SlideShare a Scribd company logo
LAN - WAN
ARCHITECTURE

1
NETWORK
 Set of devices connected by communication
links.
 No specific taxonomy available in which all
computer networks fit, still two are of vital
importance:
Network Technologies

Transmission Technology

Geographical Span

2
Classification on transmission
technology

Point-to-point Network

Broadcast Network
3
Network topology based on area
Bus topology:

Star topology:

Ring Topology :

Mesh topology:

4
Categories of Network
 LAN -Privately owned and links the devices in
a single office, building or campus.
 MAN -Designed to extend over an entire city
either by cable television network or connecting
many LANs into a larger network.
 WAN -Provides long-distance transmission of
data, voice, image etc. over large geographic
outline may be country or continent or the
world.
5
6
Components of LAN
 A Local Area Network, LAN is a combination of
hardware and software.
 The physical component of the network system
is hardware. The invisible part, that is programs
enabling the network to function properly is the
software.
 Ethernet is the most dominant LAN in the
market.
7
LAN Protocol
Architecture
 Lower layers of OSI model
 IEEE 802 reference model, is a standardized
protocol architecture for LANs, which describes:




Physical layer.
Logical link control (LLC) sub-layer,
Media access control (MAC) sub-layer.

Data Link Layer

8
OSI Model
• Provides for reliable transfer of

IEEE 802 Reference Model

information across the physical link
• Sends blocks (frames) with necessary
synchronization
• Error control, flow control

Application
Presentation
Session
Transport
Network
Data Link
Physical

IEEE 802 committee developed, revises, and
extends standards
Use a three-layer protocol hierarchy: physical,
medium access control (MAC), and logical link
control (LLC)

• Concerned with transmission of bit

stream
• Deal with mechanical, electrical
functionality
• Procedural characteristics to 9
access physical medium
ETHERNET
 Most widely used data communication standard
 Physical Medium – Carry signal between
computers.
 MAC rules embedded in each interface that
allow multiple computers to access shared
channel.
 Ethernet frame of standardized set of bits used
to carry data over the system.
 Uses Star topology and 1-persistent CSMA/CD
10
access method.
Logical Link Control
 Acts as interface between MAC and upper
layer.
 Accountable for flow control.
 Manages error control and error detection.
 Independent of topology and medium.
 Specifies method of addressing whether
unicast multicast or broadcast.
11
MAC Sublayer
Governs the operation of access method and
frames data from upper layer and passes them
for encoding. Access method is 1-persistent
CSMA/CD.
Frame format

12
Physical Layer
 Encoding/decoding of signals mostly using
Manchester coding.
 Bit transmission/reception
 Specification of the transmission medium.
 Preamble generation/removal
 Transmission medium and topology

13
Data Transfer through Ethernet
LAN
Twisted pair or fiber optics with RJ-45 plug or sockets.
Data rate range from 100Mbits/s to 1000Mbits/s
To network multiple devices, switch is required where
devices are connected to it using regular network
cable.
 Registers MAC address of each devices connected to
it. When switch receives data, it forwards it only to the
port that is connected to the device with appropriate
destination MAC address.




14
Token Ring Network









Originally developed by IBM in 1970’s
Still IBM’s primary LAN technology
In cases of heavy traffic, the token ring
network has higher throughput than
Ethernet due to the deterministic (nonrandom) nature of the medium access
Is used in applications in which delay
when sending data must be predictable
Is a robust network i.e. it is fault
tolerant through fault management
mechanisms
Can support data rates of around 16
Mbps
Typically uses twisted pair
15
FDDI (Fiber Distributed Data
Interface)
 FDDI is a standard developed by the
American National Standards Institute
(ANSI) for transmitting data on optical
fibers
 Supports transmission rates of up to 200
Mbps
 Uses a dual ring
 First ring used to carry data at 100
Mbps. Second ring used for primary
backup in case first ring fails
 If no backup is needed, second ring
can also carry data, increasing the data
rate up to 200 Mbps
 Supports up to 1000 nodes

16
Wide Area Network
 Contains collection of machines called hosts running
user program and the host are connected by subnet
which carries message from host to host.
 Host owned by customers and subnet by ISP.
 Subnet consists of transmission lines and switching
element.
 Switching computers are called routers

17
Wide Area Network
(Contd.)

 Packets sent from receiver to sender may be stored at
intermediate router till the required output line is busy.
 This principle is known as “Store-n-Forward” which is
implemented by almost all WAN except using Satellite.
 Sender cuts the data into packets bearing a number
and injected into network one at a time and at the
receiver they are reassembled into original message.

18
WAN TECHNOLOGY
 Devices on subscriber premises are called Customer

Premises Equipment owned by the subscriber.
 Copper or fiber cable connects CPE to Central
Office (CO) which is known as local loop.

19
20
WAN Link Options

21
Circuit Switched
 When a subscriber makes a telephone call, the dialed
number is used to set switches in the exchanges
along the route of the call so that there is a continuous
circuit from the originating caller to that of the called
party where the internal path is shared by a number of
conversations.
 Time division multiplexing (TDM) is used to give each
conversation a share of the connection in turn.

22
PACKET SWITCHING
 An alternative is to allocate the capacity to the traffic
only when it is needed. Share the available capacity
between many users
 Huge data converted into packets which passes from
exchange to exchange through network.
 Allows same data path to be shared between various
users in the network.

23
Leased Lines
 A point-to-point link provides a pre-established WAN
communications path from the customer premises
through the provider network to a remote destination.
 Point-to-point lines are usually leased from a carrier
and are called leased lines.
 Leased lines provide direct point-to-point connections
between LANs and connect individual branches to a
packet-switched network.

24
WAN Considerations
 Many WANs are connected to the Internet to provide
alternative for inter-branch connections.
 Since the Internet probably exists everywhere that the
enterprise has LANs, there are two principal ways that
this traffic can be carried.
 Each LAN can have a connection to its local ISP, or
there can be a single connection from one of the core
routers to an ISP.
 The advantage is that traffic is carried on the Internet
rather than on the enterprise network, possibly leading
to smaller WAN links.
25
Thank You!!
26

More Related Content

What's hot

Storage networks
Storage networksStorage networks
Storage networks
Ahmed Nour
 
Computer network
Computer networkComputer network
Network architecture
Network architectureNetwork architecture
Network architecture
csk selva
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
Editor IJMTER
 
DSDV VS AODV
DSDV VS AODV DSDV VS AODV
DSDV VS AODV
Senthil Kanth
 
Network design
Network designNetwork design
Network design
Amir Jafari
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
Hossam El-Deen Osama
 
Computer hardware and networking
Computer hardware and networkingComputer hardware and networking
Computer hardware and networking
devendrakhairwa
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Kiran Buriro
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
Auwal Amshi
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
WLAN
WLANWLAN
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
ZillayHuma Mehmood
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
Ravi Rajput
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
Prince JabaKumar
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networks
Noor Azura Adnan
 
Wireless network
Wireless networkWireless network
Wireless network
mattglover0
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
Sameer Sharma
 

What's hot (20)

Storage networks
Storage networksStorage networks
Storage networks
 
Computer network
Computer networkComputer network
Computer network
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
DSDV VS AODV
DSDV VS AODV DSDV VS AODV
DSDV VS AODV
 
Network design
Network designNetwork design
Network design
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Computer hardware and networking
Computer hardware and networkingComputer hardware and networking
Computer hardware and networking
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
WLAN
WLANWLAN
WLAN
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)ASYNCHRONOUS TRANSFER MODE (ATM)
ASYNCHRONOUS TRANSFER MODE (ATM)
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networks
 
Wireless network
Wireless networkWireless network
Wireless network
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 

Viewers also liked

Cubase Presentation Cain
Cubase Presentation CainCubase Presentation Cain
Cubase Presentation CainZoe Harris
 
Сүлжээ1
Сүлжээ1Сүлжээ1
Сүлжээ1
Lhagvaa Byamba
 
Advanced multihoming
Advanced multihomingAdvanced multihoming
Advanced multihoming
Chinmay Biswas
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networkskavish dani
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
selvakumar_b1985
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration Devices
Rishabh Dangwal
 
Designing of media player
Designing of media playerDesigning of media player
Designing of media playerNur Islam
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
bwire sedrick
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
Ahmar Hashmi
 
Computer systems
Computer systemsComputer systems
Computer systems
bwire sedrick
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchi
Leandro Uglar
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
bwire sedrick
 
Nms chapter 01
Nms chapter 01Nms chapter 01
Nms chapter 01
Hock Leng PUAH
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & controlbwire sedrick
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
Satish Reddy
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
Varinder Singh Walia
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
Rahul P
 

Viewers also liked (20)

Cubase Presentation Cain
Cubase Presentation CainCubase Presentation Cain
Cubase Presentation Cain
 
Wrou01
Wrou01Wrou01
Wrou01
 
Сүлжээ1
Сүлжээ1Сүлжээ1
Сүлжээ1
 
Advanced multihoming
Advanced multihomingAdvanced multihoming
Advanced multihoming
 
3d connecting networks
3d connecting networks3d connecting networks
3d connecting networks
 
Chapter3
Chapter3Chapter3
Chapter3
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
Introduction to Wan Acceleration Devices
Introduction to Wan Acceleration DevicesIntroduction to Wan Acceleration Devices
Introduction to Wan Acceleration Devices
 
Designing of media player
Designing of media playerDesigning of media player
Designing of media player
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchi
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
Nms chapter 01
Nms chapter 01Nms chapter 01
Nms chapter 01
 
12 strategey evaluation & control
12 strategey evaluation & control12 strategey evaluation & control
12 strategey evaluation & control
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 

Similar to Lan wan

IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
DebaComedyClub
 
Networks classification
Networks classificationNetworks classification
Networks classification
Mukesh Chinta
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
ChinmayWaingankar3
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
Sri Latha
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.ppt
unnipb1
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
khan679040
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
HimanshiMorwal1
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
SelfUse
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
rcbcrtm
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).ppt
gauravgoswami78
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
rakesh132809
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
EliasPetros
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
jaba kumar
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
nilesh405711
 
Network protocol
Network protocolNetwork protocol
Network protocol
QadarAhmed1
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
ssuser2276e6
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
MDAminulIslam712665
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
Arumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
Saagar Shetage
 

Similar to Lan wan (20)

IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.ppt
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).ppt
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 

More from Nur Islam

Overview of iso 9001
Overview of iso 9001Overview of iso 9001
Overview of iso 9001Nur Islam
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & qualityNur Islam
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimationNur Islam
 
Organization and team structures
Organization and team structuresOrganization and team structures
Organization and team structures
Nur Islam
 
Halsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical techniqueHalsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical techniqueNur Islam
 
Cellular automata
Cellular automataCellular automata
Cellular automataNur Islam
 

More from Nur Islam (7)

Gsm
GsmGsm
Gsm
 
Overview of iso 9001
Overview of iso 9001Overview of iso 9001
Overview of iso 9001
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimation
 
Organization and team structures
Organization and team structuresOrganization and team structures
Organization and team structures
 
Halsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical techniqueHalsted’s Software Science-An analytical technique
Halsted’s Software Science-An analytical technique
 
Cellular automata
Cellular automataCellular automata
Cellular automata
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 

Lan wan

  • 2. NETWORK  Set of devices connected by communication links.  No specific taxonomy available in which all computer networks fit, still two are of vital importance: Network Technologies Transmission Technology Geographical Span 2
  • 4. Network topology based on area Bus topology: Star topology: Ring Topology : Mesh topology: 4
  • 5. Categories of Network  LAN -Privately owned and links the devices in a single office, building or campus.  MAN -Designed to extend over an entire city either by cable television network or connecting many LANs into a larger network.  WAN -Provides long-distance transmission of data, voice, image etc. over large geographic outline may be country or continent or the world. 5
  • 6. 6
  • 7. Components of LAN  A Local Area Network, LAN is a combination of hardware and software.  The physical component of the network system is hardware. The invisible part, that is programs enabling the network to function properly is the software.  Ethernet is the most dominant LAN in the market. 7
  • 8. LAN Protocol Architecture  Lower layers of OSI model  IEEE 802 reference model, is a standardized protocol architecture for LANs, which describes:    Physical layer. Logical link control (LLC) sub-layer, Media access control (MAC) sub-layer. Data Link Layer 8
  • 9. OSI Model • Provides for reliable transfer of IEEE 802 Reference Model information across the physical link • Sends blocks (frames) with necessary synchronization • Error control, flow control Application Presentation Session Transport Network Data Link Physical IEEE 802 committee developed, revises, and extends standards Use a three-layer protocol hierarchy: physical, medium access control (MAC), and logical link control (LLC) • Concerned with transmission of bit stream • Deal with mechanical, electrical functionality • Procedural characteristics to 9 access physical medium
  • 10. ETHERNET  Most widely used data communication standard  Physical Medium – Carry signal between computers.  MAC rules embedded in each interface that allow multiple computers to access shared channel.  Ethernet frame of standardized set of bits used to carry data over the system.  Uses Star topology and 1-persistent CSMA/CD 10 access method.
  • 11. Logical Link Control  Acts as interface between MAC and upper layer.  Accountable for flow control.  Manages error control and error detection.  Independent of topology and medium.  Specifies method of addressing whether unicast multicast or broadcast. 11
  • 12. MAC Sublayer Governs the operation of access method and frames data from upper layer and passes them for encoding. Access method is 1-persistent CSMA/CD. Frame format 12
  • 13. Physical Layer  Encoding/decoding of signals mostly using Manchester coding.  Bit transmission/reception  Specification of the transmission medium.  Preamble generation/removal  Transmission medium and topology 13
  • 14. Data Transfer through Ethernet LAN Twisted pair or fiber optics with RJ-45 plug or sockets. Data rate range from 100Mbits/s to 1000Mbits/s To network multiple devices, switch is required where devices are connected to it using regular network cable.  Registers MAC address of each devices connected to it. When switch receives data, it forwards it only to the port that is connected to the device with appropriate destination MAC address.    14
  • 15. Token Ring Network        Originally developed by IBM in 1970’s Still IBM’s primary LAN technology In cases of heavy traffic, the token ring network has higher throughput than Ethernet due to the deterministic (nonrandom) nature of the medium access Is used in applications in which delay when sending data must be predictable Is a robust network i.e. it is fault tolerant through fault management mechanisms Can support data rates of around 16 Mbps Typically uses twisted pair 15
  • 16. FDDI (Fiber Distributed Data Interface)  FDDI is a standard developed by the American National Standards Institute (ANSI) for transmitting data on optical fibers  Supports transmission rates of up to 200 Mbps  Uses a dual ring  First ring used to carry data at 100 Mbps. Second ring used for primary backup in case first ring fails  If no backup is needed, second ring can also carry data, increasing the data rate up to 200 Mbps  Supports up to 1000 nodes 16
  • 17. Wide Area Network  Contains collection of machines called hosts running user program and the host are connected by subnet which carries message from host to host.  Host owned by customers and subnet by ISP.  Subnet consists of transmission lines and switching element.  Switching computers are called routers 17
  • 18. Wide Area Network (Contd.)  Packets sent from receiver to sender may be stored at intermediate router till the required output line is busy.  This principle is known as “Store-n-Forward” which is implemented by almost all WAN except using Satellite.  Sender cuts the data into packets bearing a number and injected into network one at a time and at the receiver they are reassembled into original message. 18
  • 19. WAN TECHNOLOGY  Devices on subscriber premises are called Customer Premises Equipment owned by the subscriber.  Copper or fiber cable connects CPE to Central Office (CO) which is known as local loop. 19
  • 20. 20
  • 22. Circuit Switched  When a subscriber makes a telephone call, the dialed number is used to set switches in the exchanges along the route of the call so that there is a continuous circuit from the originating caller to that of the called party where the internal path is shared by a number of conversations.  Time division multiplexing (TDM) is used to give each conversation a share of the connection in turn. 22
  • 23. PACKET SWITCHING  An alternative is to allocate the capacity to the traffic only when it is needed. Share the available capacity between many users  Huge data converted into packets which passes from exchange to exchange through network.  Allows same data path to be shared between various users in the network. 23
  • 24. Leased Lines  A point-to-point link provides a pre-established WAN communications path from the customer premises through the provider network to a remote destination.  Point-to-point lines are usually leased from a carrier and are called leased lines.  Leased lines provide direct point-to-point connections between LANs and connect individual branches to a packet-switched network. 24
  • 25. WAN Considerations  Many WANs are connected to the Internet to provide alternative for inter-branch connections.  Since the Internet probably exists everywhere that the enterprise has LANs, there are two principal ways that this traffic can be carried.  Each LAN can have a connection to its local ISP, or there can be a single connection from one of the core routers to an ISP.  The advantage is that traffic is carried on the Internet rather than on the enterprise network, possibly leading to smaller WAN links. 25