0% found this document useful (0 votes)
8 views4 pages

LAN Technologies

A Local Area Network (LAN) connects devices within a small geographic area, offering high-speed connectivity and can be either wired or wireless. Common LAN technologies include Ethernet, Wi-Fi, Token Ring, and FDDI, each with unique characteristics and advantages. Multiple access schemes like CSMA/CD and Token Passing are used to manage device communication, while MAC addressing identifies devices on the network.

Uploaded by

joeris2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views4 pages

LAN Technologies

A Local Area Network (LAN) connects devices within a small geographic area, offering high-speed connectivity and can be either wired or wireless. Common LAN technologies include Ethernet, Wi-Fi, Token Ring, and FDDI, each with unique characteristics and advantages. Multiple access schemes like CSMA/CD and Token Passing are used to manage device communication, while MAC addressing identifies devices on the network.

Uploaded by

joeris2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

LAN Technologies

Local Area Network (LAN)


A Local Area Network (LAN) is a computer network that spans a small geographic area, typically within
a building or campus. LANs are used to connect devices such as computers, printers, and servers,
allowing them to communicate and share resources.
Key Characteristics:

 Geographic Scope: LANs cover a small geographic area, typically within a building or campus.
 High-Speed Connectivity: LANs provide high-speed connectivity, typically in the range of 10 Mbps
to 10 Gbps.
 Private Ownership: LANs are typically owned and managed by a single organization.
 Wireless or Wired: LANs can be wireless (Wi-Fi) or wired (Ethernet).

Common LAN Technologies:

 Ethernet: A wired LAN technology.


 Wi-Fi: A wireless LAN technology.
 Token Ring: A wired LAN technology.
 FDDI: A wired LAN technology.

1. Ethernet
Ethernet is the most widely used LAN technology, utilizing twisted-pair or coaxial cables to connect
devices. It operates at the data link layer (Layer 2) of the OSI model and supports speeds up to 10 Gbps.
Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for medium access
control, allowing devices to share the network medium efficiently.
Key Characteristics:

 Physical Layer: Ethernet operates at the physical layer (Layer 1) of the OSI model, defining the physical
means of transmitting data between devices.
 Data Link Layer: Ethernet also operates at the data link layer (Layer 2) of the OSI model, providing
error-free transfer of data frames between devices.
 CSMA/CD: Ethernet uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for
medium access control, allowing devices to share the network medium efficiently.
 Speed: Ethernet supports various speeds, including 10 Mbps, 100 Mbps, 1 Gbps, and 10 Gbps.
 Cabling: Ethernet uses twisted-pair or coaxial cables for connectivity.

Advantages:

 Reliability: Ethernet is a reliable technology, providing error-free data transfer.


 Speed: Ethernet supports high speeds, making it suitable for demanding applications.
 Scalability: Ethernet is scalable, allowing for easy expansion of networks.

Disadvantages:

 Cost: Ethernet requires physical cabling, which can be costly to install.


 Limited Range: Ethernet has limited range, requiring repeaters or switches to extend network coverage.

Variations of Ethernet also used as LAN technologies


Fast Ethernet
Fast Ethernet is an extension of Ethernet, supporting speeds up to 100 Mbps. It uses CSMA/CD for
medium access control and is widely used in networks that require higher speeds than traditional
Ethernet.
Gigabit Ethernet
Gigabit Ethernet is another extension of Ethernet, supporting speeds up to 1 Gbps. It uses CSMA/CD for
medium access control and is commonly used in high-speed networks.
10-Gigabit Ethernet
10-Gigabit Ethernet is the latest extension of Ethernet, supporting speeds up to 10 Gbps. It uses
CSMA/CD for medium access control and is typically used in high-speed networks that require fast data
transfer rates.
2. Token Ring
Token Ring is a LAN technology that uses a ring topology, where devices are connected in a circular
configuration. It operates at the data link layer (Layer 2) of the OSI model and supports speeds up to 16
Mbps. Token Ring uses Token Passing for medium access control, where a token is passed around the
ring, allowing devices to transmit data when they possess the token.
3. FDDI (Fiber Distributed Data Interface)
FDDI is a LAN technology that uses fiber optic cables to connect devices. It operates at the data link
layer (Layer 2) of the OSI model and supports speeds up to 100 Mbps. FDDI uses Token Passing for
medium access control, similar to Token Ring.
4. Wi-Fi (Wireless Fidelity)
Wi-Fi is a wireless LAN technology that operates at the physical layer (Layer 1) and data link layer
(Layer 2) of the OSI model. It supports speeds up to 9.6 Gbps and uses Carrier Sense Multiple Access
with Collision Avoidance (CSMA/CA) for medium access control. Wi-Fi allows devices to connect to the
network without the need for physical cables.
Multiple Access Schemes
Multiple Access Schemes are protocols that enable multiple devices to share a common communication
medium, such as a cable or wireless channel, while minimizing collisions and ensuring efficient data
transmission. These schemes are essential in computer networks, as they allow multiple devices to
communicate with each other without interfering with one another.
Types of Multiple Access Schemes:

1. CSMA (Carrier Sense Multiple Access)


 Devices sense the medium before transmitting
 If the medium is busy, devices wait and retry
2. CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
 Used in Ethernet networks
 Devices sense the medium before transmitting
 If a collision occurs, devices wait and retry
3. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
 Used in wireless networks
 Devices sense the medium before transmitting
 If a collision is predicted, devices wait and retry
4. Token Passing
 Used in Token Ring networks
 A token is passed around the ring
 Devices can only transmit when they possess the token
5. TDMA (Time Division Multiple Access)
 Used in wireless networks
 Devices are assigned time slots for transmission
6. FDMA (Frequency Division Multiple Access)
 Used in wireless networks
 Devices are assigned frequency bands for transmission
7. CDMA (Code Division Multiple Access)
 Used in wireless networks
 Devices use unique codes to transmit data

Switched vs Shared Ethernet


Shared Ethernet

 A traditional Ethernet network where all devices share the same bandwidth
 Devices compete for access to the network using CSMA/CD (Carrier Sense Multiple Access with
Collision Detection)
 Collisions occur when multiple devices transmit simultaneously, reducing network efficiency
 Typically used in older Ethernet networks (e.g., 10Base-T, 100Base-T)

Switched Ethernet

 A modern Ethernet network where each device has a dedicated connection to a switch
 Switches manage traffic and reduce collisions using MAC address tables
 Each device has its own bandwidth, improving network efficiency and reducing collisions
 Typically used in modern Ethernet networks (e.g., Gigabit Ethernet, 10-Gigabit Ethernet)

Key Differences:

 Bandwidth: Switched Ethernet provides dedicated bandwidth per device, while Shared Ethernet shares
bandwidth among all devices.
 Collisions: Switched Ethernet reduces collisions using MAC address tables, while Shared Ethernet uses
CSMA/CD to manage collisions.
 Scalability: Switched Ethernet is more scalable, supporting larger networks and higher speeds.
 Security: Switched Ethernet provides improved security, as each device has a dedicated connection and
can be isolated if necessary.

Advantages of Switched Ethernet:

 Improved network efficiency and performance


 Reduced collisions and errors
 Increased scalability and flexibility
 Enhanced security features

Disadvantages of Shared Ethernet:

 Reduced network efficiency due to collisions


 Limited scalability and flexibility
 Security risks due to shared bandwidth

MAC Addressing
MAC (Media Access Control) addressing is a unique identifier assigned to network interfaces for
communications on a computer network. MAC addresses are used to identify devices at the data link
layer (Layer 2) of the OSI model.
Key Characteristics:

 Unique Identifier: MAC addresses are unique to each network interface.


 48-Bit Address: MAC addresses are 48-bit addresses, typically represented in hexadecimal format (e.g.,
00:11:22:33:44:55).
 Assigned by Manufacturer: MAC addresses are assigned by the device manufacturer.
 Used for Local Communications: MAC addresses are used for local communications within a network
segment.

How MAC Addresses Work:

1. Device Identification: A device's MAC address is used to identify it on a network.


2. Frame Formatting: When a device sends data, it formats the data into frames, including the
source and destination MAC addresses.
3. Switching and Routing: Network switches and routers use MAC addresses to forward frames to
the intended recipient.

Types of MAC Addresses:

 Unicast MAC Address: A unique address assigned to a single device.


 Multicast MAC Address: An address shared by multiple devices.
 Broadcast MAC Address: An address that sends data to all devices on a network.

Importance of MAC Addresses:

 Device Identification: MAC addresses ensure accurate device identification.


 Network Security: MAC addresses can be used to filter and secure network traffic.
 Network Troubleshooting: MAC addresses aid in diagnosing network issues.

You might also like