Sie sind auf Seite 1von 25

Local Area Networks

5/20/2015

Introduction
Each dayy computer
p
users use their computer
p
for
sending and retrieving email, scheduling
meetings, sharing files, preparing reports,
exchanging
g g images,
g , and maybe
y checking
g the
current price of an auction item on the Internet.
All of this requires computers to access multiple
networks and share their resources
resources.
The multiple networks required to accomplish
this are the local area network (LAN), the
campus area networkk (CAN)
(CAN), the
h metropolitan
li
area network (MAN), and the wide area network
((WAN).
)
5/20/2015

Introduction
The ease of connecting to the Internet and the dramatic
decrease in computer systems cost, have led to an
explosion in their usage
usage.
Organizations such as corporations, colleges, and
government agencies have acquired large numbers of
single-user
single
user computer systems.
These systems may be dedicated to word processing,
scientific computation, process control, or may be
general-purpose
g
p p
computers
p
that p
perform many
y tasks.
This has generated a need to interconnect these locally
distributed computer networks.
The network commonly used to accomplish this
interconnection is called a local area network (LAN),
which is a network of users that share computer
resources in a limited area.
5/20/2015

Local Area Networks (LANs)


(
)
LANs emerged in the late 1980s as the most important
means of conveying data between different computers
and
d computer
t peripheral
i h ld
devices
i
((printer,
i t fil
file
server,electronic mail server, fax gateway, host
gateway, computer printer, scanner, etc.)within a
single office, office building, or small campus.
They were originally designed as shared media (layer
2 or datalink communications media) and are ideally
suited for relatively short distance, high speed data
transport and have thus become the foundation for
modern electronic
electronic officesinterconnecting
offices interconnecting
workstations, word processors, shared printers, file
servers, email systems, web servers and so on.
5/20/2015

LAN topologies and standards


The three most common LAN topologies
p g
are the star,, ring
g
and bus topologies.

5/20/2015

Figur 1. Alternative LAN topologies

Token Ring Topology


In this topology, a token
( h
(shown
as a T) is
i placed
l
d iin th
the
data channel and circulates
around the ring,
g hence the
name token-ring.
If a user wants to transmit, the
computer waits until it has
control of the token.
This technique is called token
passing
i and
d iis b
based
d on th
the
IEEE 802.5 Token-Ring
Network standard
5/20/2015

Disadvantage of the token-ring system


If an error changes the token pattern, it can
cause the token to stop circulating.
A failed station can cause data traffic to cease.
The token-ring path must be temporarily broken
(path interrupted) if a computer or any device
connected to the network is to be removed or
added to the network.
A fix to this is to attach all the computers to a
central token-ring hub.
Such a device manages
g the p
passing
g of the token
rather than relying on individual computers to
pass it, which improves the reliability of the
network.
5/20/2015

Bus topology
The computers share the
media (coaxial cable) for
data transmission. In this
topology, a coaxial cable
( ll d ThinNet)
(called
Thi N t) is
i llooped
d
through each networking
device to facilitate data
transfer.
However, in a bus system, all networking devices will see
computer 1s data traffic to the printer
printer, and the other devices
must wait for pauses in transmission or until it is complete
before they can initiate their own transmission.
The use of a shared coaxial cable in a bus topology prevents
5/20/2015
8
data
transmission from being very bandwidth-efficient.

Star topology
The most common
networking topology
in todays LANs.
At the center of a star
network is either a
switch or a hub. This
connects the network
devices and facilitates
the transfer of data.
5/20/2015

Star Topology
Similar to the bus topology in that all data traffic on the
LAN is being seen by all computers.
The fact that the hub broadcasts all data traffic to the
devices connected to its network ports makes these
devices of limited use in large networks, but hubs are
sometimes still used in small
small, slower-speed LANs
LANs.
To minimize unnecessary data traffic and isolate
sections of the network, a switch can be used at the
center of a star net
network.
ork
A switch stores the hardware or physical address for
each device connected to its ports.
The storage of the address enables the switch to directly
connect two communicating devices without
g the data to all devices connected to its
broadcasting
ports.
5/20/2015

10

mesh topology
All networking devices
are directly connected to
each other.
This provides for full
redundancyy in the
network data paths but at
a cost.
This topology can be
suitable for high-reliability
applications but can be
too costly for general
networking applications.

5/20/2015

11

The Ethernet LAN


The networking protocol used in most modern computer
networks is Ethernet, a CSMA/CD protocol for local area
networks.
CSMA/CD stands for carrier sense multiple access with
collision detection.
There is a chance that two or more computers will
attempt to broadcast a message at the same time;
therefore, Ethernet systems must have the capability to
detect data collisions (collision detection)
detection).
The information in an Ethernet network is exchanged in
a packet format.
The packet provides grouping of the information for
transmission that includes the header, the data, and the
trailer.
5/20/2015

12

The data structure for the Ethernet frame

How are the destination and source addresses


for the data determined within a LAN?
MAC stands for media access control. The MAC
address is 6 bytes, or 48 bits, in length.
The address is displayed in 12 hexadecimal digits. The
first 6 digits are used to indicate the vendor of the
network interface
interface, also called the organizationally
unique identifier (OUI), and the last 6 numbers form a
unique value for each NIC assigned by the vendor.
5/20/2015

13

5/20/2015

14

IP (Internet Protocol) Addressing


IP addressing provides a solution to worldwide
addressing through incorporating a unique
address that identifies the computer
computers
s local
network.
IP network numbers are assigned by IANA
(Internet Assigned Numbers Authority).
IP addresses are classified as either IPv4 or
IPv6.
The major difference between IPv4 and IPv6 is
the number of IP addresses.
addresses There are just over
4 billion IPv4 addresses. In contrast, there are
over 16 billion-billion IPv6 addresses.
5/20/2015

15

Basic comparison between IPv4 and IPv6

5/20/2015

16

The Classes of IPv4 Networks

The Address Range for Each Class of Network

5/20/2015

Cat. Hal 41

17

Assembling a home network


Do I want to set up a wired or wireless home
network?
Th following
The
f ll i are advantages
d
t
off a wired
i d network:
t
k
Faster network data transfer speeds (within the LAN).
Relatively inexpensive to setup
setup.
The network is not susceptible to outside interference.
The following are disadvantages of the wired network:
The cable connections typically require the use of
specialized tools.
The cable installation can be labor-intensive and
expensive
expensive.
5/20/2015

18

Assembling a home network Cont.


The advantages of a wireless network are many
including
g the following:
g
User mobility
Simple installations
No cables
Di d
Disadvantages
t
off a wireless
i l
network
t
k can iinclude
l d :
Security issues.
The data transfer speed within the LAN can
be slower than wired networks.
5/20/2015

19

Wireless (Wi Fi)


The most common wireless standards include :
802
802.11a
11a (Wireless
(Wireless-A)This
A) This standard can provide data
transfer rates up to 54 Mbps and an operating range up
to 75 feet. It operates at 5GHz.
802.11b
802 11b (Wireless-B)This
(Wi l
B) Thi standard
t d d can provide
id d
data
t
transfer rates up to 11 Mbps with ranges of 100 to 150
feet. It operates at 2.4 GHz.
802.11g (Wireless-G)This standard can provide data
transfer rates up to 54 Mbps up to 150 feet. It operates
at 2.4
2 4 GHz
GHz.
802.11n (Wireless-N)This is the next generation of
high-speed wireless connectivity promising data transfer
rates
t up to
t 4 802.11g
802 11 speeds
d (200+Mb
(200+Mbps).
) It operates
t
at 2.4 GHz.
5/20/2015
20

An example of a (a) wired and (b) wireless WiFi home network


5/20/2015

21

The components of a home network can include


the following:
HubThis is used to interconnect networking devices.
SwitchThis
S it h Thi is
i the
th b
bestt choice
h i ffor iinterconnecting
t
ti
networking devices.
Network AdapterWired
Adapter Wired and wireless network
adapters are available. The type of network adapter
used in desktop computers is called the Network
Interface Card (NIC).
(NIC)
RouterA networking device used to connect two or
more networks ((for example,
p , yyour LAN and the Internet))
using a single connection to your ISP.
Access PointUsed to interconnect wireless devices
and provide a connection to the wired LAN
LAN.
5/20/2015

22

The components of a home network can include


th ffollowing:
the
ll i
Wireless routerThis device uses RF to connect to the
networking
g devices. A wireless router typically
yp
y contains a
router, switch, and a wireless access point and is
probably the most common way to interconnect wireless
LANs to the ISPs access device.
Broadband Modem/GatewayThis describes the
device used to provide high-speed data access via your
cable connection or via a telephone companys
company s DSL
connection.
Cable ModemThis device is used to make a
broadband network connection from your home network
to the ISP using your cable connection.

5/20/2015

23

Several issues should be considered when planning


f a home
for
h
network,
t
k including
i l di th
the ffollowing:
ll i
Data speedThis
p
will be determined byy whether yyou
chose to implement a wired or wireless home network.
CostImplementing a high-speed wired network can be
quite
it expensive.
i
Ease of implementationA wireless home network is
probably the easiest to implement if the cabling and
connectors for a wired network are not already installed.

Appearance

5/20/2015

24

Reference :
Jeffrey S
S. Beasley
Beasley, Networking
Networking ,
Second Edition, Prentice Hall, 2008.

5/20/2015

25

Das könnte Ihnen auch gefallen