Sunteți pe pagina 1din 8

Introduction to LANs

• Local area network - communication network


• Interconnects a variety of data communicating devices within a small geographic area
• Broadcasts data at high data transfer rates with very low error rates.

Primary Function of a LAN

To provide access to hardware and software resources that will allow users to perform one or more of the following activities:

• File serving - large storage disk drive acts as a central storage repository
• Print serving - Providing authorization to access a particular printer, accept and queue print jobs, and user access to print
queue to perform administrative duties
• Video transfers - High speed LANs are capable of supporting video image and live video transfers
• Manufacturing support - LANs can support manufacturing and industrial environments
• Academic support – In classrooms, labs, and wireless
• E-mail support
• Interconnection between multiple systems

Advantages of Local Area Networks

• Ability to share hardware and software resources


• Individual workstation might survive network failure
• Component and system evolution are possible
• Support for heterogeneous forms of hardware and software
• Access to other LANs and WANs (
• Private ownership
• Secure transfers at high speeds with low error rates

Disadvantages of Local Area Networks

• Equipment and support can be costly


• Level of maintenance continues to grow
• Private ownership?
• Some types of hardware may not interoperate
• Just because a LAN can support two different kinds of packages does not mean their data can interchange easily
• A LAN is only as strong as it weakest link, and there are many links

Type Of Networks

1.LAN - Local Area Network

A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a
single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a
group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.

2. WAN - Wide Area Network

As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.

A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking,
the router maintains both a LAN address and a WAN address.

A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but
rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and
X.25 for connectivity over the longer distances.

1
LAN, WAN and Home Networking

Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider (ISP) using a broadband
modem. The ISP provides a WAN IP address to the modem, and all of the computers on the home network use LAN (so-called
private) IP addresses. All computers on the home LAN can communicate directly with each other but must go through a central
gateway, typically a broadband router, to reach the ISP.

Other Types of Area Networks

While LAN and WAN are by far the most popular network types mentioned, you may also commonly see references to these others:

 Wireless Local Area Network - a LAN based on WiFi wireless network technology
 Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a
city. A MAN is typically owned an operated by a single entity such as a government body or large corporation.
 Campus Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local
business campus.
 Storage Area Network - connects servers to data storage devices through a technology like Fibre Channel.
 System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also
known as Cluster Area Network.

Topology

 A topology is a description of any kind of locality in terms of its layout. In communication networks, a topology is a usually
schematic description of the arrangement of a network, including its nodes and connecting lines
 The physical topology of a network describes the layout of the cables and workstations and the location of all network
components
 Common Topology:

Bus, Ring, Star and Mesh

Bus Topology

 In a bus topology, all computers are attached to a Terminator


single continuous cable that is terminated at both
ends, which is the simplest way to create a physical
network

Star Topology

 Unlike those in a bus topology, each computer in a star topology is


connected to a central point by a separate cable. The central point is a
device known as a hub
 Although this setup uses more cable than a bus, a star topology is much
more fault tolerant than a bus topology. This means that if a failure
occurs along one of the cables connecting to the hub, only that
portion of the network is affected, not the entire network. It also
means that you can add new stations just by running a single new cable

Ring Topology

 In the ring topology, each computer is connected directly to two other computers in the
network. Data moves down a one-way path from one computer to another i.e. clock
wise
 Laying out cable in a ring is that the cable design is simple. The bad news is that, as
with bus topology, any break, such as adding or removing a computer, disrupts the
entire network. Also, because you have to “break” the ring in order to add another
station, it is very difficult to reconfigure without bringing down the whole network

Note: Even though all computers are connected through a single cable, if there is a break all
the computer connected to the ring topology will not work
Example: If Machine A Wants to talk to Machine D The data can travel only Clock Wise If
there is a break in the loop the data cannot be transferred

Mesh Topology

 In a mesh topology, a path exists from each station to every other station in the
network. While not usually seen in LANs, a variation on this type of topology—the
hybrid mesh—is used on the Internet and other WANs in a limited fashion.
 Hybrid mesh topology networks can have multiple connections between some locations,
but this is done only for redundancy.
 Also, it is not a true mesh because there is not a connection between each and every
node, just a few for backup purposes

2
ETHERNET CABLES

Coaxial Cable

 Coaxial cable consists of a central copper core surrounded by an insulator, a braided metal shielding, called braiding, and an
outer cover, called the sheath or jacket
EG : Cable TV network and Cable Modem use the coaxial cable

Coaxial Cable Connector

Thicknet (10Base5)

 Thicknet cabling, also called thick wire Ethernet, is a rigid coaxial cable approximately 1-cm thick used for the original Ethernet
networks.Thicknet is also called “yellow Ethernet” or “yellow garden hose.”
 IEEE designates Thicknet as 10Base5 Ethernet.The “10” represents its throughput of 10 Mbps, the “Base” stands for baseband
transmission, and the “5” represents the maximum segment length of a Thicknet cable, which is 500 m. You may find this on
older networks.

Thinnet (10base2)

 Thinnet, also known as thin Ethernet, was the most popular medium for Ethernet LANs in the 1980s. Thinnet is rarely used
on modern networks, although you may encounter it on networks installed in the 1980s or on newer small office or home
office LANs
 IEEE has designated Thinnet as 10Base2 Ethernet, with the “10” representing its data transmission rate of 10 Mbps, the
“Base” representing the fact that it uses baseband transmission, and the “2” representing its maximum segment length of
185 (or roughly 200) m.

Twisted Pair (TP)

 Twisted-pair (TP) cable is similar to telephone wiring and consists of color-


coded pairs of insulated copper wires. The more twists per inch in a pair of
wires, the more resistant the pair will be to all forms of noise.
 Higher-quality, more expensive twisted-pair cable contains more twists per
foot. The number of twists per meter or foot is known as the twist ratio.

Twisted Pair (TP)

 Twisted-pair cable is the most common form of cabling found on LANs


today. It’s inexpensive, flexible, and easy to install, and it can span a
significant distance before requiring a repeater (though not as far as
coax). Twisted-pair cable easily accommodates several different
topologies, although it is most often implemented in star or star-hybrid
topologies
 One drawback to twisted-pair is that, because of its flexibility, it is more
prone to physical damage than coaxial cable. All twisted-pair cable falls
into one of two categories: shielded twisted-pair (STP) or unshielded
twisted-pair (UTP).

3
Shielded Twisted-Pair (STP)

 As the name implies, shielded twisted-pair (STP) cable consists of


twisted wire pairs that are not only individually insulated, but also
surrounded by a shielding made of a metallic substance such as foil.
Some STP use a braided metal shielding. The shielding acts as a
barrier to external electromagnetic forces, thus preventing them from
affecting the signals traveling over the wire inside the shielding. The
shielding may be grounded to enhance its protective effect.

Unshielded Twisted-Pair (UTP)

 Unshielded twisted-pair (UTP) cabling consists of one or more insulated wire pairs encased in a plastic sheath. As its name
implies, UTP does not contain additional shielding for the twisted pairs. As a result, UTP is both less expensive and less
resistant to noise than STP

UTP Types
UTP CAT 1/2/3/4/5/6

Cat 1 Data Rate upto 1 Mbps – Telephone Line

Cat 2 Date Rage upto 4 Mbps – Token Ring

Cat 3 Data Rate upto 10 Mbps – Token Ring & 10 Base – T

Cat 4 Data Rate upto 16 Mbps – Token Ring

Cat 5 Date Rate up to 100 Mbps Ethernet – 16 for Token


Ring

Cat 5e Data Rage upto 1000 Mbps Ethernet

Cat 6 Data Rate upto 1000 Mbps Ethernet

Fiber Optic

 A fiber-optic system is similar to the


copper wire system that fiber-optics is
replacing. The difference is that fiber-
optics use light pulses to transmit
information down fiber lines instead of
using electronic pulses to transmit
information down copper lines.

Fiber Optic

 Bandwidth Up to 100s of Gbps


 Distance (100 +KM)
 Three Types
 Single Mode
 Multi Mode
 Plastic Optical Fiber Mode

ETHERNET CABLE (UTP)

Internal Cable Structure and Color Coding


Inside the cable , there are 8 color coded wires. These wires are twisted into 4 pairs each pair has a common color scheme.
The cable has two wiring standards, T568 A and T568B w/c vary only in the arrangement of the colored pairs. The Ethernet cable use
RJ 45 as a connector.
RJ45 plug in a 8-position modular connector that looks like a large phone plug.

Two Ethernet Cable Pin Outs.


There are two basic Ethernet cable pin outs. A straight through cable which is used to connect to a hub or switch, and a
cross over cable use to operate in a peer-to-peer fashion w/out a hub/switch.

4
Straight Through Cable

 In a UTP implementation of a straight-through


cable, the wires on both cable ends are in the
same order
 You can determine that the wiring is a straight-
through cable by holding both ends of the UTP
cable side by side and seeing that the order of
the wires on both ends is identical
 You can use a straight-through cable for
dissimilar devices
Connecting a router to a hub or switch
Connecting a server to a hub or switch
Connecting workstations to a hub or switch

Cross Over Cable

 In the implementation of a crossover, the wires on each end of the cable are crossed
 Transmit to Receive and Receive to Transmit on each side, for both tip and ring
 Notice that pin 1 on one side connects to pin 3 on the other side, and pin 2 connects to pin 6 on the opposite end
 You can use a crossover cable for similar devices
 Connecting uplinks between switches
 Connecting hubs to switches
 Connecting a hub to another hub.

Pin Number Wire color Wire Pin number Wire color


Becomes

Pin 1(used) Orange / White 1 1 Pin 1(used) Orange / White


Pin 2 (used) Orange 2 2 Pin 2 (used) Orange
Pin 3(used) Green / White 3 3 Pin 3(used) Green / White
Pin 4(unused) Blue 6 6 Pin 4(unused) Blue
Pin 5 (unused) Blue/White Pin 5 (unused) Blue/White
Pin 6 (used) Green Pin 6 (used) Green
Pin 7(unused) Brown/White Pin 7(unused) Brown/White
Pin 8(unused) Brown Pin 8(unused) Brown

Cross Over Cable

T568 B Wire Becomes T568 A


Pin Number Wire color Pin number Wire color

Pin 1 Orange/White 1 3 Pin 1 Green/White


Pin 2 Orange 2 6 Pin 2 Green
Pin 3 Green / White 3 1 Pin 3 Orange/White
Pin 4 Blue 6 2 Pin 4 Blue
Pin 5 Blue/White Pin 5 Blue/White
Pin 6 Green Pin 6 Orange
Pin 7 Brown/White Pin 7 Brown/White
Pin 8 Brown Pin 8 Brown

Registered Jack (RJ)

 RJ-11 – Defined for telephone connectors


 RJ-45 – Defined for UTP connectors

5
IP ADDRESSING Subnet Masks
 Is the portion of the IP address that identifies the
network to which a host belongs. Like IP addresses, a
subnet mask is a 32-bit number. A series of 1’s are used
Configure TCP/IP on Servers and Clients
to identify the network portion of the address. The 0’s
are used to represent the host portion of the address
TCP/IP (Transmission Control Protocol/Internet Protocol) is a
192.168.221.204
set of protocolsthat enable computers to communicate with
255.255.255.0
one another. It has been in use forover 20 years, and is the
set of protocols used by the Internet, as well as countless
CLASS OF IP ADDRESS
smaller networks.The protocols were developed by the
Internet Engineering Task Force (IETF)
Class A, B and C Addresses
using a system based on Requests for Comments (RFCs).
There was a time when IP addresses were assigned to
organizations based on their size
A TCP/IP network is composed of hosts. A host, in turn, is any
- The largest organizations, such as IBM, General
device or service that’s connected to the network. The hosts
Electric, MIT, and Xerox, were assigned Class A
use a couple of different addresses to identify and
addresses.
communicate with one another, a hardware address and an IP
- Slightly smaller organizations received Class B
address.
addresses,
- smallest organizations got Class C addresses.
Hardware Addresses (MAC ADDRESS)
To connect to a network, a host must have a network  Class A IP addresses all start with the number in the
interface card (NIC) installed. range of 1 to 126 and, by default, have a subnet mask of
255.0.0.0.
Every NIC that’s manufactured is given a unique 48-bit  Class B addresses have starting numbers in the range
hardware address. Thehardware address is literally “burned of 128 to 191, and use a standard subnet mask of
into” the card during the manufacturing 255.255.0.0.
process, and as a rule cannot be changed by the user.  Class C network addresses all start with a number
between 192 and 223, and have a default subnet
The terms “Ethernet board” and “Ethernet card” are mask of 255.255.255.0.
often used as synonyms for “network interface card.”
Following terms used as a synonym of Hardware address: Some ranges of IP addresses, such as those starting with 127
n Media Access Control (MAC) address and those starting with 224 through 255, aren’t classified as
n Physical address A, B, or C. These addresses are reserved
n Ethernet address as follows:
n Token Ring address
n NIC address n 127.x.y.z (reserved loopback address)
n 224.x.y.z through 239.x.y.z (Class D reserved multicast
As mentioned, the hardware address is a 48-bit number, addresses)
something along the n 240.x.y.z through 254.x.y.z (Class E reserved experimental
lines of addresses)
000000001000000010101101011110111110000010110111, FROM THE CLASSROOM
although it’s far more common to see it expressed as six There are also ranges of private IP addresses, which can
hexadecimal numbers separated by assigned to hosts that are clients to, but not servers on, the
hyphens or periods, as in 00-80-AD-7B-E0-B7 or Web, as listed here:
00.80.AD.7B.E0.B7. You can view a machine’s hardware
address by entering the ipconfig /all command at a n 10.0.0.0 through 10.255.255.255
command prompt. (subnet mask 255.0.0.0)
n 172.16.0.0 through 172.31.255.255
(subnet mask 255.255.0.0)
n 192.168.0.0 through 192.168.255.255
(subnet mask 255.255.255.0)

Note: Private IP addresses can’t be used for servers on the


Internet, they can access the Internet through a proxy server
or Network Address
Translation (NAT).

Table 1-2 illustrates this by comparing Class A, B, and C


networks.
CLASS From To DSM Private
ClassA 1.x.y.z 126.x.y.z 255.0.0.0 10.X.Y.Z
IP Addresses Loopback 127.x.y.z
ClassB 128.x.y.z 191.x.y.z 255.255.0.0 172.16.y.z
TCP/IP network also has an IP address (sometimes called an through
172.31.y.z
Internet address).
ClassC 192.x.y.z 223.x.y.z 255.255.255.0 192.168.y.z
 Unlike the hardware address, the IP address is a logical
ClassD 241.x.y.z 239.x.y.z N/A N/A
address that’s assigned bya network administrator, or by ClassE 240.x.y.z 254.x.y.z N/A N/A
DHCP (Dynamic Host Configuration Protocol),which can
automatically assign an IP address when the host first this table show the number of Networks and Hosts per
connects to thenetwork. Network for each TCP/IP Address
 TCP/IP address is a 32-bit number, as in
11111111111111110100110111001110. You’ll rarely see
a TCP/IP address expressed in that binary notation.
CLASS Subnet Network Possible Host Host
 IP Address expressed in dotted quad format (also called
Bit Networks Bits per
dotted decimalnotation), where the address is divided
Network
into four octets. Each octet represents 8 bitsof the A 255.0.0.0 8 126 24 16,777,214
address, and is expressed as a decimal number in the B 255.255.0.0 16 16,384 16 65,534
range of 0 to 255. Dots are used to separate the octets, C 255.255.255.0 24 2,097,152 8 254
as in the example 192.168.1.1.

6
Subnet and Broadcast Addresses
Network Address - the lowest possible number (also called the subnet address, the subnet ID, or IP network address). For
example, if the IP address is 169.254.1.x with a subnet mask of 255.255.255.0, you cannot assign the address 169.254.1.0 to
any specific host, because 169.254.1.0 is reserved as the network ID.

Broadcast Address The highest possible address in the range of available addresses . The broadcast address is used when a host
needs to send a message
to all other hosts on the network. Using the example 169.254.1.x with a subnet mask of 255.255.255.0, the highest possible host ID
is 11111111, or 255 in binary.
Networks Host Bits
Hosts per
Network
The Default Gateway
Every computer in a network is likely to have a default gateway address. This address represents an interface to computers
outside the local subnet. The most common
example is a NIC that connects the subnet to the Internet, as in the example shown in Figure 1-3. There, the address 192.168.100.2
identifies the NIC that connects
the computer to other computers in the local subnet. The IP address 192.168.100.1
identifies the NIC that connects that computer to the Internet (in other words,computers not within the local subnet).
To understand how it works, you first need to be aware that all information sent across the network is divided into packets
(also called frames), each of which contains
the data to be sent, as well as the IP address of the destination. When the NIC is handed a packet, it compares the network portion
of the destination address to the
network portion of its own address. If it determines that the destination address is not the same as its own subnet address, it just
sends the packet to the default
gateway instead. In the example shown in Figure 1-3, the server at the top of the subnet is playing the role of a router, in that it
accepts messages that are intended for a host that’s
not in the current subnet and sends them out through the default gateway. Any Windows 2000 Server computer can play the role of
a router, as you’ll learn later.
The important point to remember for now is that the default gateway address Configure TCP/IP on Servers and Clients 11
FIGURE 1-3

(default gateway)

The default
gateway provides

7
access to
computers
outside the
local subnet.

S-ar putea să vă placă și