Fundamentals of LAN and WAN

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 28

Chapter 4

Fundamentals
Of
LAN and WAN

Confidential
Chapter Objectives

At the end of this Chapter you will be able to:


 Understand what is Ethernet LAN
 Identify types of Ethernet LAN
 Understand Ethernet addressing
 Define broadcast and collision domains
 Identify cable types
 Explain Ethernet UTP Cabling
 Understand basic concepts of WAN

Confidential
Ethernet Networking

 Ethernet is a contention media access method that allows all hosts


on a network to share the same bandwidth of a link. Ethernet is
popular because it’s readily scalable, meaning that it’s
comparatively easy to integrate new technologies, such as Fast
Ethernet and Gigabit Ethernet, into an existing network
infrastructure. It’s also relatively simple to implement in the first
place, and with it, troubleshooting is reasonably straightforward.
Ethernet uses both Data Link and Physical layer specifications.

Confidential
Some Ethernet Specifications

Confidential
Media Access

 Ethernet networking uses Carrier Sense Multiple Access with


Collision Detection (CSMA/CD), a protocol that helps devices share
the bandwidth evenly without having two devices transmit at the same
time on the network medium. CSMA/CD was created to overcome the
problem of those collisions that occur when packets are transmitted
simultaneously from different nodes.
 Basically, the CSMA/CD algorithm can be summarized as follows:
 A device that wants to send a frame waits until the LAN is silent—in
other words, no frames are currently being sent—before attempting to
send an electrical signal.
 If a collision still occurs, the devices that caused the collision wait a
random amount of time and then try again.
Confidential
Ethernet at the Data Link Layer

 Ethernet at the Data Link layer is responsible for Ethernet


addressing, commonly referred to as hardware addressing or MAC
addressing.

Ethernet Addressing

24 bits 24 bits

Vendor ID Adaptor ID

Ethernet Addressing Scheme

Confidential
Broadcast Domain & Collision Domain

Broadcast Domain
 A broadcast domain is a logical division of a computer network in
which all nodes can reach each other by broadcast at the data link
layer.
 In terms of current popular technologies: Any computer connected
to the same Ethernet Repeater or Switch is a member of the same
broadcast domain. Further, any computer connected to the same
set of inter-connected switches/repeaters is a member of the same
broadcast domain.

Confidential
Collision Domain

 A Collision domain is a logical network Segment where data


packets can "collide" with one another for being sent on a shared
medium, in particular in the Ethernet networking protocol. This is an
Ethernet term used to describe a network scenario wherein one
particular device sends a packet on a network segment, forcing
every other device on that same segment to pay attention to it.
 Collisions decrease network efficiency; if two devices transmit
simultaneously, a collision occurs, and both devices must retransmit
at a later time.

Confidential
Ethernet at the Physical Layer

Ethernet Physical layer Specifications

Confidential
 10Base2 10Mbps, baseband technology, up to 185 meters in
length:
It is known as thinnet and can support up to 30 workstations on a
single segment.  
 10Base5 10Mbps, baseband technology, up to 500 meters in
length
It is known as thicknet. It uses a physical and logical bus with AUI
connectors. Up to 2,500 meters with repeaters and 1,024 users for all
segments.

Confidential
 10BaseT 10Mbps using category 3 UTP wiring
Unlike with the 10Base2 and 10Base5 networks, each device must
connect into a hub or switch, and you can have only one host per
segment or wire
Here are the expanded IEEE Ethernet 802.3 standards:
 100BaseTX (IEEE 802.3u): EIA/TIA category 5, 6, or 7 UTP two-
pair wiring. One user per segment; up to 100 meters long. It uses an
RJ45 connector with a physical star topology and a logical bus.
 100BaseFX (IEEE 802.3u): Uses fiber cabling 62.5/125-micron
multimode fiber. Point-to-point topology; up to 412 meters long. It
uses an ST or SC connector, which are media interface connectors.

Confidential
Conti…

 1000BaseCX (IEEE 802.3z): Copper twisted-pair called twinax (a


balanced coaxial pair) that can only run up to 25 meters.
 1000BaseT (IEEE 802.3ab): Category 5, four-pair UTP wiring up to
100 meters long.
 1000BaseSX (IEEE 802.3z): MMF using 62.5- and 50-micron core;
uses an 850 nanometer laser and can go up to 220 meters with
62.5-micron, 550 meters with 50-micron.
 1000BaseLX (IEEE 802.3z): Single-mode fiber that uses a 9-micron
core and 1300 nanometer laser and can go from 3 kilometers up to
10 kilometers.

Confidential
Ethernet Cabling

Introduction
Three types of Ethernet cables are available:
 Straight-through cable
 Crossover cable
 Rolled cable

Confidential
Straight-Through Cable

The straight-through cable is used to connect


 Host to switch or hub
 Router to switch or hub
Notice that only pins 1, 2, 3, and 6 are used. Just connect 1 to 1, 2
to 2, 3 to 3, and 6 to 6

Straight-through Ethernet cable


Confidential
Crossover Cable

The crossover cable can be used to connect


 Switch to switch
 Hub to hub
 Host to host
 Hub to switch
 Router direct to host
Notice that instead of connecting 1 to 1, 2 to 2, and so on, here we
connect pins 1 to 3 and 2 to 6 on each side of the cable.

Confidential
Conti…

Confidential
Rolled Cable

 Although rolled cable isn’t used to connect any Ethernet


connections together, you can use a rolled Ethernet cable to
connect a host to a router console serial communication (com) port.

Rolled Ethernet Cable

Confidential
How to Make an Ethernet Cable

 Requirements
 Bulk Ethernet Cable (RJ-45)

Bulk RJ45 Crimpable Connectors

Confidential
Conti…

 RJ-45 Crimping tool

Confidential
 Standard, Straight-Through Wiring (Both Ends Are the Same)
10Base-T
Wire Color Wire Diagram Signal
RJ45 Pin #
(T568A) (T568A) 100Base-TX
Signal
1 White/Green Transmit+
2 Green Transmit-
3 White/Orange Receive+
4 Blue Unused
5 White/Blue Unused
6 Orange Receive-
7 White/Brown Unused
8 Brown Unused

Standard Straight-through Wiring


Confidential
 Straight-Through Cable Pin out for T568A

10Base-T Signal
Wire Color Wire Diagram
RJ45 Pin # 100Base-TX
(T568B) (T568B)
Signal
1 White/Orange Transmit+
2 Orange Transmit-
3 White/Green Receive+
4 Blue Unused
5 White/Blue Unused
6 Green Receive-
7 White/Brown Unused
8 Brown Unused

Confidential
 Straight-Through Cable Pin out for T568B

10Base-T Signal
Wire Color Wire Diagram
RJ45 Pin # 100Base-TX
(T568B) (T568B)
Signal
1 White/Orange Transmit+
2 Orange Transmit-
3 White/Green Receive+
4 Blue Unused
5 White/Blue Unused
6 Green Receive-
7 White/Brown Unused
8 Brown Unused

Confidential
Basics of WAN

 What is WAN?
Wide Area Network (WAN) is a Computer network that covers a
broad area (i.e., any network whose communications links cross
metropolitan, regional, or national boundaries). Or, a network that
uses routers and public Communication Links.

Conceptual View of Point-to-Point Leased Line

Confidential
The several options available for WAN connectivity
are:

Sample
Disadvan Bandwidth
Option Description Advantages protocols
tages range
used
Point-to-Point
connection between
Expensiv PPP, HDLC,
Leased line two computers or Most secure
e SDLC, HNAS
Local Area
Networks (LANs)

A dedicated circuit
path is created
Less Call 28 Kb/s -
Circuit switc between end points. PPP, ISDN
hing Expensive Setup 144 Kb/s
Best example is
dialup connections

Confidential
Conti..

Devices transport
packets via a shared
single point-to-point or
point-to-multipoint link
across a carrier
internetwork. Variable Shared media X.25 Frame-
Packet switching
length packets are across link Relay
transmitted over
Permanent Virtual
Circuits (PVC) or
Switched Virtual
Circuits (SVC)

Confidential
Conti..

Similar to packet
switching, but
uses fixed
length cells
instead of
variable length best for
Overhead can be
Cell relay packets. Data is simultaneous use ATM
considerable
divided into of Voice and data
fixed-length cells
and then
transported
across virtual
circuits

Confidential
WAN Cabling Standards

Serial Cabling Options

Confidential
THANK YOU

Confidential

You might also like