
other devices on the LAN.
Unicast frames are heard by all other devices on the LAN.
The Hub
• Over time, the performance of many Ethernet
networks based on hubs started to degrade.
• The increase in traffic volumes resulted in an
increased number of collisions, requiring
more retransmissions and wasting more LAN
capacity.
• Ethernet transparent bridges, or simply
bridges, helped solve this performance
problem with 10BASE-T.
The Bridge
• Bridges separated devices into groups called collision
domains.
• Bridges reduced the number of collisions that occurred in
the network, because frames inside one collision domain
did not collide with frames in another collision domain.
• Bridges increased bandwidth by giving each collision
domain its own separate bandwidth, with one sender at a
time per collision domain.
The Bridge
• Adding the bridge in Figure really creates two
separate 10BASE-T networks—one on the left
and one on the right.
• The 10BASE-T network on the left has its own 10
Mbps to share, as does the network on the right.
So, in this example, the total network bandwidth
is doubled to 20 Mbps as compared with the
10BASE-T network of HUB, because devices on
each side of the network can send at 10 Mbps at
the same time.
The Switch
• LAN switches perform the same basic core functions as bridges,
but at much faster speeds and with many enhanced features.
• Like bridges, switches segment a LAN into separate collision
domains, each with its own capacity.
• And if the network does not have a hub, each single link is
considered its own CD, even if no collisions can actually occur in
that case.
• For example, Figure 6-3 shows a simple LAN with a switch and
four PCs. The switch creates four CDs, with the ability to send at
100 Mbps in this case on each of the four links.
• And with no hubs, each link can run at full-duplex, doubling the
capacity of
each link.
Switching Logic
Methods of Switching
Switches support three methods of switching.
1- Store and Forward
• In this mode Switch buffers entire frame into the
memory and run FCS (Frame Check Sequence) to
ensure that frame is valid and not corrupted.
• A frame less than 64bytes and higher than 1518bytes
is invalid.
• Only valid frames are processed and all invalid frames
are automatically dropped.
• Among these three methods of Switching, this method
has highest latency.
• Latency is the time taken by device in passing frame
from it.
Methods of Switching
2- Cut and Through
• This has lowest latency. In this method, Switch
only reads first six bytes from frame after the
preamble.
• These six bytes are the destination address of
frame. This is the fastest method of switching.
This method also process invalid frames. Only
advantage of this method is speed.
Methods of Switching
3- Fragment Free
• This is a hybrid version of Store and Forward
method and Cut and Through method.
• It takes goodies from both methods and makes a
perfect method for switching.
• It checks first 64 bytes of frame for error. It
processes only those frames that have first
64bytes valid.
• Any frame less than 64 bytes is known as invalid .
This method filters invalid while maintaining the
speed
The Modem
• In simple language modem is a device that is
used to connect with internet. Technically it is a
device which enables digital data transmission to
be transmitted over the telecommunication lines.
• A modem understands both technologies. It
converts the technology that a PC uses in the
technology which a Telco company understand.
• It enables communication between PC (Known as
DTE) and Telco company’s office (Known as DCE).
The Modem
DTE (Data Terminal Equipment) is a device (usually a router or PC)
that converts data frame into signals and reconvert received
signals in data frame. DTE device communicates with DCE device.

DCE (Data circuit terminating equipment) is a device (usually


modem, CSU/DSU or Frame Relay switch) that provides clock rate
and synchronization
The Router
• Router is a layer three device which forwards
data packet from one logical network segment to
another.
• Router forwards packets on the bases of their
destination address. For this, router keeps record
of the path that packets can use as they move
across the network.
• These records are maintained in a database table
known as routing table. Routing table can be built
statically or dynamically.
The Router
Basically routers are used :-
• To connect different network segments.
• To connect different network protocols such as IP and IPX.
• To connect several smaller networks into a large network (known
as internetwork)
• To break a large network in smaller networks (Known as subnet
usually created to improve the performance or manageability)
• To connect two different media types such as UTP and fiber optical.
• To connect two different network architectures such as token ring
and Ethernet.
The Proxy
• Proxy can be a dedicate device or it can be an
application software.
• Proxy is used to hide the internal network from
external world.
• If we use proxy then there would be no direct
communication between internal network and
external network. All communication will go
through the proxy.
• External computer will be able to access only proxy.
Thus Proxy makes tampering with an internal
system from the external network more difficult.
The Proxy
Firewall
• A firewall is a security layer which once
configured keeps internal network safe from
unauthorized external users.
There are two types of firewall:
• software firewall
• hardware firewall.
Software firewall
• Software firewall runs as application software.
• It does not need any dedicate resources.
• It can be installed in any device which is already
running other applications.
• It is less effective than hardware firewall but provides
sufficient functionality for home and small office
requirement.
• The biggest advantage of software firewall is that it is
cost effective.
• Almost all modern platforms which can connect with
Internet are equipped with basic firewall.
Software firewall
Hardware firewall
• Hardware firewall runs from a dedicate device.
• It is highly effective but costs a lot of money.
• Usually it is used in company environment
where security is the top priority.
• Besides filtering data packet, a hardware firewall
provides several other services such as spoofing,
encryption and decryption, authentication and
proxy services.
• Each additional service cost an additional
amount of money.
Hardware firewall

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy