[go: up one dir, main page]

0% found this document useful (0 votes)
372 views41 pages

Understanding LAN, MAN, and WAN Basics

This document provides an overview of local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It discusses the CSMA/CD protocol commonly used in Ethernet LANs and describes popular LAN types including token ring networks, FDDI, and Ethernet. It also defines MANs and WANs, and discusses network interconnection components like repeaters, bridges, routers, and gateways. Finally, it provides a brief introduction to the OSI model and IP addressing.

Uploaded by

Sudip Saket
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
372 views41 pages

Understanding LAN, MAN, and WAN Basics

This document provides an overview of local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It discusses the CSMA/CD protocol commonly used in Ethernet LANs and describes popular LAN types including token ring networks, FDDI, and Ethernet. It also defines MANs and WANs, and discusses network interconnection components like repeaters, bridges, routers, and gateways. Finally, it provides a brief introduction to the OSI model and IP addressing.

Uploaded by

Sudip Saket
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

LAN Basics, MANs, WANs

Overview
Computer Networks (continued)

 CSMA/CD
 Types of LANs
 MANs
 WANs
 Network Interconnection Components
 The OSI Model

2
CSMA/CD
 Usually used in a bus topology
 Used in Ethernet LAN’s
 Unlike the token ring, all nodes can send whenever they have
data to transmit
 When a node wants to transmit information, it first “listens” to
the network. If no one is transmitting over the network, the
node begins transmission
 It is however possible for two nodes to transmit simultaneously
thinking that the network is clear
 When two nodes transmit at the same time, a collision occurs
 The first station to detect the collision sends a jam signal into
the network
 Both nodes back off, wait for a random period of time and then
re-transmit

3
CSMA/CD

A B C D

A B C D

A B C D

Collision
4
Types of LANs
 The three most popular types of LANs
are:
 Token ring network
 FDDI (Fiber Distributed Data Interface)
network
 Ethernet

5
Token Ring Network

 Originally developed by IBM in 1970’s


 Still IBM’s primary LAN technology
 In cases of heavy traffic, the token ring
network has higher throughput than
ethernet due to the deterministic (non-
random) nature of the medium access
 Is used in applications in which delay
when sending data must be predictable
 Is a robust network i.e. it is fault
tolerant through fault management
mechanisms
 Can support data rates of around 16
Mbps
 Typically uses twisted pair

6
FDDI (Fiber Distributed Data Interface)
 FDDI is a standard developed by the
American National Standards
Institute (ANSI) for transmitting
data on optical fibers
 Supports transmission rates of up
to 200 Mbps
 Uses a dual ring
 First ring used to carry data at 100
Mbps
 Second ring used for primary
backup in case first ring fails
 If no backup is needed, second ring
can also carry data, increasing the
data rate up to 200 Mbps
Source:[Link]
 Supports up to 1000 nodes
 Has a range of up to 200 km

7
Ethernet
 First network to provide CSMA/CD
 Developed in 1976 by Xerox PARC (Palo Alto
Research Center) in cooperation with DEC and Intel
 Is a fast and reliable network solution
 One of the most widely implemented LAN standards
 Can support data rates in the range of 10Mbps- 10
Gbps
 Used with a bus or star topology

8
Ethernet NIC
 The Network Interface card allows
computers to communicate with each
other through the network
 Each NIC has a 48-bit unique
hexadecimal address called the MAC
address
 A computer or device on a network can
be reached by its MAC address through
the NIC card
 An example of a MAC address:
A1B2C3D4E5F6
 The first 6 hex digits in the MAC
address is the OUI (organizationally
unique identifier), assigned by the IEEE
to each manufacturer (e.g. Cisco, Intel
etc). The rest of the MAC address can
be assigned in any way by the
manufacturer to the individual
networking devices that it manufactures

9
Metropolitan area network
 A Metropolitan Area Network (MAN) is a network that
is utilized across multiple buildings
 Commonly used in school campuses or large
companies with multiple buildings
 Is larger than a LAN, but smaller than a WAN
 Is also used to mean the interconnection of several
LANs by bridging them together. This sort of network
is also referred to as a campus network

10
Wide area network
 A Wide Area Network is a network spanning a large
geographical area of around several hundred miles to across the
globe
 May be privately owned or leased
 Also called “enterprise networks” if they are privately owned by
a large company
 It can be leased through one or several carriers (ISPs-Internet
Service Providers) such as AT&T, Sprint, Cable and Wireless
 Can be connected through cable, fiber or satellite
 Is typically slower and less reliable than a LAN
 Services include internet, frame relay, ATM (Asynchronous
Transfer Mode)

11
Example of WAN application
Sprint
Network

LA
Runs a 100 Mbps LAN

Sprint provisions a connection


between the two networks
DC
Runs a 1Gbps LAN
12
Network Interconnection Components
 Networks can be connected to each other
through several components
 Repeater
 Bridge
 Router
 Gateway
 Before explaining the above components, we
need to understand the OSI model

13
The OSI Model
 The Open Systems Interconnection (OSI) model is a
theoretical framework for understanding and
explaining networking protocols
 Originally an effort by the ISO (International
Standards Organization) to standardize network
protocols
 TCP/IP became the dominant set of standards but
the OSI model is widely used to help understand
protocols
 The OSI model defines 7 layers of functional
communications protocols.

14
The OSI Model
Application Provides a network interface for applications
7 Layer

Presentation Translates data to standard format


6 Layer

5 Session Layer Establishes sessions between computers

4 Transport Layer Provides error control and flow control

3 Network Layer Supports logical addressing and routing

Data Link
2 Interfaces with network adapter
Layer

1 Physical Layer Converts information into transmitted pulses


15
Repeater
 Regenerates and propagates all electrical transmissions
between 2 or more LAN segments
 Allows extension of a network beyond physical length limitations
 Layer 1 of the “OSI model”

Network A Network B

Higher Higher
Layers Layers
Repeater
Physical Physical Physical
16
Bridge
 Connects 2 or more LAN segments and uses data link layer
addresses ([Link] addresses) to make data forwarding
decisions
 Copies frames from one network to the other
 Layer 2 of the “OSI model”
Node in Network A Node in Network B

Higher Higher
Layers Bridge Layers
Data Link Data Link
23-01-88-A8-77-45 Data Link Data Link 53-F1-A4-AB-67-4F

Physical Physical 1 Physical 2 Physical


17
Router
 Connects 2 or more networks and uses network layer addresses
(like IP address) to make data forwarding decisions
 Layer 3 of the “OSI model”

A node in Network A A node in Network B

Higher Higher
Layers Router Layers
Network Network
[Link] [Link]
Network Network
Data Link Data Link Data Link
Data Link
Physical Physical 1 Physical 2 Physical

18
Gateway
 Connects 2 or more networks that can be of different types and
provides protocol conversion so that end devices with dissimilar
protocol architectures can interoperate

[Link]

Netware
Gateway
TCP/IP [Link]

19
IP Addressing

 Numbering scheme

 Largest network of computers

 Internet Assigned Numbers Authority(IANA) and 5 Regional Internet


Registry(RIR)

20
IPv4 structure

 IP addresses consist of four sections

 Each section is 8 bits long

 Each section can range from 0 to 255

 Written, for example, [Link]

21
 These four sections represent the machine itself and the network it is on

 The network portion is assigned.

 The host section is determined by the network administrator


 5 Classes of IP address A B C D and E

 Class A reserved for governments

 Class B reserved for medium companies

 Class C reserved for small companies

 Class D are reserved for multicasting

 Class E are reserved for future use

22
 Class A begins 1 to 126

 Class B begins 128 to 191

 Class C begins 192 to 223

23
Reserved addresses

 Addresses beginning 127 are reserved for loopback and internal testing

 xxx.0.0.0 reserved for network address

 xxx.255.255.255 reserved for broadcast

24
 IP addresses are:

 Unique

 Global and Standardised

 Essential

25
Subnetting - Why?

 Division of local networks

 Greater number of networks

 Simplifies addressing

26
Subnetting - How

 Bits borrowed from host field

Network Network Host Host

Network Network Subnet Host

Network Network Subnet Subnet/Host

27
The Internet Protocol
 Running out!!

 Upgraded to IPv6
VPN
 A technology that creates a network that is physically public, but virtually private.

 VPNs typically require remote users of the network to be authenticated, and often
secure data with encryption technologies to prevent disclosure of private
information to unauthorized parties.

NEED OF VPN

 Employees can access the network (Intranet) from remote locations.


 Secured networks.
 Saves cost tremendously from reduction of equipment and maintenance costs.
 Scalability

29
Virtual Private Networks (VPN)
Basic VPN Architecture

30
Types of VPNs
 Remote access VPN
 Intranet VPN
 Extranet VPN

31
TUNNELING

32
What is Tunneling ?

 Virtual private network technology is based on the idea of tunneling.

 VPN tunneling involves establishing and maintaining a logical network


connection .

 Tunneling is the process of placing an entire packet within another packet


before it's transported over the Internet.

 That outer packet protects the contents from public view and ensures that
the packet moves within a virtual tunnel.

33
VPN Tunneling Protocols

 Point-to-Point Tunneling Protocol (PPTP)

 Layer Two Tunneling Protocol (L2TP)

 Internet Protocol Security (IPsec)

34
Point-to-Point Tunneling Protocol (PPTP)

 It’s the most widely supported VPN method among Windows users
and it was created by Microsoft in association with other technology
companies.

 Compared to other methods, PPTP is faster and it is also available


for Linux and Mac users. .

 Voluntary tunneling method.

35
Layer Two Tunneling Protocol (L2TP)

It’s another tunneling protocol that supports VPNs.

The difference between PPTP and L2TP is that the second one provides not only data
confidentiality but also data integrity.

L2TP was developed by Microsoft and Cisco as a combination between PPTP and
L2F(Layer 2 Forwarding).

36
Internet Protocol Security (IPSec)

IPsec is actually a collection of multiple related protocols.

It can be used as a complete VPN protocol solution or simply as the


encryption scheme within L2TP or PPTP.

IPsec exists at the network layer (Layer Three) of the OSI model.

37
What is Encryption?

Encryption is the process of encoding data so that only a computer with the
right decoder will be able to read and use it.

The VPN client at each end of the tunnel encrypt the data entering the
tunnel and decrypt it at the other end .

Types Of Encryption

1. Symmetric-key encryption
2 . public-key Encryption

38
How encryption and decryption takes
place?

39
VPN ADVANTAGES
 Security -- The VPN should protect data while it's traveling on the public network.
If intruders attempt to capture the data, they should be unable to read or use it.
 Reliability -- Employees and remote offices should be able to connect to the VPN
with no trouble at any time (unless hours are restricted), and the VPN should
provide the same quality of connection for each user even when it is handling its
maximum number of simultaneous connections.
 Cost Savings
 Eliminating the need for expensive long-distance leased lines
 Reducing the long-distance telephone charges for remote access.
 Transferring the support burden to the service providers
 Operational costs
 Scalability
 Flexibility of growth
 Efficiency with broadband technology

40
Disadvantages of VPN

VPNs require detailed understanding of network security issues and careful


installation / configuration to ensure sufficient protection on a public network
like the Internet.

The reliability and performance of an Internet-based VPN is not under an


organization's direct control. Instead, the solution relies on an ISP and their
quality of service.

VPN products and solutions from different vendors have not always been
compatible due to issues with VPN technology standards. Attempting to mix
and match equipment may cause technical problems, and using equipment
from one provider may not give as great a cost savings.

41

You might also like