SlideShare a Scribd company logo
1 of 16
SWITCHED LAN, FAST ETHERNET,
FAST ETHERNET AND LAYER
MODEL
PRESENTER
HAMNA SHAHZAD
LAN SWITCHING
 LAN switching is a form of packet switching used in LAN.
 Switching Tech. is crucial in network design.
 Switching included on layer 2, layer 3 and layer 4.
 Layer 2 switching include:
 Hardware based bridging.
 Wire speed/non blocking forwarding.
 Low latency rate.
 Layer 2 switching is highly efficient used for workgroup connectivity.
LAN SWITCHING ON LAYER 3
 Layer 3 switching perform following action:
 Determine path based on logical addressing
 Process and informs to any option info.
 Update SNMP.
 Provide security.
 Flow accounting/ flow control.
 Quality of service.
 Low latency.
LAN SWITCHING ON LAYER 4
 Layer 4 switching provide additional datagram inspection by reading the port numbers found in transport
layer header to make transport decision.
 The largest benefit of is that network admin. configure a layer 4 switch to priorities data traffic by
applications which means Quality of Service can be defined for each user.
FAST ETHERNET
 Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of 100 megabits
per second (referred to as "100BASE-T").
 Fast Ethernet cards connect to networks at a rate of 100 Mbps. Mbps while Gigabit network cards can
connect at speeds up to 1000mb/s.
 The main difference between the two is speed.
 A fast Ethernet card can run on bandwidths at 100mb/s while a gigabit Ethernet can run at ten times that
speed.
 Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a link layer protocol in
the TCP/IP stack, describing how networked devices can format data for transmission to other network
devices on the same network segment, and how to put that data out on the network connection
What is the best Ethernet cable?
 If you have a modern router and modern Ethernet-enabled devices, you can get faster speeds — up to 10
Gb/s from 1 Gb/s — by using Cat-6 or Cat-6a cables instead of Cat-5 or Cat-5e cables. The rest of your
hardware has to support it, but you won't get those above 1 Gb/s speeds unless you have good enough
cables.
 It may be full duplex or half duplex depend upon type of network design.
100 BASE T
 100 BASE T networks star topology used and UTP cable are also used.
 10BASE-T used Cat3 cabling. However, Cat5 or later cabling is typically used today.
 10 Mbps Ethernet is considered to be classic Ethernet
 Have two parts one for transmission one for receiving.
 It may be half duplex.
100 BASE FX
 Also used star topology.
 Use fiber optic cable.
 Although the encoding, decoding, and clock
recovery procedures are the same for both
media, the signal transmission is different -
electrical pulses (100BASE TX) in copper and
light pulses(100BASE FX) in optical fiber.
 Have two parts one for transmission one for
receiving.
 It may be full duplex.
 Segment length 200m.
100 BASE TX
 Also used star topology.
 UTP copper cable category 5.
 The 4B/5B encoding is used for 100BASE-TX
Ethernet.
 Category 5 convert data into signals.
 However, unlike 10BASE-T, 100BASE-TX networks
typically use a switch at the center of the star
instead of a hub.
 Have two parts one for transmission one for
receiving.
 Segment length 100m.
FAST ETHERNET AND
LAYER MODEL
 Ethernet operates in the lower two layers of
the OSI model:
 The Data Link layer and the Physical layer.
FAST Ethernet - Layer 1 and Layer 2
 All Fast Ethernet variants use a star topology.
 Fast Ethernet at Layer 1 involves signals, bit streams that travel on the media, physical components
that put signals on media, and various topologies.
 Fast Ethernet Layer 1 performs a key role in the communication that takes place between devices, but
each of its functions has limitations.
 Ethernet separates the functions of the Data Link layer into two distinct sublayers: the Logical Link
Control (LLC) sublayer and the Media Access Control (MAC) sublayer
 Fast Ethernet at Layer 2 addresses these limitations.
CONT….
 The Data Link sublayers contribute
significantly to technological compatibility
and computer communications.
 The MAC sublayer is concerned with the
physical components that will be used to
communicate the information and prepares
the data for transmission over the media.
 The Logical Link Control (LLC) sublayer
remains relatively independent of the
physical equipment that will be used for the
communication process.
Logical Link Control - Connecting to the Upper
Layers
 For Ethernet, the IEEE 802.2 standard describes the LLC sublayer functions, and the 802.3 standard
describes the MAC sublayer and the Physical layer functions.
 Logical Link Control handles the communication between the upper layers and the networking software,
and the lower layers, typically the hardware.
 The LLC sublayer takes the network protocol data, which is typically an IPv4 packet, and adds control
information to help deliver the packet to the destination node.
 Layer 2 communicates with the upper layers through LLC. LLC is implemented in software, and its
implementation is independent of the physical equipment.
 In a computer, the LLC can be considered the driver software for the Network Interface Card (NIC).
MAC - Getting Data to the Media
 Media Access Control (MAC) is the lower Ethernet sublayer of the Data Link
layer. Media Access Control is implemented by hardware, typically in the
computer Network Interface Card (NIC).
 The Ethernet MAC sublayer has two primary responsibilities:
 Data Encapsulation
 Media Access Control
ETHERNET ON PHYSICAL
LAYER
 As a technology associated with the Physical layer,
Ethernet specifies and implements encoding and
decoding schemes that enable frame bits to be carried
as signals across the media.
 Ethernet devices make use of a broad range of cable
and connector specifications.
 Ethernet uses UTP copper cables and optical fiber to
interconnect network devices via intermediary devices
such as hubs and switches.
Thank You!

More Related Content

What's hot

Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer modeaniston0108
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesMukesh Chinta
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)rahuldaredia21
 
OptiX_RTN_950A_Radio_Transmission_System.pdf
OptiX_RTN_950A_Radio_Transmission_System.pdfOptiX_RTN_950A_Radio_Transmission_System.pdf
OptiX_RTN_950A_Radio_Transmission_System.pdfHabtamuAdera3
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ZillayHuma Mehmood
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentationViet Nguyen
 
Handover &mobility in 4g5g
Handover &mobility in 4g5gHandover &mobility in 4g5g
Handover &mobility in 4g5gabolfazlzakeri
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
What is Ethernet
What is EthernetWhat is Ethernet
What is EthernetSimplilearn
 
HART protocol for network data communication
HART protocol for network data communicationHART protocol for network data communication
HART protocol for network data communicationAmol Dudhate
 
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkARVIND SARDAR
 
Bsc6910 spare parts catalog(v100 r016c00 01)(pdf)-en
Bsc6910 spare parts catalog(v100 r016c00 01)(pdf)-enBsc6910 spare parts catalog(v100 r016c00 01)(pdf)-en
Bsc6910 spare parts catalog(v100 r016c00 01)(pdf)-enMohammed Jaber
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP ModelAbir Junayed
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 

What's hot (20)

Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
Ethernet
EthernetEthernet
Ethernet
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)
 
OptiX_RTN_950A_Radio_Transmission_System.pdf
OptiX_RTN_950A_Radio_Transmission_System.pdfOptiX_RTN_950A_Radio_Transmission_System.pdf
OptiX_RTN_950A_Radio_Transmission_System.pdf
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Handover &mobility in 4g5g
Handover &mobility in 4g5gHandover &mobility in 4g5g
Handover &mobility in 4g5g
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
 
HART protocol for network data communication
HART protocol for network data communicationHART protocol for network data communication
HART protocol for network data communication
 
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
 
Bsc6910 spare parts catalog(v100 r016c00 01)(pdf)-en
Bsc6910 spare parts catalog(v100 r016c00 01)(pdf)-enBsc6910 spare parts catalog(v100 r016c00 01)(pdf)-en
Bsc6910 spare parts catalog(v100 r016c00 01)(pdf)-en
 
5G network architecture progress
5G network architecture progress5G network architecture progress
5G network architecture progress
 
Presentation on TCP/IP Model
Presentation on TCP/IP ModelPresentation on TCP/IP Model
Presentation on TCP/IP Model
 
Ethernet
EthernetEthernet
Ethernet
 
Ethernet
EthernetEthernet
Ethernet
 
Protocols
ProtocolsProtocols
Protocols
 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 

Similar to SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL

Similar to SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL (20)

Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Technical Ethernet
Technical EthernetTechnical Ethernet
Technical Ethernet
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
The IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfThe IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdf
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
A Boost for Ethernet to the Home
A Boost for Ethernet to the HomeA Boost for Ethernet to the Home
A Boost for Ethernet to the Home
 
Sem 1 Ch 7
Sem 1 Ch 7Sem 1 Ch 7
Sem 1 Ch 7
 
5 Lan
5 Lan5 Lan
5 Lan
 
Ethernet_Networks
Ethernet_NetworksEthernet_Networks
Ethernet_Networks
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Sessions 6,7 Ethernet
Sessions 6,7 EthernetSessions 6,7 Ethernet
Sessions 6,7 Ethernet
 

Recently uploaded

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL

  • 1. SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL
  • 3. LAN SWITCHING  LAN switching is a form of packet switching used in LAN.  Switching Tech. is crucial in network design.  Switching included on layer 2, layer 3 and layer 4.  Layer 2 switching include:  Hardware based bridging.  Wire speed/non blocking forwarding.  Low latency rate.  Layer 2 switching is highly efficient used for workgroup connectivity.
  • 4. LAN SWITCHING ON LAYER 3  Layer 3 switching perform following action:  Determine path based on logical addressing  Process and informs to any option info.  Update SNMP.  Provide security.  Flow accounting/ flow control.  Quality of service.  Low latency.
  • 5. LAN SWITCHING ON LAYER 4  Layer 4 switching provide additional datagram inspection by reading the port numbers found in transport layer header to make transport decision.  The largest benefit of is that network admin. configure a layer 4 switch to priorities data traffic by applications which means Quality of Service can be defined for each user.
  • 6. FAST ETHERNET  Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of 100 megabits per second (referred to as "100BASE-T").  Fast Ethernet cards connect to networks at a rate of 100 Mbps. Mbps while Gigabit network cards can connect at speeds up to 1000mb/s.  The main difference between the two is speed.  A fast Ethernet card can run on bandwidths at 100mb/s while a gigabit Ethernet can run at ten times that speed.  Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a link layer protocol in the TCP/IP stack, describing how networked devices can format data for transmission to other network devices on the same network segment, and how to put that data out on the network connection
  • 7. What is the best Ethernet cable?  If you have a modern router and modern Ethernet-enabled devices, you can get faster speeds — up to 10 Gb/s from 1 Gb/s — by using Cat-6 or Cat-6a cables instead of Cat-5 or Cat-5e cables. The rest of your hardware has to support it, but you won't get those above 1 Gb/s speeds unless you have good enough cables.  It may be full duplex or half duplex depend upon type of network design.
  • 8. 100 BASE T  100 BASE T networks star topology used and UTP cable are also used.  10BASE-T used Cat3 cabling. However, Cat5 or later cabling is typically used today.  10 Mbps Ethernet is considered to be classic Ethernet  Have two parts one for transmission one for receiving.  It may be half duplex.
  • 9. 100 BASE FX  Also used star topology.  Use fiber optic cable.  Although the encoding, decoding, and clock recovery procedures are the same for both media, the signal transmission is different - electrical pulses (100BASE TX) in copper and light pulses(100BASE FX) in optical fiber.  Have two parts one for transmission one for receiving.  It may be full duplex.  Segment length 200m. 100 BASE TX  Also used star topology.  UTP copper cable category 5.  The 4B/5B encoding is used for 100BASE-TX Ethernet.  Category 5 convert data into signals.  However, unlike 10BASE-T, 100BASE-TX networks typically use a switch at the center of the star instead of a hub.  Have two parts one for transmission one for receiving.  Segment length 100m.
  • 10. FAST ETHERNET AND LAYER MODEL  Ethernet operates in the lower two layers of the OSI model:  The Data Link layer and the Physical layer.
  • 11. FAST Ethernet - Layer 1 and Layer 2  All Fast Ethernet variants use a star topology.  Fast Ethernet at Layer 1 involves signals, bit streams that travel on the media, physical components that put signals on media, and various topologies.  Fast Ethernet Layer 1 performs a key role in the communication that takes place between devices, but each of its functions has limitations.  Ethernet separates the functions of the Data Link layer into two distinct sublayers: the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer  Fast Ethernet at Layer 2 addresses these limitations.
  • 12. CONT….  The Data Link sublayers contribute significantly to technological compatibility and computer communications.  The MAC sublayer is concerned with the physical components that will be used to communicate the information and prepares the data for transmission over the media.  The Logical Link Control (LLC) sublayer remains relatively independent of the physical equipment that will be used for the communication process.
  • 13. Logical Link Control - Connecting to the Upper Layers  For Ethernet, the IEEE 802.2 standard describes the LLC sublayer functions, and the 802.3 standard describes the MAC sublayer and the Physical layer functions.  Logical Link Control handles the communication between the upper layers and the networking software, and the lower layers, typically the hardware.  The LLC sublayer takes the network protocol data, which is typically an IPv4 packet, and adds control information to help deliver the packet to the destination node.  Layer 2 communicates with the upper layers through LLC. LLC is implemented in software, and its implementation is independent of the physical equipment.  In a computer, the LLC can be considered the driver software for the Network Interface Card (NIC).
  • 14. MAC - Getting Data to the Media  Media Access Control (MAC) is the lower Ethernet sublayer of the Data Link layer. Media Access Control is implemented by hardware, typically in the computer Network Interface Card (NIC).  The Ethernet MAC sublayer has two primary responsibilities:  Data Encapsulation  Media Access Control
  • 15. ETHERNET ON PHYSICAL LAYER  As a technology associated with the Physical layer, Ethernet specifies and implements encoding and decoding schemes that enable frame bits to be carried as signals across the media.  Ethernet devices make use of a broad range of cable and connector specifications.  Ethernet uses UTP copper cables and optical fiber to interconnect network devices via intermediary devices such as hubs and switches.