LAN Basics, MANs, WANs
Overview
Computer Networks (continued)
CSMA/CD
Types of LANs
MANs
WANs
Network Interconnection Components
The OSI Model
2
CSMA/CD
Usually used in a bus topology
Used in Ethernet LAN’s
Unlike the token ring, all nodes can send whenever they have
data to transmit
When a node wants to transmit information, it first “listens” to
the network. If no one is transmitting over the network, the
node begins transmission
It is however possible for two nodes to transmit simultaneously
thinking that the network is clear
When two nodes transmit at the same time, a collision occurs
The first station to detect the collision sends a jam signal into
the network
Both nodes back off, wait for a random period of time and then
re-transmit
3
CSMA/CD
A B C D
A B C D
A B C D
Collision
4
Types of LANs
The three most popular types of LANs
are:
Token ring network
FDDI (Fiber Distributed Data Interface)
network
Ethernet
5
Token Ring Network
Originally developed by IBM in 1970’s
Still IBM’s primary LAN technology
In cases of heavy traffic, the token ring
network has higher throughput than
ethernet due to the deterministic (non-
random) nature of the medium access
Is used in applications in which delay
when sending data must be predictable
Is a robust network i.e. it is fault
tolerant through fault management
mechanisms
Can support data rates of around 16
Mbps
Typically uses twisted pair
6
FDDI (Fiber Distributed Data Interface)
FDDI is a standard developed by the
American National Standards
Institute (ANSI) for transmitting
data on optical fibers
Supports transmission rates of up
to 200 Mbps
Uses a dual ring
First ring used to carry data at 100
Mbps
Second ring used for primary
backup in case first ring fails
If no backup is needed, second ring
can also carry data, increasing the
data rate up to 200 Mbps
Source:[Link]
Supports up to 1000 nodes
Has a range of up to 200 km
7
Ethernet
First network to provide CSMA/CD
Developed in 1976 by Xerox PARC (Palo Alto
Research Center) in cooperation with DEC and Intel
Is a fast and reliable network solution
One of the most widely implemented LAN standards
Can support data rates in the range of 10Mbps- 10
Gbps
Used with a bus or star topology
8
Ethernet NIC
The Network Interface card allows
computers to communicate with each
other through the network
Each NIC has a 48-bit unique
hexadecimal address called the MAC
address
A computer or device on a network can
be reached by its MAC address through
the NIC card
An example of a MAC address:
A1B2C3D4E5F6
The first 6 hex digits in the MAC
address is the OUI (organizationally
unique identifier), assigned by the IEEE
to each manufacturer (e.g. Cisco, Intel
etc). The rest of the MAC address can
be assigned in any way by the
manufacturer to the individual
networking devices that it manufactures
9
Metropolitan area network
A Metropolitan Area Network (MAN) is a network that
is utilized across multiple buildings
Commonly used in school campuses or large
companies with multiple buildings
Is larger than a LAN, but smaller than a WAN
Is also used to mean the interconnection of several
LANs by bridging them together. This sort of network
is also referred to as a campus network
10
Wide area network
A Wide Area Network is a network spanning a large
geographical area of around several hundred miles to across the
globe
May be privately owned or leased
Also called “enterprise networks” if they are privately owned by
a large company
It can be leased through one or several carriers (ISPs-Internet
Service Providers) such as AT&T, Sprint, Cable and Wireless
Can be connected through cable, fiber or satellite
Is typically slower and less reliable than a LAN
Services include internet, frame relay, ATM (Asynchronous
Transfer Mode)
11
Example of WAN application
Sprint
Network
LA
Runs a 100 Mbps LAN
Sprint provisions a connection
between the two networks
DC
Runs a 1Gbps LAN
12
Network Interconnection Components
Networks can be connected to each other
through several components
Repeater
Bridge
Router
Gateway
Before explaining the above components, we
need to understand the OSI model
13
The OSI Model
The Open Systems Interconnection (OSI) model is a
theoretical framework for understanding and
explaining networking protocols
Originally an effort by the ISO (International
Standards Organization) to standardize network
protocols
TCP/IP became the dominant set of standards but
the OSI model is widely used to help understand
protocols
The OSI model defines 7 layers of functional
communications protocols.
14
The OSI Model
Application Provides a network interface for applications
7 Layer
Presentation Translates data to standard format
6 Layer
5 Session Layer Establishes sessions between computers
4 Transport Layer Provides error control and flow control
3 Network Layer Supports logical addressing and routing
Data Link
2 Interfaces with network adapter
Layer
1 Physical Layer Converts information into transmitted pulses
15
Repeater
Regenerates and propagates all electrical transmissions
between 2 or more LAN segments
Allows extension of a network beyond physical length limitations
Layer 1 of the “OSI model”
Network A Network B
Higher Higher
Layers Layers
Repeater
Physical Physical Physical
16
Bridge
Connects 2 or more LAN segments and uses data link layer
addresses ([Link] addresses) to make data forwarding
decisions
Copies frames from one network to the other
Layer 2 of the “OSI model”
Node in Network A Node in Network B
Higher Higher
Layers Bridge Layers
Data Link Data Link
23-01-88-A8-77-45 Data Link Data Link 53-F1-A4-AB-67-4F
Physical Physical 1 Physical 2 Physical
17
Router
Connects 2 or more networks and uses network layer addresses
(like IP address) to make data forwarding decisions
Layer 3 of the “OSI model”
A node in Network A A node in Network B
Higher Higher
Layers Router Layers
Network Network
[Link] [Link]
Network Network
Data Link Data Link Data Link
Data Link
Physical Physical 1 Physical 2 Physical
18
Gateway
Connects 2 or more networks that can be of different types and
provides protocol conversion so that end devices with dissimilar
protocol architectures can interoperate
[Link]
Netware
Gateway
TCP/IP [Link]
19
IP Addressing
Numbering scheme
Largest network of computers
Internet Assigned Numbers Authority(IANA) and 5 Regional Internet
Registry(RIR)
20
IPv4 structure
IP addresses consist of four sections
Each section is 8 bits long
Each section can range from 0 to 255
Written, for example, [Link]
21
These four sections represent the machine itself and the network it is on
The network portion is assigned.
The host section is determined by the network administrator
5 Classes of IP address A B C D and E
Class A reserved for governments
Class B reserved for medium companies
Class C reserved for small companies
Class D are reserved for multicasting
Class E are reserved for future use
22
Class A begins 1 to 126
Class B begins 128 to 191
Class C begins 192 to 223
23
Reserved addresses
Addresses beginning 127 are reserved for loopback and internal testing
xxx.0.0.0 reserved for network address
xxx.255.255.255 reserved for broadcast
24
IP addresses are:
Unique
Global and Standardised
Essential
25
Subnetting - Why?
Division of local networks
Greater number of networks
Simplifies addressing
26
Subnetting - How
Bits borrowed from host field
Network Network Host Host
Network Network Subnet Host
Network Network Subnet Subnet/Host
27
The Internet Protocol
Running out!!
Upgraded to IPv6
VPN
A technology that creates a network that is physically public, but virtually private.
VPNs typically require remote users of the network to be authenticated, and often
secure data with encryption technologies to prevent disclosure of private
information to unauthorized parties.
NEED OF VPN
Employees can access the network (Intranet) from remote locations.
Secured networks.
Saves cost tremendously from reduction of equipment and maintenance costs.
Scalability
29
Virtual Private Networks (VPN)
Basic VPN Architecture
30
Types of VPNs
Remote access VPN
Intranet VPN
Extranet VPN
31
TUNNELING
32
What is Tunneling ?
Virtual private network technology is based on the idea of tunneling.
VPN tunneling involves establishing and maintaining a logical network
connection .
Tunneling is the process of placing an entire packet within another packet
before it's transported over the Internet.
That outer packet protects the contents from public view and ensures that
the packet moves within a virtual tunnel.
33
VPN Tunneling Protocols
Point-to-Point Tunneling Protocol (PPTP)
Layer Two Tunneling Protocol (L2TP)
Internet Protocol Security (IPsec)
34
Point-to-Point Tunneling Protocol (PPTP)
It’s the most widely supported VPN method among Windows users
and it was created by Microsoft in association with other technology
companies.
Compared to other methods, PPTP is faster and it is also available
for Linux and Mac users. .
Voluntary tunneling method.
35
Layer Two Tunneling Protocol (L2TP)
It’s another tunneling protocol that supports VPNs.
The difference between PPTP and L2TP is that the second one provides not only data
confidentiality but also data integrity.
L2TP was developed by Microsoft and Cisco as a combination between PPTP and
L2F(Layer 2 Forwarding).
36
Internet Protocol Security (IPSec)
IPsec is actually a collection of multiple related protocols.
It can be used as a complete VPN protocol solution or simply as the
encryption scheme within L2TP or PPTP.
IPsec exists at the network layer (Layer Three) of the OSI model.
37
What is Encryption?
Encryption is the process of encoding data so that only a computer with the
right decoder will be able to read and use it.
The VPN client at each end of the tunnel encrypt the data entering the
tunnel and decrypt it at the other end .
Types Of Encryption
1. Symmetric-key encryption
2 . public-key Encryption
38
How encryption and decryption takes
place?
39
VPN ADVANTAGES
Security -- The VPN should protect data while it's traveling on the public network.
If intruders attempt to capture the data, they should be unable to read or use it.
Reliability -- Employees and remote offices should be able to connect to the VPN
with no trouble at any time (unless hours are restricted), and the VPN should
provide the same quality of connection for each user even when it is handling its
maximum number of simultaneous connections.
Cost Savings
Eliminating the need for expensive long-distance leased lines
Reducing the long-distance telephone charges for remote access.
Transferring the support burden to the service providers
Operational costs
Scalability
Flexibility of growth
Efficiency with broadband technology
40
Disadvantages of VPN
VPNs require detailed understanding of network security issues and careful
installation / configuration to ensure sufficient protection on a public network
like the Internet.
The reliability and performance of an Internet-based VPN is not under an
organization's direct control. Instead, the solution relies on an ISP and their
quality of service.
VPN products and solutions from different vendors have not always been
compatible due to issues with VPN technology standards. Attempting to mix
and match equipment may cause technical problems, and using equipment
from one provider may not give as great a cost savings.
41