SlideShare ist ein Scribd-Unternehmen logo
1 von 16
SWITCHED LAN, FAST ETHERNET,
FAST ETHERNET AND LAYER
MODEL
PRESENTER
HAMNA SHAHZAD
LAN SWITCHING
 LAN switching is a form of packet switching used in LAN.
 Switching Tech. is crucial in network design.
 Switching included on layer 2, layer 3 and layer 4.
 Layer 2 switching include:
 Hardware based bridging.
 Wire speed/non blocking forwarding.
 Low latency rate.
 Layer 2 switching is highly efficient used for workgroup connectivity.
LAN SWITCHING ON LAYER 3
 Layer 3 switching perform following action:
 Determine path based on logical addressing
 Process and informs to any option info.
 Update SNMP.
 Provide security.
 Flow accounting/ flow control.
 Quality of service.
 Low latency.
LAN SWITCHING ON LAYER 4
 Layer 4 switching provide additional datagram inspection by reading the port numbers found in transport
layer header to make transport decision.
 The largest benefit of is that network admin. configure a layer 4 switch to priorities data traffic by
applications which means Quality of Service can be defined for each user.
FAST ETHERNET
 Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of 100 megabits
per second (referred to as "100BASE-T").
 Fast Ethernet cards connect to networks at a rate of 100 Mbps. Mbps while Gigabit network cards can
connect at speeds up to 1000mb/s.
 The main difference between the two is speed.
 A fast Ethernet card can run on bandwidths at 100mb/s while a gigabit Ethernet can run at ten times that
speed.
 Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a link layer protocol in
the TCP/IP stack, describing how networked devices can format data for transmission to other network
devices on the same network segment, and how to put that data out on the network connection
What is the best Ethernet cable?
 If you have a modern router and modern Ethernet-enabled devices, you can get faster speeds — up to 10
Gb/s from 1 Gb/s — by using Cat-6 or Cat-6a cables instead of Cat-5 or Cat-5e cables. The rest of your
hardware has to support it, but you won't get those above 1 Gb/s speeds unless you have good enough
cables.
 It may be full duplex or half duplex depend upon type of network design.
100 BASE T
 100 BASE T networks star topology used and UTP cable are also used.
 10BASE-T used Cat3 cabling. However, Cat5 or later cabling is typically used today.
 10 Mbps Ethernet is considered to be classic Ethernet
 Have two parts one for transmission one for receiving.
 It may be half duplex.
100 BASE FX
 Also used star topology.
 Use fiber optic cable.
 Although the encoding, decoding, and clock
recovery procedures are the same for both
media, the signal transmission is different -
electrical pulses (100BASE TX) in copper and
light pulses(100BASE FX) in optical fiber.
 Have two parts one for transmission one for
receiving.
 It may be full duplex.
 Segment length 200m.
100 BASE TX
 Also used star topology.
 UTP copper cable category 5.
 The 4B/5B encoding is used for 100BASE-TX
Ethernet.
 Category 5 convert data into signals.
 However, unlike 10BASE-T, 100BASE-TX networks
typically use a switch at the center of the star
instead of a hub.
 Have two parts one for transmission one for
receiving.
 Segment length 100m.
FAST ETHERNET AND
LAYER MODEL
 Ethernet operates in the lower two layers of
the OSI model:
 The Data Link layer and the Physical layer.
FAST Ethernet - Layer 1 and Layer 2
 All Fast Ethernet variants use a star topology.
 Fast Ethernet at Layer 1 involves signals, bit streams that travel on the media, physical components
that put signals on media, and various topologies.
 Fast Ethernet Layer 1 performs a key role in the communication that takes place between devices, but
each of its functions has limitations.
 Ethernet separates the functions of the Data Link layer into two distinct sublayers: the Logical Link
Control (LLC) sublayer and the Media Access Control (MAC) sublayer
 Fast Ethernet at Layer 2 addresses these limitations.
CONT….
 The Data Link sublayers contribute
significantly to technological compatibility
and computer communications.
 The MAC sublayer is concerned with the
physical components that will be used to
communicate the information and prepares
the data for transmission over the media.
 The Logical Link Control (LLC) sublayer
remains relatively independent of the
physical equipment that will be used for the
communication process.
Logical Link Control - Connecting to the Upper
Layers
 For Ethernet, the IEEE 802.2 standard describes the LLC sublayer functions, and the 802.3 standard
describes the MAC sublayer and the Physical layer functions.
 Logical Link Control handles the communication between the upper layers and the networking software,
and the lower layers, typically the hardware.
 The LLC sublayer takes the network protocol data, which is typically an IPv4 packet, and adds control
information to help deliver the packet to the destination node.
 Layer 2 communicates with the upper layers through LLC. LLC is implemented in software, and its
implementation is independent of the physical equipment.
 In a computer, the LLC can be considered the driver software for the Network Interface Card (NIC).
MAC - Getting Data to the Media
 Media Access Control (MAC) is the lower Ethernet sublayer of the Data Link
layer. Media Access Control is implemented by hardware, typically in the
computer Network Interface Card (NIC).
 The Ethernet MAC sublayer has two primary responsibilities:
 Data Encapsulation
 Media Access Control
ETHERNET ON PHYSICAL
LAYER
 As a technology associated with the Physical layer,
Ethernet specifies and implements encoding and
decoding schemes that enable frame bits to be carried
as signals across the media.
 Ethernet devices make use of a broad range of cable
and connector specifications.
 Ethernet uses UTP copper cables and optical fiber to
interconnect network devices via intermediary devices
such as hubs and switches.
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

Computer System Architecture-Morris Mano third edition ( PDFDrive ).pdf
Computer System Architecture-Morris Mano third edition ( PDFDrive ).pdfComputer System Architecture-Morris Mano third edition ( PDFDrive ).pdf
Computer System Architecture-Morris Mano third edition ( PDFDrive ).pdf
edwinmoyo3
 

Was ist angesagt? (20)

difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docx
 
VIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docxVIRTUALIZATION STRUCTURES TOOLS.docx
VIRTUALIZATION STRUCTURES TOOLS.docx
 
Osi model
Osi modelOsi model
Osi model
 
Data Communications,Data Networks
Data Communications,Data NetworksData Communications,Data Networks
Data Communications,Data Networks
 
SONET/SDH in CCN
SONET/SDH in CCNSONET/SDH in CCN
SONET/SDH in CCN
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
 
Application layer
Application layerApplication layer
Application layer
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Delay , Loss & Throughput
Delay , Loss & ThroughputDelay , Loss & Throughput
Delay , Loss & Throughput
 
Hdlc ppt..
Hdlc ppt..Hdlc ppt..
Hdlc ppt..
 
Fault tolerance techniques
Fault tolerance techniquesFault tolerance techniques
Fault tolerance techniques
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Osi model
Osi modelOsi model
Osi model
 
Network software
Network softwareNetwork software
Network software
 
Computer System Architecture-Morris Mano third edition ( PDFDrive ).pdf
Computer System Architecture-Morris Mano third edition ( PDFDrive ).pdfComputer System Architecture-Morris Mano third edition ( PDFDrive ).pdf
Computer System Architecture-Morris Mano third edition ( PDFDrive ).pdf
 
Fddi
FddiFddi
Fddi
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
 

Ähnlich wie SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL

Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
fherjaramillo
 
The IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfThe IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdf
SALES97
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
kuramartin
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
Abhijeet Shah
 

Ähnlich wie SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL (20)

Capitulo 9 Exploration Network
Capitulo 9 Exploration NetworkCapitulo 9 Exploration Network
Capitulo 9 Exploration Network
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Technical Ethernet
Technical EthernetTechnical Ethernet
Technical Ethernet
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
The IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdfThe IP network is a virtual network and must rely on a link layer ne.pdf
The IP network is a virtual network and must rely on a link layer ne.pdf
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
A Boost for Ethernet to the Home
A Boost for Ethernet to the HomeA Boost for Ethernet to the Home
A Boost for Ethernet to the Home
 
Sem 1 Ch 7
Sem 1 Ch 7Sem 1 Ch 7
Sem 1 Ch 7
 
5 Lan
5 Lan5 Lan
5 Lan
 
Ethernet_Networks
Ethernet_NetworksEthernet_Networks
Ethernet_Networks
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL

  • 1. SWITCHED LAN, FAST ETHERNET, FAST ETHERNET AND LAYER MODEL
  • 3. LAN SWITCHING  LAN switching is a form of packet switching used in LAN.  Switching Tech. is crucial in network design.  Switching included on layer 2, layer 3 and layer 4.  Layer 2 switching include:  Hardware based bridging.  Wire speed/non blocking forwarding.  Low latency rate.  Layer 2 switching is highly efficient used for workgroup connectivity.
  • 4. LAN SWITCHING ON LAYER 3  Layer 3 switching perform following action:  Determine path based on logical addressing  Process and informs to any option info.  Update SNMP.  Provide security.  Flow accounting/ flow control.  Quality of service.  Low latency.
  • 5. LAN SWITCHING ON LAYER 4  Layer 4 switching provide additional datagram inspection by reading the port numbers found in transport layer header to make transport decision.  The largest benefit of is that network admin. configure a layer 4 switch to priorities data traffic by applications which means Quality of Service can be defined for each user.
  • 6. FAST ETHERNET  Fast Ethernet is a local area network (LAN) transmission standard that provides a data rate of 100 megabits per second (referred to as "100BASE-T").  Fast Ethernet cards connect to networks at a rate of 100 Mbps. Mbps while Gigabit network cards can connect at speeds up to 1000mb/s.  The main difference between the two is speed.  A fast Ethernet card can run on bandwidths at 100mb/s while a gigabit Ethernet can run at ten times that speed.  Ethernet is the most widely installed local area network (LAN) technology. Ethernet is a link layer protocol in the TCP/IP stack, describing how networked devices can format data for transmission to other network devices on the same network segment, and how to put that data out on the network connection
  • 7. What is the best Ethernet cable?  If you have a modern router and modern Ethernet-enabled devices, you can get faster speeds — up to 10 Gb/s from 1 Gb/s — by using Cat-6 or Cat-6a cables instead of Cat-5 or Cat-5e cables. The rest of your hardware has to support it, but you won't get those above 1 Gb/s speeds unless you have good enough cables.  It may be full duplex or half duplex depend upon type of network design.
  • 8. 100 BASE T  100 BASE T networks star topology used and UTP cable are also used.  10BASE-T used Cat3 cabling. However, Cat5 or later cabling is typically used today.  10 Mbps Ethernet is considered to be classic Ethernet  Have two parts one for transmission one for receiving.  It may be half duplex.
  • 9. 100 BASE FX  Also used star topology.  Use fiber optic cable.  Although the encoding, decoding, and clock recovery procedures are the same for both media, the signal transmission is different - electrical pulses (100BASE TX) in copper and light pulses(100BASE FX) in optical fiber.  Have two parts one for transmission one for receiving.  It may be full duplex.  Segment length 200m. 100 BASE TX  Also used star topology.  UTP copper cable category 5.  The 4B/5B encoding is used for 100BASE-TX Ethernet.  Category 5 convert data into signals.  However, unlike 10BASE-T, 100BASE-TX networks typically use a switch at the center of the star instead of a hub.  Have two parts one for transmission one for receiving.  Segment length 100m.
  • 10. FAST ETHERNET AND LAYER MODEL  Ethernet operates in the lower two layers of the OSI model:  The Data Link layer and the Physical layer.
  • 11. FAST Ethernet - Layer 1 and Layer 2  All Fast Ethernet variants use a star topology.  Fast Ethernet at Layer 1 involves signals, bit streams that travel on the media, physical components that put signals on media, and various topologies.  Fast Ethernet Layer 1 performs a key role in the communication that takes place between devices, but each of its functions has limitations.  Ethernet separates the functions of the Data Link layer into two distinct sublayers: the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer  Fast Ethernet at Layer 2 addresses these limitations.
  • 12. CONT….  The Data Link sublayers contribute significantly to technological compatibility and computer communications.  The MAC sublayer is concerned with the physical components that will be used to communicate the information and prepares the data for transmission over the media.  The Logical Link Control (LLC) sublayer remains relatively independent of the physical equipment that will be used for the communication process.
  • 13. Logical Link Control - Connecting to the Upper Layers  For Ethernet, the IEEE 802.2 standard describes the LLC sublayer functions, and the 802.3 standard describes the MAC sublayer and the Physical layer functions.  Logical Link Control handles the communication between the upper layers and the networking software, and the lower layers, typically the hardware.  The LLC sublayer takes the network protocol data, which is typically an IPv4 packet, and adds control information to help deliver the packet to the destination node.  Layer 2 communicates with the upper layers through LLC. LLC is implemented in software, and its implementation is independent of the physical equipment.  In a computer, the LLC can be considered the driver software for the Network Interface Card (NIC).
  • 14. MAC - Getting Data to the Media  Media Access Control (MAC) is the lower Ethernet sublayer of the Data Link layer. Media Access Control is implemented by hardware, typically in the computer Network Interface Card (NIC).  The Ethernet MAC sublayer has two primary responsibilities:  Data Encapsulation  Media Access Control
  • 15. ETHERNET ON PHYSICAL LAYER  As a technology associated with the Physical layer, Ethernet specifies and implements encoding and decoding schemes that enable frame bits to be carried as signals across the media.  Ethernet devices make use of a broad range of cable and connector specifications.  Ethernet uses UTP copper cables and optical fiber to interconnect network devices via intermediary devices such as hubs and switches.