SlideShare a Scribd company logo
WELCOME
       TO
  PANDU GROUP
PRESENTATION

WORLD
LAN (Local Area Network)


                by: Vishwa
LAN (Local Area Networks)
 A LAN is a computer network that covers a small area (home, office,
  building, campus)
   o a few kilometers
 LANs have higher data rates (10Mbps to 10Gbps) as compared to
  WANs
 LANs (usually) do not involve leased lines; cabling and equipments belong
  to the LAN owner.
 A LAN consists of
    o Shared transmission medium
        •   now so valid today due to switched LANs
    o regulations for orderly access to the medium
    o set of hardware and software for the interfacing devices
WORKING OF LAN
 LAN usually broadcast their message to all hosts on
  that LAN.
 This hosts shares a single transmission media.
 This broadcast network can be a static or dynamic
  method.
 In this static method each host is given a fixed time
  slides to send the information. This is the most popular
  method used.
 In the dynamic method a host can send a frame any time.
 If the two hosts send a frame at the same time the two
  frames could collide with each other.
 Dynamic method can be further sub-divided in 2
  categories:
  1. Centralized
     a. Carrier Sensing
     b. Token Passing
   2. Decentralized: Protocols are used to implement media
                      access control.
LAN Protocol Architecture
 Corresponds to lower two layers of OSI model
   o But mostly LANs do not follow OSI model

 Current LANs are most likely to be based on Ethernet protocols developed
  by IEEE 802 committee

  IEEE 802 reference model
    o Logical link control (LLC)
    o Media access control (MAC)
    o Physical
LAN PROTOCOLS IN CONTEXT
LAN Interconnection
Traditional LAN interconnection devices
 Repeater – it operates at OSI layer 1 and transmits data bits over a physical
   medium.
 Bridge – it operates at OSI layer 2 and is commonly used to connect similar
   LAN segments.
 Switch – it operates at OSI layer 2 or layer 3 and is used to interconnect
   multiple similar or dissimilar LANs.
 Router – it operates at OSI layer 3. A router is used to interconnect individual
   networks whose sizes vary from very small to very large. Routers may be
   categorized into backbone router (or core router), border router and access
   router depending on their role in the network.
LAN Architecture
 TOPOLOGIES
  • Star
  • Bus
  • Ring

 Transmission medium
 Layout
 Medium access control
LAN TOPOLOGIES
Advantages
 Long Distances Possible
10 Base-5 allows distances up to 500 meters (1650 feet). This
makes it very useful as a "backbone" technology for wiring
together multiple locations within a building without the use of
repeaters
 Noise Immunity
Since 10 Base-5 uses a very heavily shielded cable, it can be used
in electrically noisy environments which can cause other network
types to fail.
 Conceptually Simple
Since all devices on a 10 Base-5 network are simply chained
together on a common coaxial cable, it is a simple matter to plan
the routing of the cable
Disadvantages

 Inflexible
10 Base-5 networks do not lend themselves well to installations
where the setup of the network will change much after the initial
installation. It can be very difficult to add or move a node once it
is connected to the coaxial cable.
 Fault Intolerant
Since 10 Base-5 uses a common physical cable to interconnect all
the nodes, the failure of any part of the coaxial cable or any node
has the ability to cause the collapse of the entire network.
Bluetooth Technology



        by: PANDU
Bluetooth Birth
                              The Name –Bluetooth?
                                  The name is
                                   attributed to
                                   Harald Bluetooth
                                   was king of
                                   Denmark around
                                   the turn of the last
                                   millennium.



Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
What Is Bluetooth?
• Designed to be used to connect both mobile devices and
  peripherals that currently require a wire.

• “USB without wires”

• Short range wireless radio
technology.


- operate range of 100
   meters.
         Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Who Started Bluetooth?

 Ericsson Mobile Communication

               • Bluetooth Special Interest Group (SIG)
                  -5 founding members
                  -Ericsson, Nokia, IBM, Intel & Toshiba

               • Promoter’s Group
                  - 3COM, Lucent, Microsoft, Motorola

               • Now over 1900 members
   Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
How Does It Work?
• Bluetooth is a standard
for tiny, radio frequency
chips that can be plugged
into your devices
• These chips were designed to
take all of the information that
your wires normally send, and
transmit it at a special
        frequency to a receiver
            Bluetooth chip.

        Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth @ Home
                                                             er

  gita
      lC ame
             ra
                       NO WIRES
                          Computer
                                                        Scann

Di




     Inkjet
     Printer
                                                          xDSL
                                                          Access Point




                                           Player
                                           MP3
 Home Audio System                         PDA                    Cordless Phone
                                           Cell Phone             Base Station


       Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth Products                                 1

• Bluetooth-enabled
  PC Card




   Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth Products                                 2

• Bluetooth-enabled
  PDA




   Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth Products                                  3
• Bluetooth-enabled
  Cell Phone




    Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Bluetooth Products                                  4

• Bluetooth-enabled
  Head Set




    Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Advantages (+)


• Wireless (No Cables)
• No Setup Needed
• Low Power Consumption (1 Milliwat)
• Industry Wide Support


Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
Disadvantages (-)

• Short range (10 meters)
• Small throughput rates
   - Data Rate 1.0 Mbps
• Mostly for personal use
  (PANs)
• Fairly Expensive
Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
WIRELESS LAN

WIRLESS LOCAL AREA
     NETWORK
Wireless LANs
WIRELESS LAN
Introduction
Wireless Technology
Wireless LAN
Configuration
Differences between wired LAN vs
wireless LAN
INTRODUCTION
Data communications system
Alternates wired LAN
Transmits and receives data over the air
 Minimize the need for wired connections
Become more popular in general-purpose
alternative of business customers.
Benefited several industries in productivity
and mobility
WHY WIRELESS?
Advantages:

 MOBILITY
 INSTALLATION
 COST
 SCALABILITY
MOBILITY
Real-time information access from
anywhere at any time
Increases productivity and flexibility
HOW IT WORKS
Use electromagnetic airwaves to
communicate information
Data imposed on radio carrier (radio wave)

RF electromagnetic wave can easily
pass through ordinary wall, it needs to
implement with heavy concrete or metal
screening.
WIRELESS TECHNOLOGY
 Satellite-Based System
 – Geosynchronous Earth Orbiting (GEO)
 – Low Earth Orbiting (LEO)
 Land-Based Network Access System
 – Wireless WAN
 – Wireless LAN
WIRELESS WAN
Provide nationwide or citywide
coverage
Example: Ricochet Micro-Cell
WIRELESS LAN
Wireless LAN Topology
– 2 main components
      Access Points
      Adapters
– Roaming
Wireless LAN Technology
–   Types
–   Standard
–   Configuration
ACCESS POINTS
Connects to the wired network
single access point can support a small
group of users within a range of several
hundred feet

       Wireless Clients Connected to LAN
          via Access Point
WIRELESS LAN
    TECHNOLOGY
Narrowband Technology
Spread Spectrum Technology
– Frequency-Hopping Spread Spectrum
  Technology
– Direct-Sequence Spread Spectrum
  Technology
Infrared Technology
INFRARED (IR)
     TECHNOLOGY
Little used in commercial wireless LANs
Use very high frequencies
Inexpensive, but provide very limited
range (3ft)
Typically used for personal area
networks
Used only to implement fixed
subnetworks
CONFIGURATION
Peer-to-peer network
Client and Access point
Multiple access points and roaming
Using an extension point
Using directional antennas
•

       Star Topology



    by:CH.Mahesh
Star Topology:

• The star network configuration is the most popular
  physical topology
• In a star configuration, all computers or stations are
  wired directly to a central location:
   – Concentrator (a.k.a. hub)
   – Multistation Access Unit (MAU)
• A data signal from any station goes directly to this
  central device, which transmits the signal according
  to the established network access method for the
  type of network
Physical Topologies:
                        Star


Figure-2:
Star topology
Star
Star topology advantages:

– A break in one cable does not affect all other
  stations as it does in bus technologies
– Problems are easier to locate because symptoms
  often point to one station
– The second-easiest topology to design and install
– Does not require manual termination
   • Instead the media is terminated in the station at the
     transceiver on the NIC and in the hub or MAU
Star topology disadvantages:

– Hubs, which are required for a star topology, are
  more expensive than bus connectors
– A failure at the hub can affect the entire
  configuration and all connected stations
– Uses more cable than bus topologies
WORKING OF LAN
WORKING OF LAN

More Related Content

What's hot

Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
Aman Jaiswal
 
Basic networking
Basic networkingBasic networking
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
ruledbyrobotics2080
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
Sagar Walvekar
 
Exploitation of Local Area Network Services
Exploitation of Local Area Network ServicesExploitation of Local Area Network Services
Exploitation of Local Area Network Services
Mohammed El Hedhly
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
nakomuri
 
Vo ip
Vo ipVo ip
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
RMK ENGINEERING COLLEGE, CHENNAI
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
Andriy Berestovskyy
 
Wireless lan
Wireless lanWireless lan
Chapter1
Chapter1Chapter1
Chapter1
Gaurav Paliwal
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
Palanivel Kuppusamy
 
Point to point.48
Point to point.48Point to point.48
Point to point.48myrajendra
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
Online
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
sanjay thakur
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Securitydpd
 
Lan basic
Lan basicLan basic
Lan basic
Online
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 

What's hot (20)

Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Lan wan
Lan wanLan wan
Lan wan
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
Exploitation of Local Area Network Services
Exploitation of Local Area Network ServicesExploitation of Local Area Network Services
Exploitation of Local Area Network Services
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
 
Vo ip
Vo ipVo ip
Vo ip
 
IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Chapter1
Chapter1Chapter1
Chapter1
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Point to point.48
Point to point.48Point to point.48
Point to point.48
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
 
Tutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and SecurityTutorial 7 - Wireless Networking and Security
Tutorial 7 - Wireless Networking and Security
 
Lan basic
Lan basicLan basic
Lan basic
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 

Similar to WORKING OF LAN

Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Rohit Roy
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
TheUltimateFunEntert
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
Pratik Gohel
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth AplicationEr Bhaduri
 
Bluetooth
BluetoothBluetooth
Bluetooth
Kashyap Shah
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]Raul Soto
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
ssuser1d7ef1
 
Bluetooth
BluetoothBluetooth
Bluetooth
Fahim Faysal
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
Sajan Sahu
 
Bluetooth
BluetoothBluetooth
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
Suman Bhattacharyya
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
deepak kumar
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
Anand Dhana
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
Himangshu Hazra
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUNArun Franco
 

Similar to WORKING OF LAN (20)

Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth Aplication
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
bluetooth technology
 bluetooth technology bluetooth technology
bluetooth technology
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Wireless technology BY ARUN
Wireless technology BY ARUNWireless technology BY ARUN
Wireless technology BY ARUN
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

More from myrajendra

Fundamentals
FundamentalsFundamentals
Fundamentals
myrajendra
 
Data type
Data typeData type
Data type
myrajendra
 
Hibernate example1
Hibernate example1Hibernate example1
Hibernate example1
myrajendra
 
Jdbc workflow
Jdbc workflowJdbc workflow
Jdbc workflow
myrajendra
 
2 jdbc drivers
2 jdbc drivers2 jdbc drivers
2 jdbc drivers
myrajendra
 
3 jdbc api
3 jdbc api3 jdbc api
3 jdbc api
myrajendra
 
4 jdbc step1
4 jdbc step14 jdbc step1
4 jdbc step1
myrajendra
 
Dao example
Dao exampleDao example
Dao example
myrajendra
 
Sessionex1
Sessionex1Sessionex1
Sessionex1
myrajendra
 
1 introduction to html
1 introduction to html1 introduction to html
1 introduction to htmlmyrajendra
 
Views
ViewsViews
Views
myrajendra
 

More from myrajendra (20)

Fundamentals
FundamentalsFundamentals
Fundamentals
 
Data type
Data typeData type
Data type
 
Hibernate example1
Hibernate example1Hibernate example1
Hibernate example1
 
Jdbc workflow
Jdbc workflowJdbc workflow
Jdbc workflow
 
2 jdbc drivers
2 jdbc drivers2 jdbc drivers
2 jdbc drivers
 
3 jdbc api
3 jdbc api3 jdbc api
3 jdbc api
 
4 jdbc step1
4 jdbc step14 jdbc step1
4 jdbc step1
 
Dao example
Dao exampleDao example
Dao example
 
Sessionex1
Sessionex1Sessionex1
Sessionex1
 
Internal
InternalInternal
Internal
 
3. elements
3. elements3. elements
3. elements
 
2. attributes
2. attributes2. attributes
2. attributes
 
1 introduction to html
1 introduction to html1 introduction to html
1 introduction to html
 
Headings
HeadingsHeadings
Headings
 
Forms
FormsForms
Forms
 
Css
CssCss
Css
 
Views
ViewsViews
Views
 
Views
ViewsViews
Views
 
Views
ViewsViews
Views
 
Starting jdbc
Starting jdbcStarting jdbc
Starting jdbc
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

WORKING OF LAN

  • 1. WELCOME TO PANDU GROUP PRESENTATION WORLD
  • 2. LAN (Local Area Network) by: Vishwa
  • 3. LAN (Local Area Networks)  A LAN is a computer network that covers a small area (home, office, building, campus) o a few kilometers  LANs have higher data rates (10Mbps to 10Gbps) as compared to WANs  LANs (usually) do not involve leased lines; cabling and equipments belong to the LAN owner.  A LAN consists of o Shared transmission medium • now so valid today due to switched LANs o regulations for orderly access to the medium o set of hardware and software for the interfacing devices
  • 4. WORKING OF LAN  LAN usually broadcast their message to all hosts on that LAN.  This hosts shares a single transmission media.  This broadcast network can be a static or dynamic method.  In this static method each host is given a fixed time slides to send the information. This is the most popular method used.
  • 5.  In the dynamic method a host can send a frame any time.  If the two hosts send a frame at the same time the two frames could collide with each other.  Dynamic method can be further sub-divided in 2 categories: 1. Centralized a. Carrier Sensing b. Token Passing 2. Decentralized: Protocols are used to implement media access control.
  • 6. LAN Protocol Architecture  Corresponds to lower two layers of OSI model o But mostly LANs do not follow OSI model  Current LANs are most likely to be based on Ethernet protocols developed by IEEE 802 committee  IEEE 802 reference model o Logical link control (LLC) o Media access control (MAC) o Physical
  • 8. LAN Interconnection Traditional LAN interconnection devices  Repeater – it operates at OSI layer 1 and transmits data bits over a physical medium.  Bridge – it operates at OSI layer 2 and is commonly used to connect similar LAN segments.  Switch – it operates at OSI layer 2 or layer 3 and is used to interconnect multiple similar or dissimilar LANs.  Router – it operates at OSI layer 3. A router is used to interconnect individual networks whose sizes vary from very small to very large. Routers may be categorized into backbone router (or core router), border router and access router depending on their role in the network.
  • 9. LAN Architecture  TOPOLOGIES • Star • Bus • Ring  Transmission medium  Layout  Medium access control
  • 11. Advantages  Long Distances Possible 10 Base-5 allows distances up to 500 meters (1650 feet). This makes it very useful as a "backbone" technology for wiring together multiple locations within a building without the use of repeaters  Noise Immunity Since 10 Base-5 uses a very heavily shielded cable, it can be used in electrically noisy environments which can cause other network types to fail.  Conceptually Simple Since all devices on a 10 Base-5 network are simply chained together on a common coaxial cable, it is a simple matter to plan the routing of the cable
  • 12. Disadvantages  Inflexible 10 Base-5 networks do not lend themselves well to installations where the setup of the network will change much after the initial installation. It can be very difficult to add or move a node once it is connected to the coaxial cable.  Fault Intolerant Since 10 Base-5 uses a common physical cable to interconnect all the nodes, the failure of any part of the coaxial cable or any node has the ability to cause the collapse of the entire network.
  • 13.
  • 14. Bluetooth Technology by: PANDU
  • 15. Bluetooth Birth  The Name –Bluetooth?  The name is attributed to Harald Bluetooth was king of Denmark around the turn of the last millennium. Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 16. What Is Bluetooth? • Designed to be used to connect both mobile devices and peripherals that currently require a wire. • “USB without wires” • Short range wireless radio technology. - operate range of 100 meters. Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 17. Who Started Bluetooth? Ericsson Mobile Communication • Bluetooth Special Interest Group (SIG) -5 founding members -Ericsson, Nokia, IBM, Intel & Toshiba • Promoter’s Group - 3COM, Lucent, Microsoft, Motorola • Now over 1900 members Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 18. How Does It Work? • Bluetooth is a standard for tiny, radio frequency chips that can be plugged into your devices • These chips were designed to take all of the information that your wires normally send, and transmit it at a special frequency to a receiver Bluetooth chip. Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 19. Bluetooth @ Home er gita lC ame ra NO WIRES Computer Scann Di Inkjet Printer xDSL Access Point Player MP3 Home Audio System PDA Cordless Phone Cell Phone Base Station Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 20. Bluetooth Products 1 • Bluetooth-enabled PC Card Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 21. Bluetooth Products 2 • Bluetooth-enabled PDA Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 22. Bluetooth Products 3 • Bluetooth-enabled Cell Phone Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 23. Bluetooth Products 4 • Bluetooth-enabled Head Set Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 24. Advantages (+) • Wireless (No Cables) • No Setup Needed • Low Power Consumption (1 Milliwat) • Industry Wide Support Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 25. Disadvantages (-) • Short range (10 meters) • Small throughput rates - Data Rate 1.0 Mbps • Mostly for personal use (PANs) • Fairly Expensive Created by Matt Romita and Mohammed Hasham for BCS 312 and used in BCS 555
  • 26.
  • 29. WIRELESS LAN Introduction Wireless Technology Wireless LAN Configuration Differences between wired LAN vs wireless LAN
  • 30. INTRODUCTION Data communications system Alternates wired LAN Transmits and receives data over the air Minimize the need for wired connections Become more popular in general-purpose alternative of business customers. Benefited several industries in productivity and mobility
  • 31. WHY WIRELESS? Advantages: MOBILITY INSTALLATION COST SCALABILITY
  • 32. MOBILITY Real-time information access from anywhere at any time Increases productivity and flexibility
  • 33. HOW IT WORKS Use electromagnetic airwaves to communicate information Data imposed on radio carrier (radio wave) RF electromagnetic wave can easily pass through ordinary wall, it needs to implement with heavy concrete or metal screening.
  • 34. WIRELESS TECHNOLOGY Satellite-Based System – Geosynchronous Earth Orbiting (GEO) – Low Earth Orbiting (LEO) Land-Based Network Access System – Wireless WAN – Wireless LAN
  • 35. WIRELESS WAN Provide nationwide or citywide coverage Example: Ricochet Micro-Cell
  • 36. WIRELESS LAN Wireless LAN Topology – 2 main components Access Points Adapters – Roaming Wireless LAN Technology – Types – Standard – Configuration
  • 37. ACCESS POINTS Connects to the wired network single access point can support a small group of users within a range of several hundred feet Wireless Clients Connected to LAN via Access Point
  • 38. WIRELESS LAN TECHNOLOGY Narrowband Technology Spread Spectrum Technology – Frequency-Hopping Spread Spectrum Technology – Direct-Sequence Spread Spectrum Technology Infrared Technology
  • 39. INFRARED (IR) TECHNOLOGY Little used in commercial wireless LANs Use very high frequencies Inexpensive, but provide very limited range (3ft) Typically used for personal area networks Used only to implement fixed subnetworks
  • 40. CONFIGURATION Peer-to-peer network Client and Access point Multiple access points and roaming Using an extension point Using directional antennas
  • 41.
  • 42. Star Topology by:CH.Mahesh
  • 43. Star Topology: • The star network configuration is the most popular physical topology • In a star configuration, all computers or stations are wired directly to a central location: – Concentrator (a.k.a. hub) – Multistation Access Unit (MAU) • A data signal from any station goes directly to this central device, which transmits the signal according to the established network access method for the type of network
  • 44. Physical Topologies: Star Figure-2: Star topology
  • 45. Star
  • 46. Star topology advantages: – A break in one cable does not affect all other stations as it does in bus technologies – Problems are easier to locate because symptoms often point to one station – The second-easiest topology to design and install – Does not require manual termination • Instead the media is terminated in the station at the transceiver on the NIC and in the hub or MAU
  • 47. Star topology disadvantages: – Hubs, which are required for a star topology, are more expensive than bus connectors – A failure at the hub can affect the entire configuration and all connected stations – Uses more cable than bus topologies