SlideShare ist ein Scribd-Unternehmen logo
1 von 27
A network is any collection of independent computers that
communicate with one another over a shared network
medium. LANs are networks usually confined to a
geographic area, such as a single building or a college
campus. LANs can be small, linking as few as three
computers, but often link hundreds of computers used by
thousands of people. The development of standard
networking protocols and media has resulted in worldwide
proliferation of LANs throughout business and educational
organizations.
You must also choose a type of networking
technology, sometimes referred to as the LAN
media, which enables your computers to send
information to each other. The most common
networking technologies used for home
networking include:
 Ethernet
 Phone line
 Wireless
Used in organization networks, Ethernet is widely known,
supported, and understood. Ethernet equipment consists of
an Ethernet adapter and either coaxial cable (for 10Base2)
to serially connect each computer together, or twisted pair
cable (for 10BaseT or 100BaseT) to connect each computer
to a hub. A hub is required when you are using twisted pair
cabling and connecting more than two 10BaseT or
100BaseT computers together.
While Ethernet adapters are generally low cost, the cabling
and hub needs add to the complexity and cost.
Ethernet can operate at speeds of 10 megabits per second
(Mbps) or 100 Mbps. To get 100 Mbps, you must use 100
Mbps Ethernet adapters, Category 5 twisted pair cabling,
and connect to 100 Mbps port on an Ethernet hub.
Used mostly in home and small office networks,
phone line uses telephone wiring as its medium
for communication and operates at speeds up
to 10 Mbps. Phone line equipment consists of a
phone line adapter installed in each computer
and standard telephone cables connected to
standard phone jacks.
The advantage of phone line networks is phone
jacks are usually found throughout the house
and close to areas where computers are used.
Used in both organization and home networks,
wireless technology uses radio signals to
communicate so there is no cabling required. Wireless
solutions are gaining popularity and becoming more
affordable. There are many wireless products,
however, wireless networks based on the IEEE 802.11
standard are becoming the preferred solution.
Organization or large business wireless networks are
more likely to be using IEEE 802.11. If your home or
small network is also based on IEEE 802.11, you can
use the same network adapter to access both work
and home or small office networks. IEEE 802.11b can
operate at a speed of 11 Mbps. Wireless equipment
consists of a wireless adapter installed in each
computer.
Coaxial cable, or coax, is an Electrical cable with an inner
conductor surrounded by a flexible, tubular insulating
layer, surrounded by a tubular conducting shield.
Coaxial cable is used as a transmission line for radio
frequency signals, in applications such as feed lines
connecting radio transmitters and receivers with their
antennas, computer network (Internet) connections, and
distributing cable television signals. One advantage of
coax over other types of radio transmission line is that in
an ideal coaxial cable the electromagnetic field carrying
the signal exists only in the space between the inner and
outer conductors. This allows coaxial cable runs to be
installed next to metal objects such as gutters without the
power losses that occur in other types of transmission
lines, and provides protection of the signal from external
electromagnetic interference.
A: OUTER PLASTIC SHEATH
B: WOVEN COPPER SHIELD
C: INNER DIELECTRIC INSULATOR
D: COPPER CORE
A firewall is a device or set of devices designed to
permit or deny network transmissions based
upon a set of rules and is frequently used to
protect networks from unauthorized access while
permitting legitimate communications to pass.
Many personal computer operating systems
include software-based firewalls to protect
against threats from the public Internet. Many
routers that pass data between networks contain
firewall components and, conversely, many
firewalls can perform basic routing functions.
A router is a device that forwards data packets
between telecommunications networks, creating an
overlay internetwork. A router is connected to two or
more data lines from different networks. When data
comes in on one of the lines, the router reads the
address information in the packet to determine its
ultimate destination. Then, using information in its
routing table or routing policy, it directs the packet to
the next network on its journey or drops the packet. A
data packet is typically forwarded from one router to
another through networks that constitute the
internetwork until it gets to its destination node.[1]
A network switch or switching hub is a computer
networking device that connects network
segments.
The term commonly refers to a multi-port network
bridge that processes and routes data at the data
link layer (layer 2) of the OSI model. Switches that
additionally process data at the network layer
(Layer 3) and above are often referred to as Layer
3 switches or multilayer switches.
An Ethernet hub, active hub, network hub, repeater
hub or hub is a device for connecting multiple twisted
pair or fiber optic Ethernet devices together and
making them act as a single network segment. Hubs
work at the physical layer (layer 1) of the OSI model.
The device is a form of multiport repeater. Repeater
hubs also participate in collision detection, forwarding
a jam signal to all ports if it detects a collision.
Hubs also often come with a BNC and/or Attachment
Unit Interface (AUI) connector to allow connection to
legacy 10BASE2 or 10BASE5 network segments. The
availability of low-priced network switches has largely
rendered hubs obsolete but they are still seen in older
installations and more specialized applications.
Category 5 cable (Cat 5) is a twisted pair cable for
carrying signals. This type of cable is used in
structured cabling for computer networks such as
Ethernet. It is also used to carry other signals
such as telephony and video. The cable is
commonly connected using punch down blocks
and modular connectors. Most Category 5 cables
are unshielded, relying on the twisted pair design
and differential signaling for noise rejection.
Category 5 has been superseded by the Category
5e specification.
 Use a switched network: A switch can separate a network into
many parts which can effectively preventing snooping and
sniffing on a network. These switches also reduce network
traffic by limiting messages to only the parts of the network on
which they are needed to improve the efficiency of the whole
network.
 Bridges and Routers: Bridges and routers are electronic filters
which only pass a network message through themselves if the
destination lies on the other side of the filter. Consequently if
"the snooper" is on one side of a bridge or router they will not
see any traffic passing between computers on the other side of
the filter.
 Lan Security Architecture (LSA): a proprietary technique where
twisted pair hubs inspect incoming messages and will only
transmit them unscrambled to the destination computer. All
other computers on the hub receive scrambled messages.
 Encryption: Encrypting the data passing between
your computer and its destination. There are many
encryption technologies and product available
which effective protect information and data privacy.
The popular encryption methods used are PGP
(Pretty Good Privacy).
 verification: Use user name and password to verify
users. It is necessary to encrypt the password and
implement timestamps making forgery extremely
difficult.
 Combination technologies: Many new technologies
are available which doing both verification and
encryption. One of such technologies is Kerberos
which uses tokens, timestamps, tickets and
encryption to make transactions between
computers secure.
Lan

Weitere ähnliche Inhalte

Was ist angesagt?

Computer network Report
Computer network ReportComputer network Report
Computer network ReportAmitoj Kaur
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network ArchitecturePawandeep Singh
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
Vikash file full_final
Vikash file full_finalVikash file full_final
Vikash file full_finalRahul Ranjan
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networkingshierly pabello
 
Presentation1
Presentation1Presentation1
Presentation1huzaifag1
 
CSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEMCSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEMMarvin Bronoso
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceTransweb Global Inc
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignmentKavitha Dhanesh
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARDKak Yong
 

Was ist angesagt? (20)

Computer network Report
Computer network ReportComputer network Report
Computer network Report
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network Architecture
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Wlan Basics
Wlan BasicsWlan Basics
Wlan Basics
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Vikash file full_final
Vikash file full_finalVikash file full_final
Vikash file full_final
 
Tools, materials and equipment for networking
Tools, materials and equipment for networkingTools, materials and equipment for networking
Tools, materials and equipment for networking
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
Presentation1
Presentation1Presentation1
Presentation1
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
CSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEMCSS L13 STRUCTURED CABLING SYSTEM
CSS L13 STRUCTURED CABLING SYSTEM
 
Applications of Computer Networking | Computer Science
Applications of Computer Networking | Computer ScienceApplications of Computer Networking | Computer Science
Applications of Computer Networking | Computer Science
 
Basics of network
Basics of networkBasics of network
Basics of network
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Infiniband and Ethernet
Infiniband and EthernetInfiniband and Ethernet
Infiniband and Ethernet
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Data Communication
Data Communication Data Communication
Data Communication
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
 
Networking Basic and Cisco History
Networking Basic and Cisco History Networking Basic and Cisco History
Networking Basic and Cisco History
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
 

Andere mochten auch

Andere mochten auch (20)

Ejersisio1
Ejersisio1Ejersisio1
Ejersisio1
 
David copperfield
David copperfieldDavid copperfield
David copperfield
 
Laura caro perez
Laura caro perezLaura caro perez
Laura caro perez
 
Cuanto Te Quejas
Cuanto Te QuejasCuanto Te Quejas
Cuanto Te Quejas
 
Los Cachorros
Los CachorrosLos Cachorros
Los Cachorros
 
nnnn
nnnnnnnn
nnnn
 
Mantenimientopreventivoylogicodelpc
MantenimientopreventivoylogicodelpcMantenimientopreventivoylogicodelpc
Mantenimientopreventivoylogicodelpc
 
Ua2.3 puntos.tema de interés.
Ua2.3 puntos.tema de interés.Ua2.3 puntos.tema de interés.
Ua2.3 puntos.tema de interés.
 
Captulo 10 / DANEIL
Captulo 10 / DANEILCaptulo 10 / DANEIL
Captulo 10 / DANEIL
 
Vodka putin
Vodka putinVodka putin
Vodka putin
 
Petrucci letture del territorio
Petrucci letture del territorio Petrucci letture del territorio
Petrucci letture del territorio
 
Album dijital
Album dijital Album dijital
Album dijital
 
Generalidades de Química
Generalidades de QuímicaGeneralidades de Química
Generalidades de Química
 
Lista dos Lançamentos 2012 e 2013 Atualizada
Lista dos Lançamentos 2012 e 2013 AtualizadaLista dos Lançamentos 2012 e 2013 Atualizada
Lista dos Lançamentos 2012 e 2013 Atualizada
 
Como dio fin al virreinato
Como dio fin al virreinatoComo dio fin al virreinato
Como dio fin al virreinato
 
Relatoría 3. Muerte, Enfermedad y su Contenido Ritual
Relatoría 3. Muerte, Enfermedad y su Contenido RitualRelatoría 3. Muerte, Enfermedad y su Contenido Ritual
Relatoría 3. Muerte, Enfermedad y su Contenido Ritual
 
Pobreza Mental
Pobreza MentalPobreza Mental
Pobreza Mental
 
Analisis de los algoritmos
Analisis de los algoritmosAnalisis de los algoritmos
Analisis de los algoritmos
 
My space presentation
My space presentationMy space presentation
My space presentation
 
Inform Espanol
Inform EspanolInform Espanol
Inform Espanol
 

Ähnlich wie Lan

Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005 ramloganricki
 
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsLisa Williams
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Communication technology
Communication technologyCommunication technology
Communication technologyAbhishek Curtis
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networksTatheer Fatima
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basicsfasywan
 
information technology
information technologyinformation technology
information technologyNavneet kaur
 
information technology
information technologyinformation technology
information technologyNavneet kaur
 

Ähnlich wie Lan (20)

Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
Nt1310 Unit 8 Network Components
Nt1310 Unit 8 Network ComponentsNt1310 Unit 8 Network Components
Nt1310 Unit 8 Network Components
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Network ppt
Network pptNetwork ppt
Network ppt
 
compo 131_banalnal
compo 131_banalnalcompo 131_banalnal
compo 131_banalnal
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Networking / Internet and Web Technologies
 
Cse 333-experiment-1
Cse 333-experiment-1Cse 333-experiment-1
Cse 333-experiment-1
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 
01 - networking basics notes
01 - networking basics notes01 - networking basics notes
01 - networking basics notes
 
information technology
information technologyinformation technology
information technology
 
information technology
information technologyinformation technology
information technology
 

Kürzlich hochgeladen

Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 

Kürzlich hochgeladen (20)

Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 

Lan

  • 1.
  • 2.
  • 3. A network is any collection of independent computers that communicate with one another over a shared network medium. LANs are networks usually confined to a geographic area, such as a single building or a college campus. LANs can be small, linking as few as three computers, but often link hundreds of computers used by thousands of people. The development of standard networking protocols and media has resulted in worldwide proliferation of LANs throughout business and educational organizations.
  • 4.
  • 5. You must also choose a type of networking technology, sometimes referred to as the LAN media, which enables your computers to send information to each other. The most common networking technologies used for home networking include:  Ethernet  Phone line  Wireless
  • 6. Used in organization networks, Ethernet is widely known, supported, and understood. Ethernet equipment consists of an Ethernet adapter and either coaxial cable (for 10Base2) to serially connect each computer together, or twisted pair cable (for 10BaseT or 100BaseT) to connect each computer to a hub. A hub is required when you are using twisted pair cabling and connecting more than two 10BaseT or 100BaseT computers together. While Ethernet adapters are generally low cost, the cabling and hub needs add to the complexity and cost. Ethernet can operate at speeds of 10 megabits per second (Mbps) or 100 Mbps. To get 100 Mbps, you must use 100 Mbps Ethernet adapters, Category 5 twisted pair cabling, and connect to 100 Mbps port on an Ethernet hub.
  • 7.
  • 8. Used mostly in home and small office networks, phone line uses telephone wiring as its medium for communication and operates at speeds up to 10 Mbps. Phone line equipment consists of a phone line adapter installed in each computer and standard telephone cables connected to standard phone jacks. The advantage of phone line networks is phone jacks are usually found throughout the house and close to areas where computers are used.
  • 9.
  • 10. Used in both organization and home networks, wireless technology uses radio signals to communicate so there is no cabling required. Wireless solutions are gaining popularity and becoming more affordable. There are many wireless products, however, wireless networks based on the IEEE 802.11 standard are becoming the preferred solution. Organization or large business wireless networks are more likely to be using IEEE 802.11. If your home or small network is also based on IEEE 802.11, you can use the same network adapter to access both work and home or small office networks. IEEE 802.11b can operate at a speed of 11 Mbps. Wireless equipment consists of a wireless adapter installed in each computer.
  • 11.
  • 12.
  • 13. Coaxial cable, or coax, is an Electrical cable with an inner conductor surrounded by a flexible, tubular insulating layer, surrounded by a tubular conducting shield. Coaxial cable is used as a transmission line for radio frequency signals, in applications such as feed lines connecting radio transmitters and receivers with their antennas, computer network (Internet) connections, and distributing cable television signals. One advantage of coax over other types of radio transmission line is that in an ideal coaxial cable the electromagnetic field carrying the signal exists only in the space between the inner and outer conductors. This allows coaxial cable runs to be installed next to metal objects such as gutters without the power losses that occur in other types of transmission lines, and provides protection of the signal from external electromagnetic interference.
  • 14. A: OUTER PLASTIC SHEATH B: WOVEN COPPER SHIELD C: INNER DIELECTRIC INSULATOR D: COPPER CORE
  • 15. A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
  • 16.
  • 17. A router is a device that forwards data packets between telecommunications networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When data comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey or drops the packet. A data packet is typically forwarded from one router to another through networks that constitute the internetwork until it gets to its destination node.[1]
  • 18.
  • 19. A network switch or switching hub is a computer networking device that connects network segments. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (Layer 3) and above are often referred to as Layer 3 switches or multilayer switches.
  • 20.
  • 21. An Ethernet hub, active hub, network hub, repeater hub or hub is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and making them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The device is a form of multiport repeater. Repeater hubs also participate in collision detection, forwarding a jam signal to all ports if it detects a collision. Hubs also often come with a BNC and/or Attachment Unit Interface (AUI) connector to allow connection to legacy 10BASE2 or 10BASE5 network segments. The availability of low-priced network switches has largely rendered hubs obsolete but they are still seen in older installations and more specialized applications.
  • 22.
  • 23. Category 5 cable (Cat 5) is a twisted pair cable for carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. It is also used to carry other signals such as telephony and video. The cable is commonly connected using punch down blocks and modular connectors. Most Category 5 cables are unshielded, relying on the twisted pair design and differential signaling for noise rejection. Category 5 has been superseded by the Category 5e specification.
  • 24.
  • 25.  Use a switched network: A switch can separate a network into many parts which can effectively preventing snooping and sniffing on a network. These switches also reduce network traffic by limiting messages to only the parts of the network on which they are needed to improve the efficiency of the whole network.  Bridges and Routers: Bridges and routers are electronic filters which only pass a network message through themselves if the destination lies on the other side of the filter. Consequently if "the snooper" is on one side of a bridge or router they will not see any traffic passing between computers on the other side of the filter.  Lan Security Architecture (LSA): a proprietary technique where twisted pair hubs inspect incoming messages and will only transmit them unscrambled to the destination computer. All other computers on the hub receive scrambled messages.
  • 26.  Encryption: Encrypting the data passing between your computer and its destination. There are many encryption technologies and product available which effective protect information and data privacy. The popular encryption methods used are PGP (Pretty Good Privacy).  verification: Use user name and password to verify users. It is necessary to encrypt the password and implement timestamps making forgery extremely difficult.  Combination technologies: Many new technologies are available which doing both verification and encryption. One of such technologies is Kerberos which uses tokens, timestamps, tickets and encryption to make transactions between computers secure.