A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Similar documents
10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless

Introduction to LAN Protocols

Introduction to LAN Protocols

10- and 100-Mbps Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Chapter 4: Network Access

M242 COMPUTER NETWORS AND SECURITY

Chapter 10: Local Area Networks

Raj Jain. The Ohio State University Columbus, OH

IEEE 802 LANs SECTION C

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I

Lecture (04 & 05) Data link layer fundamental

Local Area Network Overview

Chapter 15 Local Area Network Overview

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

This PDF document is a sample chapter from the book...

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

ET4254 Communications and Networking 1

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Contents. Introduction to Networking. Preface...i. Introduction... xix

ก ก Information Technology II

Lesson 1: Network Communications

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

More on LANS. LAN Wiring, Interface

Lecture 8: Switched Ethernet and Collision Domains

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Data and Computer Communications

Lecture 05 Chapter 16 High Speed LANs

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Data Link Layer, Part 3 Medium Access Control. Preface

Dr./ Ahmed Mohamed Rabie Sayed

Zarządzanie sieciami telekomunikacyjnymi

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Computer Networks and Internet

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

The following pages contain a guide for the installation

Tutorial 3 (Ethernet)

Data Link Layer, Part 5. Medium Access Control

Chapter 4 NETWORK HARDWARE

Other Protocols. Arash Habibi Lashkari

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Chapter 9 & 12: Wired LAN

Internet Architecture and Protocol

Data Link Protocols. TCP/IP Suite and OSI Reference Model

2. LAN Topologies Gilbert Ndjatou Page 1

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Lecture (04) Data link layer

Introduction to Networking

34384_CPEG_01 2/3/ :41:8 Page 1. Network+ CoursePrep ExamGuide

Part3. Local Area Networks (LAN)

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

(Network Programming) Basic Networking Hardware

Campus Network Design

Ethernet. Computer Networks. Lecture 4.

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

What is a Network? A connection of two or more computers so that they can share resources.

The NIC is the main interface between the computer and the network cable.

Different network topologies

Bridging and Switching Basics

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

The data transmission mode describes the direction of data flow. It is either simplex, half duplex or full duplex.

Integrating Information Systems: Technology, Strategy, and Organizational Factors

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

NETWORK SECURITY ITEC 435

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

CH : 15 LOCAL AREA NETWORK OVERVIEW

Modern Ethernet. Chapter 6

Local Area Network(LAN)

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Chapter 9. Ethernet. Part II

Unit 09 Computer Networks

Networks. Computer Technology

Lecture (04) Network Layer (Physical/Data link) 2

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

LAN Systems. Bus topology LANs

The Medium Access Sublayer

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Performance Evaluation of Duplex Mode Parameter in A Wired Local Area Network

Discovering Computers Chapter 9 Communications and Networks

Chapter 9 Ethernet Part 1

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Transcription:

CBCN4103

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it is also able to access data and devices anywhere on the LAN.

Topology: The geometric arrangement of devices on the network. For example, devices can be arranged in a ring or in a straight line. Protocols: The rules and encoding specifications for sending data. The protocols also determine whether the network uses a peer-to-peer or client/server architecture. Media: Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables. Some networks do without connecting media altogether, communicating instead via radio waves.

Ethernet is the most popular and dominant LAN technology in use today. Other LAN technology types include Token Ring, Fast Ethernet, Gigabit Ethernet, Fiber Distributed Data Interface (FDDI), Asynchronous Transfer Mode (ATM) and AppleTalk. Ethernet is popular because it strikes a good balance between speed, cost and ease of installation.

Ethernet uses a bus or star topology and supports data transfer rates of 10 Mbps. Ethernet is standardized as IEEE 802.3. For more details on Ethernet family standards refer to Table 2.1 (page 25) Ethernet uses the Carrier Sense Multiple Access/Collision Detection (CSMA/CD) access method to handle simultaneous demands.

A protocol or communications protocol is a formal description of message formats and the rules for exchanging those messages. A protocol defines how computers identify one another on a network, the form that the data should take in transit, and how this information is processed once it reaches its final destination. Protocols also define procedures for handling lost or damaged transmissions or "packets."

The main network protocols in use today are as follows: TCP/IP (for UNIX, Windows 7, Windows 95 and other platforms) IPX (for Novell NetWare) DECnet (for networking Digital Equipment Corp. computers) AppleTalk (for Macintosh computers), and NetBIOS/NetBEUI (for LAN Manager and Windows NT networks)

There are four major types of media in use today: Thick wire for 10BASE5 networks, Thin coax for 10BASE2 networks, Unshielded twisted pair (UTP) for 10BASE-T networks, and Fiber optic for 10BASE-FL or Fiber-Optic Inter-Repeater Link (FOIRL) networks. The most popular wiring schemes are 10BASE-T and 100BASE-TX, which use unshielded twisted pair (UTP) cable. This is similar to telephone cable and comes in a This is similar to telephone cable and comes in a variety of grades, with each higher grade offering better performance.

Category 6 cable (CAT-6) is a cable standard for Gigabit Ethernet and supports up to 10 Gbps speeds Level 5 cable (CAT 5/5e) offering support for transmission rates of up to 100Mbps. Level 4 (CAT 4) and level 3 (CAT 3) cable are less expensive, but cannot support the same data throughput speeds; level 4 cable can support speeds of up to 20 Mbps; level 3 up to 16 Mbps.

The 100BASE-T4 standard allows for support of 100 Mbps Ethernet t over level l 3 cables, but at the expense of adding another pair of wires (4 pair instead of the 2 pair used for 10BASE-T) For specialised applications, fiber-optic, or 10BASE-FL, Ethernet segments are popular. Fiber-optic cable is more expensive, but it is invaluable for situations where electronic emissions and environmental hazards are a concern.

LAN topologies define the manner in which network devices are organized.

The topology of a network is the arrangement or relationship of the network devices and the interconnections between them. Network topologies can be viewed at the physical level and the logical level. The physical topology is an arrangement of the nodes and the physical connections between them. (bus, star, extended star, token bus and token ring) A logical topology is the way a network transfers frames from one node to the next. (token passing or broadcast)

In broadcast topology all devices listen to signal or message transmitted by one of the device in the LAN. Only the intended destination node or host will copy and respond to the message. On the other hand in token passing, device takes turn to react. Device that holds the token shall perform the task.

Fiber Distributed Data Interface (FDDI) is an example of physical token ring and logical token passing topologies. Token ring has one point of failure, the ring itself. In which case, FDDI has dual ring for redundancy

A physical bus topology consists of nodes linked together in a series with each node connected to a long cable or bus. Many nodes can tap into the bus and begin communication with all other nodes on that cable segment. A break anywhere in the cable will usually cause the entire segment to be inoperable until the break is repaired.

10BASE-T Ethernet and Fast Ethernet use a star topology, in which access is controlled by a central computer. Generally a computer is located at one end of the segment, and the other end is terminated in central location with a hub. Main advantage of star topology is reliability.

Ethernet is a shared media, so there are rules for sending gpackets of data to avoid conflicts and protect data integrity. Nodes determine when the network is available for sending packets. It is possible that two nodes at different locations attempt to send data at the same time. When both PCs are transferring a packet to the network at the same time, a collision i will happen. Segmenting the network, where a network is divided into different pieces joined together logically with a bridge or switch, is one way of reducing an overcrowded network.

Transceivers: Transceivers are used to connect nodes to the various Ethernet media. Most computers and network interface cards contain a built-in 10BASE-T or 10BASE2 transceiver, allowing them to be connected directly to Ethernet without requiring an external transceiver.

Network Interface Cards: Network interface cards, commonly referred to as NICs, are used to connect a PC to a network. The NIC provides a physical connection between the networking cable and the computer's internal bus.

Hubs/Repeaters: Hubs/repeaters are used to connect together two or more Ethernet segments of any media type. In larger designs, signal quality begins to deteriorate as segments exceed their maximum length. Hubs provide the signal amplification required to allow a segment to be extended d a greater distance. A hub takes any incoming signal and repeats it out all ports. A very important t fact to note about hubs is that t they only allow users to share Ethernet. A network of hubs/repeaters is termed a "shared Ethernet, meaning that all members of the network are contending for transmission of data onto a single network or collision domain.

For Ethernet networks that need higher transmission i speeds, the Fast Ethernet standard d (IEEE 802.3u) has been established. This standard raises the Ethernet speed limit from 10 Megabits per second (Mbps) to 100 Mbps with only minimal changes to the existing cable structure. There are three types of Fast Ethernet: 100BASE- TX for use with level 5 UTP cable, 100BASE-FX for use with fiber-optic cable, and 100BASE-T4 which utilises an extra two wires for use with level 3 UTP cable.

Token ring is another form of network configuration which differs from Ethernet in that all messages are transferred in a unidirectional manner along the ring at all times. Data is transmitted in tokens, which are passed along the ring and viewed by each device. When a device sees a message addressed to it, that device copies the message and then marks that message as being read. As the message makes its way along the ring, it eventually gets back to the sender who now notes that the message was received by the intended device. The sender can then remove the message and free that token for use by others.

Asynchronous Transfer Mode is a cell-based switching technique that t uses asynchronous time division multiplexing. ATM is an ITU-TT standard for cell relay wherein information for multiple service types, such as voice, video, or data, is conveyed in small, fixed-size cells. Data and information can be prioritized on the basis of time-sensitivity as ATM can accommodate a variety of information formats.

The IEEE defines most of the standards for Ethernet and Token Ring; with ANSI defining standards for FDDI. These specifications match OSI Layer 2 and typically are divided into two parts: the Media Access Control (MAC) and Logical Link Control (LLC) sublayers.

What is a LAN? What is a segment? What is the difference between a Switch and a Hub? What is a bridge and how does it work? What is the difference between Half duplex and Full duplex?