SlideShare a Scribd company logo
1 of 47
Computer Networks
Hamayun Khan
Lecturer CS & IT
Superior University, Lahore
Objectives
Types of Networks
3-Layers Network Design Model
Collision Domain vs Broadcast Domain
Carrier Sense Multiple Access with Collision
Detection (CSMA/CD)
The Layered Approach
Types of Networks
• Networking Components
• Categories of Networks
Network
When we connect two or more devices in order to access their shared resources.
Networking Components
Classification of Computer Networks
Computer networks are classified based on
various factors. They includes:
Geographical span
Inter-connectivity
Administration
Architecture
Network Types
Personal Area Network
Local Area Network
Metropolitan Area Network
Wide Area Network
Personal Area Network
 personal to a user
 connectivity range up to 10 meters
 E.g. wireless computer keyboard
and mouse, Bluetooth enabled
headphones, wireless printers and
TV remotes
Local Area Network
 spanned inside a building
 an organization’ offices, schools,
colleges or universities
 mostly operates on private IP
addresses
 Ethernet is most widely employed
LAN technology and uses Star
topology
Local Area
Network
When we communicate by using
our owned resources, that
communication is called LAN.
Metropolitan Area Network
generally expands throughout
a city
works in between Local Area
Network and Wide Area
Network
Metropolitan
Area Network
A Network Located within the
boundary of a metropolitan city is
called MAN usually connected
through MAN service provider.
Wide Area Network
Covers a wide area which may
span across provinces and
even a whole country
connectivity to MANs and
LANs
Wide Area
Network
When we communicate by using
the services offered by some
service provider, that
communication is called WAN.
Comparison
LAN
 Confined to small areas i.e., it
connects several devices over a
distance of 5 to 10 km.
 High speed.
 Most inexpensive equipment.
 Low error rates.
 Data and hardware sharing
between users owned by the user.
 Operates at speeds ranging from
10Mbps to 100Mbps. Now days
1000 Mbps are available.
MAN
 Confined to a larger area than
a LAN and can range from
10km to a few 100km in
length.
 Slower than a LAN but faster
than a WAN.
 Operates at a speed of 1.5 to
150 Mbps.
 Expensive equipment.
 Moderate error rates.
WAN
 A WAN can range from 100km to
1000km and the speed between
cities can vary form1.5 Mbps to 2.4
Gbps.
 WAN supports large number of
computers and multiple host
machines.
 Various segments of network are
interconnected using sophisticated
support devices like routers and
gateways.
 Usually the speed is much slower
than LAN speed.
 Highest possible error rate
compared to LAN & MAN.
3-Layers Network Design
Model
• Concept of hierarchy
• The Core Layer
• The Distribution Layer
• The Access Layer
Concept of hierarchy
3 Layers Network Design Model
The Core Layer
 The core layer is responsible for transporting large amounts of traffic both reliably and
quickly.
 The only purpose of the network’s core layer is to switch traffic as fast as possible.
 Things we don’t want to do:
 Never do anything to slow down traffic
 Don’t support workgroup access here
 Avoid expanding the core
 Things that we want to achieve:
 Design the core for high reliability
 Design with speed in mind
 Select routing protocols with lower convergence times
The Distribution Layer
 The distribution layer is sometimes referred to as the workgroup layer and is
the communication point between the access layer and the core.
 Functions of the distribution layer are:
 Routing
 Implementing tools (such as access lists), packet filtering, and queuing
 Implementing security and network policies, including address translation and
firewalls
 Redistributing between routing protocols, including static routing
 Routing between VLANs and other workgroup support functions
 Defining broadcast and multicast domains
The Access Layer
 The access layer controls user and workgroup access to internetwork resources.
 The access layer is sometimes referred to as the desktop layer.
 The following are some of the functions to be included at the access layer:
 Continued (from distribution layer) use of access control and policies
 Creation of separate collision domains (micro segmentation/switches)
 Workgroup connectivity into the distribution layer
 Device connectivity
 Resiliency and security services
 Advanced technology capabilities (voice/video, etc.)
Collision Domain vs
Broadcast Domain
Ethernet Networks
 Ethernet is a contention-based media access method that allows all hosts
on a network to share the same link’s bandwidth.
 Ethernet is a family of technologies that provides data-link and physical
specifications for controlling access to a shared network medium.
 Ethernet has several benefits:
 Simple to install and manage
 Inexpensive
 Flexible and scalable
 Easy to interoperate between vendors
Ethernet Cabling Types
Ethernet can be deployed over
three types of cabling:
Coaxial cabling
Twisted-pair cabling
Fiber optic cabling
Ethernet Cabling Types: Co-axial
1. Thinnet
2. Thicknet
Thicknet has a wider diameter and more shielding, which
supports greater distances. However, it is less flexible
than the smaller thinnet, and thus more difficult to work
with. A vampire tap is used to physically connect devices
to thicknet, while a BNC connector is used for thinnet.
Ethernet Cabling Types: Twisted-pair
1. UTP (unshielded)
2. STP (shielded)
There are several categories of twisted-pair cable:
 Category 3 or Cat3: three twists per inch.
 Cat5: five twists per inch.
 Cat5e: five twists per inch; pairs are also twisted around each
other.
 Cat6: six twists per inch, with improved insulation.
An RJ45 connector is used to connect a device to a twisted-pair
cable.
Figure Twisted-pair cable
Figure UTP and STP cables
Figure UTP connector
HUB
SWITCH
ROUTER
Remember That!
Routers separate broadcast and collision domains.
Switches separate collision domains.
Hubs belong to only one collision domain.
Switches and hubs both only belong to one
broadcast domain.
Carrier Sense Multiple
Access with Collision
Detection (CSMA/CD)
CSMA/CD
Ethernet networking uses a protocol called Carrier
Sense Multiple Access with Collision Detection
(CSMA/CD), which helps devices share the
bandwidth evenly while preventing two devices from
transmitting simultaneously on the same network
medium.
CSMA/CD
When a collision occurs on an Ethernet LAN, the
following happens:
A jam signal (32-bits) informs all devices that a collision
occurred.
The collision invokes a random backoff algorithm.
Each device on the Ethernet segment stops transmitting for a
short time until its backoff timer expires.
All hosts have equal priority to transmit after the timers have
expired.
The Layered Approach
Layered Tasks
An example from the everyday life
Hierarchy?
Services
Why layered communication?
To reduce complexity of communication task
by splitting it into several layered small tasks
Each layer has its own task
Each layer has its own protocol

More Related Content

Similar to Lecture W2 CN Network Types, Layered approach.pptx

Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptxRamNivas42
 
Chapter7 Computer Networks
Chapter7 Computer NetworksChapter7 Computer Networks
Chapter7 Computer NetworksMuhammad Waqas
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiSilicon Univ
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshareBSITstudents
 
computer network - Chapter 1 hardware
computer network - Chapter 1 hardwarecomputer network - Chapter 1 hardware
computer network - Chapter 1 hardwareSakthiVinoth78
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 

Similar to Lecture W2 CN Network Types, Layered approach.pptx (20)

Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Document
DocumentDocument
Document
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Networking
NetworkingNetworking
Networking
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
Chapter7 Computer Networks
Chapter7 Computer NetworksChapter7 Computer Networks
Chapter7 Computer Networks
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in Delhi
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
Internet
InternetInternet
Internet
 
computer network - Chapter 1 hardware
computer network - Chapter 1 hardwarecomputer network - Chapter 1 hardware
computer network - Chapter 1 hardware
 
Networks Basics
Networks BasicsNetworks Basics
Networks Basics
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 

More from ssuserc1e786

Bcsm-f20-405(Web-design).pptx
Bcsm-f20-405(Web-design).pptxBcsm-f20-405(Web-design).pptx
Bcsm-f20-405(Web-design).pptxssuserc1e786
 
W1_Lec01_Lec02_Layouts.pptx
W1_Lec01_Lec02_Layouts.pptxW1_Lec01_Lec02_Layouts.pptx
W1_Lec01_Lec02_Layouts.pptxssuserc1e786
 
Lecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptxLecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptxssuserc1e786
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxssuserc1e786
 
W2_Lec03_Lec_04_Activity.pptx
W2_Lec03_Lec_04_Activity.pptxW2_Lec03_Lec_04_Activity.pptx
W2_Lec03_Lec_04_Activity.pptxssuserc1e786
 
W1_Lec01_Lec02_Intro.pptx
W1_Lec01_Lec02_Intro.pptxW1_Lec01_Lec02_Intro.pptx
W1_Lec01_Lec02_Intro.pptxssuserc1e786
 

More from ssuserc1e786 (7)

LEC 1.pptx
LEC 1.pptxLEC 1.pptx
LEC 1.pptx
 
Bcsm-f20-405(Web-design).pptx
Bcsm-f20-405(Web-design).pptxBcsm-f20-405(Web-design).pptx
Bcsm-f20-405(Web-design).pptx
 
W1_Lec01_Lec02_Layouts.pptx
W1_Lec01_Lec02_Layouts.pptxW1_Lec01_Lec02_Layouts.pptx
W1_Lec01_Lec02_Layouts.pptx
 
Lecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptxLecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptx
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptx
 
W2_Lec03_Lec_04_Activity.pptx
W2_Lec03_Lec_04_Activity.pptxW2_Lec03_Lec_04_Activity.pptx
W2_Lec03_Lec_04_Activity.pptx
 
W1_Lec01_Lec02_Intro.pptx
W1_Lec01_Lec02_Intro.pptxW1_Lec01_Lec02_Intro.pptx
W1_Lec01_Lec02_Intro.pptx
 

Recently uploaded

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Lecture W2 CN Network Types, Layered approach.pptx

  • 1. Computer Networks Hamayun Khan Lecturer CS & IT Superior University, Lahore
  • 2. Objectives Types of Networks 3-Layers Network Design Model Collision Domain vs Broadcast Domain Carrier Sense Multiple Access with Collision Detection (CSMA/CD) The Layered Approach
  • 3. Types of Networks • Networking Components • Categories of Networks
  • 4. Network When we connect two or more devices in order to access their shared resources.
  • 6. Classification of Computer Networks Computer networks are classified based on various factors. They includes: Geographical span Inter-connectivity Administration Architecture
  • 7. Network Types Personal Area Network Local Area Network Metropolitan Area Network Wide Area Network
  • 8. Personal Area Network  personal to a user  connectivity range up to 10 meters  E.g. wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers and TV remotes
  • 9. Local Area Network  spanned inside a building  an organization’ offices, schools, colleges or universities  mostly operates on private IP addresses  Ethernet is most widely employed LAN technology and uses Star topology
  • 10. Local Area Network When we communicate by using our owned resources, that communication is called LAN.
  • 11. Metropolitan Area Network generally expands throughout a city works in between Local Area Network and Wide Area Network
  • 12. Metropolitan Area Network A Network Located within the boundary of a metropolitan city is called MAN usually connected through MAN service provider.
  • 13. Wide Area Network Covers a wide area which may span across provinces and even a whole country connectivity to MANs and LANs
  • 14. Wide Area Network When we communicate by using the services offered by some service provider, that communication is called WAN.
  • 15. Comparison LAN  Confined to small areas i.e., it connects several devices over a distance of 5 to 10 km.  High speed.  Most inexpensive equipment.  Low error rates.  Data and hardware sharing between users owned by the user.  Operates at speeds ranging from 10Mbps to 100Mbps. Now days 1000 Mbps are available. MAN  Confined to a larger area than a LAN and can range from 10km to a few 100km in length.  Slower than a LAN but faster than a WAN.  Operates at a speed of 1.5 to 150 Mbps.  Expensive equipment.  Moderate error rates. WAN  A WAN can range from 100km to 1000km and the speed between cities can vary form1.5 Mbps to 2.4 Gbps.  WAN supports large number of computers and multiple host machines.  Various segments of network are interconnected using sophisticated support devices like routers and gateways.  Usually the speed is much slower than LAN speed.  Highest possible error rate compared to LAN & MAN.
  • 16.
  • 17.
  • 18. 3-Layers Network Design Model • Concept of hierarchy • The Core Layer • The Distribution Layer • The Access Layer
  • 20. 3 Layers Network Design Model
  • 21. The Core Layer  The core layer is responsible for transporting large amounts of traffic both reliably and quickly.  The only purpose of the network’s core layer is to switch traffic as fast as possible.  Things we don’t want to do:  Never do anything to slow down traffic  Don’t support workgroup access here  Avoid expanding the core  Things that we want to achieve:  Design the core for high reliability  Design with speed in mind  Select routing protocols with lower convergence times
  • 22. The Distribution Layer  The distribution layer is sometimes referred to as the workgroup layer and is the communication point between the access layer and the core.  Functions of the distribution layer are:  Routing  Implementing tools (such as access lists), packet filtering, and queuing  Implementing security and network policies, including address translation and firewalls  Redistributing between routing protocols, including static routing  Routing between VLANs and other workgroup support functions  Defining broadcast and multicast domains
  • 23. The Access Layer  The access layer controls user and workgroup access to internetwork resources.  The access layer is sometimes referred to as the desktop layer.  The following are some of the functions to be included at the access layer:  Continued (from distribution layer) use of access control and policies  Creation of separate collision domains (micro segmentation/switches)  Workgroup connectivity into the distribution layer  Device connectivity  Resiliency and security services  Advanced technology capabilities (voice/video, etc.)
  • 25. Ethernet Networks  Ethernet is a contention-based media access method that allows all hosts on a network to share the same link’s bandwidth.  Ethernet is a family of technologies that provides data-link and physical specifications for controlling access to a shared network medium.  Ethernet has several benefits:  Simple to install and manage  Inexpensive  Flexible and scalable  Easy to interoperate between vendors
  • 26. Ethernet Cabling Types Ethernet can be deployed over three types of cabling: Coaxial cabling Twisted-pair cabling Fiber optic cabling
  • 27. Ethernet Cabling Types: Co-axial 1. Thinnet 2. Thicknet Thicknet has a wider diameter and more shielding, which supports greater distances. However, it is less flexible than the smaller thinnet, and thus more difficult to work with. A vampire tap is used to physically connect devices to thicknet, while a BNC connector is used for thinnet.
  • 28. Ethernet Cabling Types: Twisted-pair 1. UTP (unshielded) 2. STP (shielded) There are several categories of twisted-pair cable:  Category 3 or Cat3: three twists per inch.  Cat5: five twists per inch.  Cat5e: five twists per inch; pairs are also twisted around each other.  Cat6: six twists per inch, with improved insulation. An RJ45 connector is used to connect a device to a twisted-pair cable.
  • 30. Figure UTP and STP cables
  • 32.
  • 33.
  • 34.
  • 35. HUB
  • 38.
  • 39.
  • 40. Remember That! Routers separate broadcast and collision domains. Switches separate collision domains. Hubs belong to only one collision domain. Switches and hubs both only belong to one broadcast domain.
  • 41. Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
  • 42. CSMA/CD Ethernet networking uses a protocol called Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which helps devices share the bandwidth evenly while preventing two devices from transmitting simultaneously on the same network medium.
  • 43.
  • 44. CSMA/CD When a collision occurs on an Ethernet LAN, the following happens: A jam signal (32-bits) informs all devices that a collision occurred. The collision invokes a random backoff algorithm. Each device on the Ethernet segment stops transmitting for a short time until its backoff timer expires. All hosts have equal priority to transmit after the timers have expired.
  • 46. Layered Tasks An example from the everyday life Hierarchy? Services
  • 47. Why layered communication? To reduce complexity of communication task by splitting it into several layered small tasks Each layer has its own task Each layer has its own protocol