Fundamentals of LAN and WAN
Fundamentals of LAN and WAN
Fundamentals of LAN and WAN
Fundamentals
Of
LAN and WAN
Confidential
Chapter Objectives
Confidential
Ethernet Networking
Confidential
Some Ethernet Specifications
Confidential
Media Access
Ethernet Addressing
24 bits 24 bits
Vendor ID Adaptor ID
Confidential
Broadcast Domain & Collision Domain
Broadcast Domain
A broadcast domain is a logical division of a computer network in
which all nodes can reach each other by broadcast at the data link
layer.
In terms of current popular technologies: Any computer connected
to the same Ethernet Repeater or Switch is a member of the same
broadcast domain. Further, any computer connected to the same
set of inter-connected switches/repeaters is a member of the same
broadcast domain.
Confidential
Collision Domain
Confidential
Ethernet at the Physical Layer
Confidential
10Base2 10Mbps, baseband technology, up to 185 meters in
length:
It is known as thinnet and can support up to 30 workstations on a
single segment.
10Base5 10Mbps, baseband technology, up to 500 meters in
length
It is known as thicknet. It uses a physical and logical bus with AUI
connectors. Up to 2,500 meters with repeaters and 1,024 users for all
segments.
Confidential
10BaseT 10Mbps using category 3 UTP wiring
Unlike with the 10Base2 and 10Base5 networks, each device must
connect into a hub or switch, and you can have only one host per
segment or wire
Here are the expanded IEEE Ethernet 802.3 standards:
100BaseTX (IEEE 802.3u): EIA/TIA category 5, 6, or 7 UTP two-
pair wiring. One user per segment; up to 100 meters long. It uses an
RJ45 connector with a physical star topology and a logical bus.
100BaseFX (IEEE 802.3u): Uses fiber cabling 62.5/125-micron
multimode fiber. Point-to-point topology; up to 412 meters long. It
uses an ST or SC connector, which are media interface connectors.
Confidential
Conti…
Confidential
Ethernet Cabling
Introduction
Three types of Ethernet cables are available:
Straight-through cable
Crossover cable
Rolled cable
Confidential
Straight-Through Cable
Confidential
Conti…
Confidential
Rolled Cable
Confidential
How to Make an Ethernet Cable
Requirements
Bulk Ethernet Cable (RJ-45)
Confidential
Conti…
Confidential
Standard, Straight-Through Wiring (Both Ends Are the Same)
10Base-T
Wire Color Wire Diagram Signal
RJ45 Pin #
(T568A) (T568A) 100Base-TX
Signal
1 White/Green Transmit+
2 Green Transmit-
3 White/Orange Receive+
4 Blue Unused
5 White/Blue Unused
6 Orange Receive-
7 White/Brown Unused
8 Brown Unused
10Base-T Signal
Wire Color Wire Diagram
RJ45 Pin # 100Base-TX
(T568B) (T568B)
Signal
1 White/Orange Transmit+
2 Orange Transmit-
3 White/Green Receive+
4 Blue Unused
5 White/Blue Unused
6 Green Receive-
7 White/Brown Unused
8 Brown Unused
Confidential
Straight-Through Cable Pin out for T568B
10Base-T Signal
Wire Color Wire Diagram
RJ45 Pin # 100Base-TX
(T568B) (T568B)
Signal
1 White/Orange Transmit+
2 Orange Transmit-
3 White/Green Receive+
4 Blue Unused
5 White/Blue Unused
6 Green Receive-
7 White/Brown Unused
8 Brown Unused
Confidential
Basics of WAN
What is WAN?
Wide Area Network (WAN) is a Computer network that covers a
broad area (i.e., any network whose communications links cross
metropolitan, regional, or national boundaries). Or, a network that
uses routers and public Communication Links.
Confidential
The several options available for WAN connectivity
are:
Sample
Disadvan Bandwidth
Option Description Advantages protocols
tages range
used
Point-to-Point
connection between
Expensiv PPP, HDLC,
Leased line two computers or Most secure
e SDLC, HNAS
Local Area
Networks (LANs)
A dedicated circuit
path is created
Less Call 28 Kb/s -
Circuit switc between end points. PPP, ISDN
hing Expensive Setup 144 Kb/s
Best example is
dialup connections
Confidential
Conti..
Devices transport
packets via a shared
single point-to-point or
point-to-multipoint link
across a carrier
internetwork. Variable Shared media X.25 Frame-
Packet switching
length packets are across link Relay
transmitted over
Permanent Virtual
Circuits (PVC) or
Switched Virtual
Circuits (SVC)
Confidential
Conti..
Similar to packet
switching, but
uses fixed
length cells
instead of
variable length best for
Overhead can be
Cell relay packets. Data is simultaneous use ATM
considerable
divided into of Voice and data
fixed-length cells
and then
transported
across virtual
circuits
Confidential
WAN Cabling Standards
Confidential
THANK YOU
Confidential