SlideShare a Scribd company logo
1 of 47
Computer Networks
Hamayun Khan
Lecturer CS & IT
Superior University, Lahore
Objectives
Types of Networks
3-Layers Network Design Model
Collision Domain vs Broadcast Domain
Carrier Sense Multiple Access with Collision
Detection (CSMA/CD)
The Layered Approach
Types of Networks
• Networking Components
• Categories of Networks
Network
When we connect two or more devices in order to access their shared resources.
Networking Components
Classification of Computer Networks
Computer networks are classified based on
various factors. They includes:
Geographical span
Inter-connectivity
Administration
Architecture
Network Types
Personal Area Network
Local Area Network
Metropolitan Area Network
Wide Area Network
Personal Area Network
 personal to a user
 connectivity range up to 10 meters
 E.g. wireless computer keyboard
and mouse, Bluetooth enabled
headphones, wireless printers and
TV remotes
Local Area Network
 spanned inside a building
 an organization’ offices, schools,
colleges or universities
 mostly operates on private IP
addresses
 Ethernet is most widely employed
LAN technology and uses Star
topology
Local Area
Network
When we communicate by using
our owned resources, that
communication is called LAN.
Metropolitan Area Network
generally expands throughout
a city
works in between Local Area
Network and Wide Area
Network
Metropolitan
Area Network
A Network Located within the
boundary of a metropolitan city is
called MAN usually connected
through MAN service provider.
Wide Area Network
Covers a wide area which may
span across provinces and
even a whole country
connectivity to MANs and
LANs
Wide Area
Network
When we communicate by using
the services offered by some
service provider, that
communication is called WAN.
Comparison
LAN
 Confined to small areas i.e., it
connects several devices over a
distance of 5 to 10 km.
 High speed.
 Most inexpensive equipment.
 Low error rates.
 Data and hardware sharing
between users owned by the user.
 Operates at speeds ranging from
10Mbps to 100Mbps. Now days
1000 Mbps are available.
MAN
 Confined to a larger area than
a LAN and can range from
10km to a few 100km in
length.
 Slower than a LAN but faster
than a WAN.
 Operates at a speed of 1.5 to
150 Mbps.
 Expensive equipment.
 Moderate error rates.
WAN
 A WAN can range from 100km to
1000km and the speed between
cities can vary form1.5 Mbps to 2.4
Gbps.
 WAN supports large number of
computers and multiple host
machines.
 Various segments of network are
interconnected using sophisticated
support devices like routers and
gateways.
 Usually the speed is much slower
than LAN speed.
 Highest possible error rate
compared to LAN & MAN.
3-Layers Network Design
Model
• Concept of hierarchy
• The Core Layer
• The Distribution Layer
• The Access Layer
Concept of hierarchy
3 Layers Network Design Model
The Core Layer
 The core layer is responsible for transporting large amounts of traffic both reliably and
quickly.
 The only purpose of the network’s core layer is to switch traffic as fast as possible.
 Things we don’t want to do:
 Never do anything to slow down traffic
 Don’t support workgroup access here
 Avoid expanding the core
 Things that we want to achieve:
 Design the core for high reliability
 Design with speed in mind
 Select routing protocols with lower convergence times
The Distribution Layer
 The distribution layer is sometimes referred to as the workgroup layer and is
the communication point between the access layer and the core.
 Functions of the distribution layer are:
 Routing
 Implementing tools (such as access lists), packet filtering, and queuing
 Implementing security and network policies, including address translation and
firewalls
 Redistributing between routing protocols, including static routing
 Routing between VLANs and other workgroup support functions
 Defining broadcast and multicast domains
The Access Layer
 The access layer controls user and workgroup access to internetwork resources.
 The access layer is sometimes referred to as the desktop layer.
 The following are some of the functions to be included at the access layer:
 Continued (from distribution layer) use of access control and policies
 Creation of separate collision domains (micro segmentation/switches)
 Workgroup connectivity into the distribution layer
 Device connectivity
 Resiliency and security services
 Advanced technology capabilities (voice/video, etc.)
Collision Domain vs
Broadcast Domain
Ethernet Networks
 Ethernet is a contention-based media access method that allows all hosts
on a network to share the same link’s bandwidth.
 Ethernet is a family of technologies that provides data-link and physical
specifications for controlling access to a shared network medium.
 Ethernet has several benefits:
 Simple to install and manage
 Inexpensive
 Flexible and scalable
 Easy to interoperate between vendors
Ethernet Cabling Types
Ethernet can be deployed over
three types of cabling:
Coaxial cabling
Twisted-pair cabling
Fiber optic cabling
Ethernet Cabling Types: Co-axial
1. Thinnet
2. Thicknet
Thicknet has a wider diameter and more shielding, which
supports greater distances. However, it is less flexible
than the smaller thinnet, and thus more difficult to work
with. A vampire tap is used to physically connect devices
to thicknet, while a BNC connector is used for thinnet.
Ethernet Cabling Types: Twisted-pair
1. UTP (unshielded)
2. STP (shielded)
There are several categories of twisted-pair cable:
 Category 3 or Cat3: three twists per inch.
 Cat5: five twists per inch.
 Cat5e: five twists per inch; pairs are also twisted around each
other.
 Cat6: six twists per inch, with improved insulation.
An RJ45 connector is used to connect a device to a twisted-pair
cable.
Figure Twisted-pair cable
Figure UTP and STP cables
Figure UTP connector
HUB
SWITCH
ROUTER
Remember That!
Routers separate broadcast and collision domains.
Switches separate collision domains.
Hubs belong to only one collision domain.
Switches and hubs both only belong to one
broadcast domain.
Carrier Sense Multiple
Access with Collision
Detection (CSMA/CD)
CSMA/CD
Ethernet networking uses a protocol called Carrier
Sense Multiple Access with Collision Detection
(CSMA/CD), which helps devices share the
bandwidth evenly while preventing two devices from
transmitting simultaneously on the same network
medium.
CSMA/CD
When a collision occurs on an Ethernet LAN, the
following happens:
A jam signal (32-bits) informs all devices that a collision
occurred.
The collision invokes a random backoff algorithm.
Each device on the Ethernet segment stops transmitting for a
short time until its backoff timer expires.
All hosts have equal priority to transmit after the timers have
expired.
The Layered Approach
Layered Tasks
An example from the everyday life
Hierarchy?
Services
Why layered communication?
To reduce complexity of communication task
by splitting it into several layered small tasks
Each layer has its own task
Each layer has its own protocol

More Related Content

Similar to Lecture W2 CN Network Types, Layered approach.pptx

Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptxRamNivas42
 
Chapter7 Computer Networks
Chapter7 Computer NetworksChapter7 Computer Networks
Chapter7 Computer NetworksMuhammad Waqas
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiSilicon Univ
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshareBSITstudents
 
computer network - Chapter 1 hardware
computer network - Chapter 1 hardwarecomputer network - Chapter 1 hardware
computer network - Chapter 1 hardwareSakthiVinoth78
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 

Similar to Lecture W2 CN Network Types, Layered approach.pptx (20)

Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Document
DocumentDocument
Document
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Networking
NetworkingNetworking
Networking
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Computer Network ssss ppt.pptx
Computer Network ssss ppt.pptxComputer Network ssss ppt.pptx
Computer Network ssss ppt.pptx
 
Chapter7 Computer Networks
Chapter7 Computer NetworksChapter7 Computer Networks
Chapter7 Computer Networks
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in Delhi
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
Internet
InternetInternet
Internet
 
computer network - Chapter 1 hardware
computer network - Chapter 1 hardwarecomputer network - Chapter 1 hardware
computer network - Chapter 1 hardware
 
Networks Basics
Networks BasicsNetworks Basics
Networks Basics
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 

More from ssuserc1e786

Bcsm-f20-405(Web-design).pptx
Bcsm-f20-405(Web-design).pptxBcsm-f20-405(Web-design).pptx
Bcsm-f20-405(Web-design).pptxssuserc1e786
 
W1_Lec01_Lec02_Layouts.pptx
W1_Lec01_Lec02_Layouts.pptxW1_Lec01_Lec02_Layouts.pptx
W1_Lec01_Lec02_Layouts.pptxssuserc1e786
 
Lecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptxLecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptxssuserc1e786
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxssuserc1e786
 
W2_Lec03_Lec_04_Activity.pptx
W2_Lec03_Lec_04_Activity.pptxW2_Lec03_Lec_04_Activity.pptx
W2_Lec03_Lec_04_Activity.pptxssuserc1e786
 
W1_Lec01_Lec02_Intro.pptx
W1_Lec01_Lec02_Intro.pptxW1_Lec01_Lec02_Intro.pptx
W1_Lec01_Lec02_Intro.pptxssuserc1e786
 

More from ssuserc1e786 (7)

LEC 1.pptx
LEC 1.pptxLEC 1.pptx
LEC 1.pptx
 
Bcsm-f20-405(Web-design).pptx
Bcsm-f20-405(Web-design).pptxBcsm-f20-405(Web-design).pptx
Bcsm-f20-405(Web-design).pptx
 
W1_Lec01_Lec02_Layouts.pptx
W1_Lec01_Lec02_Layouts.pptxW1_Lec01_Lec02_Layouts.pptx
W1_Lec01_Lec02_Layouts.pptx
 
Lecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptxLecture W5 CN IP Subnetting P2.pptx
Lecture W5 CN IP Subnetting P2.pptx
 
Lecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptxLecture W4 CN IP Addressing P1.pptx
Lecture W4 CN IP Addressing P1.pptx
 
W2_Lec03_Lec_04_Activity.pptx
W2_Lec03_Lec_04_Activity.pptxW2_Lec03_Lec_04_Activity.pptx
W2_Lec03_Lec_04_Activity.pptx
 
W1_Lec01_Lec02_Intro.pptx
W1_Lec01_Lec02_Intro.pptxW1_Lec01_Lec02_Intro.pptx
W1_Lec01_Lec02_Intro.pptx
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Lecture W2 CN Network Types, Layered approach.pptx

  • 1. Computer Networks Hamayun Khan Lecturer CS & IT Superior University, Lahore
  • 2. Objectives Types of Networks 3-Layers Network Design Model Collision Domain vs Broadcast Domain Carrier Sense Multiple Access with Collision Detection (CSMA/CD) The Layered Approach
  • 3. Types of Networks • Networking Components • Categories of Networks
  • 4. Network When we connect two or more devices in order to access their shared resources.
  • 6. Classification of Computer Networks Computer networks are classified based on various factors. They includes: Geographical span Inter-connectivity Administration Architecture
  • 7. Network Types Personal Area Network Local Area Network Metropolitan Area Network Wide Area Network
  • 8. Personal Area Network  personal to a user  connectivity range up to 10 meters  E.g. wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers and TV remotes
  • 9. Local Area Network  spanned inside a building  an organization’ offices, schools, colleges or universities  mostly operates on private IP addresses  Ethernet is most widely employed LAN technology and uses Star topology
  • 10. Local Area Network When we communicate by using our owned resources, that communication is called LAN.
  • 11. Metropolitan Area Network generally expands throughout a city works in between Local Area Network and Wide Area Network
  • 12. Metropolitan Area Network A Network Located within the boundary of a metropolitan city is called MAN usually connected through MAN service provider.
  • 13. Wide Area Network Covers a wide area which may span across provinces and even a whole country connectivity to MANs and LANs
  • 14. Wide Area Network When we communicate by using the services offered by some service provider, that communication is called WAN.
  • 15. Comparison LAN  Confined to small areas i.e., it connects several devices over a distance of 5 to 10 km.  High speed.  Most inexpensive equipment.  Low error rates.  Data and hardware sharing between users owned by the user.  Operates at speeds ranging from 10Mbps to 100Mbps. Now days 1000 Mbps are available. MAN  Confined to a larger area than a LAN and can range from 10km to a few 100km in length.  Slower than a LAN but faster than a WAN.  Operates at a speed of 1.5 to 150 Mbps.  Expensive equipment.  Moderate error rates. WAN  A WAN can range from 100km to 1000km and the speed between cities can vary form1.5 Mbps to 2.4 Gbps.  WAN supports large number of computers and multiple host machines.  Various segments of network are interconnected using sophisticated support devices like routers and gateways.  Usually the speed is much slower than LAN speed.  Highest possible error rate compared to LAN & MAN.
  • 16.
  • 17.
  • 18. 3-Layers Network Design Model • Concept of hierarchy • The Core Layer • The Distribution Layer • The Access Layer
  • 20. 3 Layers Network Design Model
  • 21. The Core Layer  The core layer is responsible for transporting large amounts of traffic both reliably and quickly.  The only purpose of the network’s core layer is to switch traffic as fast as possible.  Things we don’t want to do:  Never do anything to slow down traffic  Don’t support workgroup access here  Avoid expanding the core  Things that we want to achieve:  Design the core for high reliability  Design with speed in mind  Select routing protocols with lower convergence times
  • 22. The Distribution Layer  The distribution layer is sometimes referred to as the workgroup layer and is the communication point between the access layer and the core.  Functions of the distribution layer are:  Routing  Implementing tools (such as access lists), packet filtering, and queuing  Implementing security and network policies, including address translation and firewalls  Redistributing between routing protocols, including static routing  Routing between VLANs and other workgroup support functions  Defining broadcast and multicast domains
  • 23. The Access Layer  The access layer controls user and workgroup access to internetwork resources.  The access layer is sometimes referred to as the desktop layer.  The following are some of the functions to be included at the access layer:  Continued (from distribution layer) use of access control and policies  Creation of separate collision domains (micro segmentation/switches)  Workgroup connectivity into the distribution layer  Device connectivity  Resiliency and security services  Advanced technology capabilities (voice/video, etc.)
  • 25. Ethernet Networks  Ethernet is a contention-based media access method that allows all hosts on a network to share the same link’s bandwidth.  Ethernet is a family of technologies that provides data-link and physical specifications for controlling access to a shared network medium.  Ethernet has several benefits:  Simple to install and manage  Inexpensive  Flexible and scalable  Easy to interoperate between vendors
  • 26. Ethernet Cabling Types Ethernet can be deployed over three types of cabling: Coaxial cabling Twisted-pair cabling Fiber optic cabling
  • 27. Ethernet Cabling Types: Co-axial 1. Thinnet 2. Thicknet Thicknet has a wider diameter and more shielding, which supports greater distances. However, it is less flexible than the smaller thinnet, and thus more difficult to work with. A vampire tap is used to physically connect devices to thicknet, while a BNC connector is used for thinnet.
  • 28. Ethernet Cabling Types: Twisted-pair 1. UTP (unshielded) 2. STP (shielded) There are several categories of twisted-pair cable:  Category 3 or Cat3: three twists per inch.  Cat5: five twists per inch.  Cat5e: five twists per inch; pairs are also twisted around each other.  Cat6: six twists per inch, with improved insulation. An RJ45 connector is used to connect a device to a twisted-pair cable.
  • 30. Figure UTP and STP cables
  • 32.
  • 33.
  • 34.
  • 35. HUB
  • 38.
  • 39.
  • 40. Remember That! Routers separate broadcast and collision domains. Switches separate collision domains. Hubs belong to only one collision domain. Switches and hubs both only belong to one broadcast domain.
  • 41. Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
  • 42. CSMA/CD Ethernet networking uses a protocol called Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which helps devices share the bandwidth evenly while preventing two devices from transmitting simultaneously on the same network medium.
  • 43.
  • 44. CSMA/CD When a collision occurs on an Ethernet LAN, the following happens: A jam signal (32-bits) informs all devices that a collision occurred. The collision invokes a random backoff algorithm. Each device on the Ethernet segment stops transmitting for a short time until its backoff timer expires. All hosts have equal priority to transmit after the timers have expired.
  • 46. Layered Tasks An example from the everyday life Hierarchy? Services
  • 47. Why layered communication? To reduce complexity of communication task by splitting it into several layered small tasks Each layer has its own task Each layer has its own protocol