DCCChapter 5
DCCChapter 5
DCCChapter 5
Chapter Five
Local Area Network (LAN): Local Area Network (LAN) is a computer network, which is
limited to a small office, single building, multiple buildings inside a campus etc. Typically a
Local Area Network (LAN) is a private network owned and maintained by a single organization.
LAN Topologies
Topology is the physical and logical arrangement of a network. The physical arrangement of
the network refers to how the workstations, servers, and other equipment are joined together with
cables and connectors. The logical arrangement of a network refers to how the workstations,
servers, and other equipment relate to each other in terms of traffic flow.
There are three primary LAN topologies: linear bus, ring, and star. Another network topology is
hierarchical in nature, which may incorporate elements of the bus, ring, and star. The appropriate
physical and logical topology for a LAN is determined by reliability and cost objectives as well
as by the connectivity requirements of users.
1. Bus Topology
2. Star Topology
3. Ring Topology
1
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
In a linear bus topology, stations are arranged along a single length of cable, which can
be extended at either end or at both ends to accommodate more nodes. The network
consists of coaxial cable, such as the RG-58 cable used with 10Base2 Ethernet LANs.
The nodes are attached to the cable with a BNC (Bayonet Nut Connector) T-connector,
the stem of which attaches to the network interface card (NIC). A BNC barrel connector
attaches cable segments and a BNC terminator connector caps the cable ends. Of course,
twisted pair wiring is most often used for Ethernet LANs, in which case RJ45 connectors
provide the connections between devices.
The physical bus topology is the simplest and most widely used of the network designs. It
consists of one continuous length of cabling (trunk) and a terminating resistor
(terminator) at each end. The data communications message travels along the bus in both
directions until it is picked up by a workstation or server NIC.
With the Bus topology, all workstations are connect directly to the main backbone that
carries the data. Traffic generated by any computer will travel across the backbone and be
received by all workstations. This works well in a small network of 2-5 computers, but as
the number of computers increases so will the network traffic and this can greatly
decrease the performance and available bandwidth of your network.
All nodes in the bus topology have equal access to the trunk – no discriminating here. This is
accomplished using short drop cables or direct T-connectors.
This design is easy to install because the backbone trunk traverses the LAN as one cable
segment. This minimizes the amount of transmission media required. Also, the number of
devices and length of the trunk can be easily expanded.
2
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
1. The bus networks are difficult to reconfigure, especially when the acceptable number of
connections or maximum distances have been reached.
2. They are also difficult to troubleshoot because everything happens on a single medium
segment. This can have dangerous consequences because any break in the cabling brings
the network to its knees.
Star topology uses a central controlling hub with dedicated legs pointing in all directions
– like points of a star. Each network devices has a dedicated point-to-point link to the
central hub. This strategy prevents troublesome collisions and keeps the line of
communication open and free of traffic.
The Star or Hub topology is one of the most common network topologies found in most
offices and home networks. It has become very popular in contrast to the bus type (which
we just spoke about), because of the cost and the ease of troubleshooting.
Star topologies are somewhat difficult to install because each device gets its own
dedicated segment. Obviously, they require a great deal of cabling. This design provides
an excellent platform for reconfiguration and troubleshooting.
Changes to the network are as simple as plugging another segment into the hub. In
addition, a break in the LAN is easy to isolate and doesn’t affect the rest of the network.
A classic example of this type of topology is the UTP (10 base T), which normally has a
blue color.
3
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
In a ring topology, nodes are arranged along the transmission path so data passes through
each successive station before returning to its point of origin.
In token-ring LANs, a small packet called a token is circulated around the ring, giving
each station in sequence a chance to put information on the network. The station seizes
the token, replacing it with an information frame. Only the addressee can claim the
message. At the completion of pass through the central node, which acts as a processing
and coordinating point for the network. This central node is generally referred to as a
hub. Information addressed to one or more specific nodes is sent through the central node
and switched to the proper receiving station(s) over a dedicated physical path.
On a larger scale, multiple LANs can be connected to each other in a ring topology by
using Thick net coaxial or fiber-optic cable.
The method by which the data is transmitted around the ring is called token passing.
A token is a special series of bits that contains control information. Possession of the
token allows a network device to transmit data to the network. Each network has only one
token.
1. They are very easy to troubleshoot because each device incorporates a repeater.
2. A special internal feature called becoming, allows the troubled workstation to identify
themselves quickly.
LAN Technologies
Ethernet. Fast-Ethernet
Token Ring FDDI (Fiber Distributed Data
Giga-Ethernet Interface)
Ethernet
Ethernet is a widely deployed LAN technology. This technology was invented by Bob
Metcalfe and D.R. Boggs in the year 1970. It was standardized in IEEE 802.3 in 1980.
Ethernet shares media. Network which uses shared media has high probability of data
collision. Ethernet uses Carrier Sense Multi Access/Collision Detection (CSMA/CD)
technology to detect collisions. On the occurrence of collision in Ethernet, all its hosts
roll back, wait for some random amount of time, and then re-transmit the data.
Ethernet connector is, network interface card equipped with 48-bits MAC address. This
helps other Ethernet devices to identify and communicate with remote devices in
Ethernet.
Traditional Ethernet uses 10BASE-T specifications. The number 10 depicts 10MBPS
speed, BASE stands for baseband, and T stands for Thick Ethernet. 10BASE-T Ethernet
provides transmission speed up to 10MBPS and uses coaxial cable or Cat-5 twisted pair
cable with RJ-45 connector. Ethernet follows star topology with segment length up to 100
meters. All devices are connected to a hub/switch in a star fashion.
It is also the standard by which we base all other technologies in regards to performance,
price and delivery.
Ethernet speeds
Originally 3Mbps
Current standard is 10Mbps
Fast Ethernet operates at 100Mbps
Ethernet operation
5
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Token ring
Based on the token passing method developed by IBM. Token Ring controls the medium
by passing a control frame (token) from one device to the next. Only the computer
possessing the token may transmit.
Many LAN technologies that use ring topology use token passing for synchronized
access to the ring.
Ring itself is treated as a single, shared communication medium
Bits pass from transmitter, past other computers and are copied by destination
Hardware must be designed to pass token even if attached computer is powered down
FDDI
FDDI uses the same topology as the IBM Token Ring. But instead of one ring, FDDI uses a dual
ring topology, which comprised of two counter-rotating rings. The traffic of these rings’ travels
in an opposite directions.
One of the two rings is a primary ring, and the other is called the secondary ring. Primary ring is
used for data transmission while the secondary rings mostly used as a backup ring. There are two
different stations that can be attached to the FDDI ring. A class A or single-attachment stations
(SAS) attach to only one ring (the primary ring). A class B or dual-attachment stations (DAS)
attach to both rings.
Port A: where the data from the primary ring comes in and the data from the secondary
ring exits (if secondary ring was in use), and
Port B: where the data from the primary ring exits and the data from the secondary ring
comes in (if primary ring was in use).
Here is an example of a basic FDDI Ring:
7
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Fast-Ethernet
Giga-Ethernet
After being introduced in 1995, Fast-Ethernet could enjoy its high speed status only for 3
years till Giga-Ethernet introduced. Giga-Ethernet provides speed up to 1000Mbps
IEEE802.3ab standardize Giga-Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables.
IEEE802.3ah defines Giga-Ethernet over Fiber.
Wide Area Network (WAN): A Wide Area Network (WAN) spans over multiple
geographic locations, which is composed of multiple LANs. It is nearly impossible for a
small to medium organization (except Network Service Providers) to pull network cables
between their two offices in two different countries located 1000s of kilometers away.
Network Service Providers (also called as ISPs) provide the connectivity solutions for
Wide Area Networks (WAN).
A wide area network (WAN) is a network that exists over a large-scale geographical area.
A WAN connects different smaller networks, including local area networks (LANs) and
metro area networks (MANs). This ensures that computers and users in one location can
communicate with computers and users in other locations. WAN implementation can be
done either with the help of the public transmission system or a private network.
8
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
A WAN works in a similar fashion to a LAN, just on a larger scale. Typically, TCP/IP is
the protocol used for a WAN in combination with devices such as routers, switches,
firewalls and modems.
Below image shows two Local Area Networks (LANs), located at two different
geographical locations connected via Internet to create a Wide Area Network (WAN).
LAN 1 is located in Chennai, India and LAN 2 is located in Manila, Philippines. The
distance between Chennai and Manila is about 4,400 Kilometers. It is almost impossible
for a small to medium business to draw cables between Chennai and Manila. We
normally avail the services of an Internet Service Provider for connectivity between these
two offices.
WAN Technologies
VPN (Virtual Private Network) Definition: VPN meaning that it is a private point-to-
point connection between two machines or networks over a shared or public network
such as the internet.
A VPN client uses TCP/IP protocol, that is called tunneling protocols, to make a virtual
call to VPN server.
There are three network protocols are used within VPN tunnels. This are:
IPsec: IPsec (Internet Protocol Security) is a framework for uses cryptographic security
services developed by the Internet Engineering Task Force (IETF) to protect secure
exchange communications over Internet Protocol (IP).It supported encryption modes are
transport and tunnel.
PPTP: PPTP (Point-to-Point Tunneling Protocol) is a network protocol that extending
the organization private networks over the public Internet via "tunnels.
L2TP: L2TP (Layer Two Tunneling Protocol) is an extension of the Point-to-Point
Tunneling Protocol (PPTP) used by Internet service providers (ISPs) to operate Virtual
Private Networks (VPNs).
Benefits of VPN
The main benefit of a VPN is the potential for significant cost savings compared to traditional
leased lines or dial up networking. These savings come with a certain (in amount of risk,
however, particularly when using the public Internet as the delivery mechanism for VPN data.
10
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Frame Relay
o Frame Relay is a scalable wide area network solution which makes use of packet-mode
transmission.
o Frame Relay allows for a single serial interface on the router to connect multiple remote
sites with the help of virtual circuits. Although Frame Relay is popular due to its
relatively inexpensive nature, it is being replaced in many areas by other faster
technologies such as asynchronous transfer mode.
o Initially designed for transportation across an integrated services digital network
infrastructure, Frame Relay places data in a variable unit known as a frame. Configuring
user equipment in a Frame Relay network is extremely simple. The connection-oriented
link-layer service provided by Frame Relay has properties like non-duplication of frames,
preservation of the frame transfer order and small probability of frame loss.
o The features provided by Frame Relay make it one of the best choices for interconnecting
local area networks using a wide area network. However the drawback in this method is
that it becomes prohibitively expensive with growth of the network.
There are certain benefits which are associated with Frame Relay.
11
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
In business scenarios, where there is a slow connection or continuous traffic flow due to
applications like multimedia, Frame Relay is not a recommended choice.
Differences between Local Area Networks (LANs) and Wide Area Network (WAN)
A LAN is a private computer network that connects computers in small physical areas.
Example: A small office, A Single building, multiple buildings inside a campus etc.
WAN is type of computer network to connect offices which are located in different
geographical locations. WAN depends mainly on Internet Service Providers (ISPs) for
connection solutions.
LAN has higher bandwidth rates. Current LANs runs on bandwidths of 100 Mbps, 1
Gbps or 10 Gbps. WAN has lower bandwidth rates compared with LAN. Current Wide
Area Networks runs on bandwidths of 4 Mbps, 8 Mbps, 20 Mbps, 50 Mbps or 100 Mbps.
LAN bandwidth rates are almost constant. LAN bandwidth rates are dependent on
characteristics of the LAN technology in use (Normally Fast Ethernet or Gigabit
12
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.
Wolkite University College of Computing and Informatics Department of IT
Ethernet). Since most of WAN connectivity solutions are dependent on Internet Service
Providers (ISPs), budget related constraints affect the quality of WAN.
Most of the current Local Area Networks (LANs) use Ethernet as the LAN Standard
(Fast Ethernet 100 Mbps, or Gigabit Ethernet 1/10 Gbps). WAN uses technologies like
VPN (Virtual Private Network) over Internet, MPLS, Frame Relay, or Leased Lines as
WAN connectivity solutions.
Since LANs are private networks, managed by dedicated local network administrators,
LANs are more reliable and secure than WANs. Since WANs involve 3rd party service
providers, WAN networks are less reliable and secure.
Initial set-up costs for LANs are low as the devices required to set up the networks are
cheap. Initial set-up costs for WANs are high, because of the devices (Routers, Firewalls
etc.), cables and manpower required.
LANs running costs are less WANs running costs are high. WANs normally have
recurring monthly cost as Service Provider access fees.
WANs are more congested than LANs.
13
DC&CN Chapter 5 Lecture Note Prepared by Abraham A.