Local Area Network A local Area Network (LAN) is a type of network typically used and connected in a small area, for instance, home, office, school or groups of building, in order to communicate with one another and share resource, such as printer or scanner. Those devices could be connected between each other by wired cable or wireless links, which is typically used as a standard LAN technology called IEEE 802.11. Usually, a local area network consists of computers and peripheral devices connected to a local domain server, which are used to share printers and other resources, such as disk storage, games or applications. Each LAN is either independent from any network or connects to other LANs, and, moreover, can additionally connect to Internet called Wide Area Network (WAN). In terms of practical use, a home network is typically individual LANs and multiple LANs, which refers to a home network setting up a guest network. In this paper, I will expound the main components making up a local area network (LAN), as well as technologies used to build a LAN. Network Components of LANs As mentioned in Cooper (n.d), the main role of a local area network is to connect computers or peripheral devices together in order to exchange data. Not only do LAN include computers and other devices, it requires six critical components to function of making up a local area network, which will be expounded as the following below. • Network Adapter: is an important component of making up LANS, which is used to connect a network and convert computer data into electronic signals. In order to move data packet to and from network interface cards to different shared channels, network adapter associates with network access element named Media Access Control ... ... middle of paper ... ...s to translate the packet back into meaningful form and utilize it with suitable application. Technologies Used to Build a LAN According to Mitchell (2016), WiFi or Ethernet is a modern local area network used for connecting with different devices. Typically, a traditional Wi-Fi LAN operates a single or a few of wireless access points for providing a service to devices within the signal range. The role of access point is to manage networking traffic from connected devices. In terms of home LAN, the access point is wireless broadband routers to perform this role. A traditional Ethernet LAN comprises of one or more switches, hubs or routers, in which each device connects to by Ethernet cables. The network protocol used on LANs is Internet Protocol (IP) and, nowadays, almost networking operating systems have built-in contributing for the required TCP/IP technology.
The Unistep IRP Elexol EtherIO 24 Module is a network board that is integrated with features that allow multiple devices over the same network to communicate. This microcontroller was designed to be implemented as an addition to a larger network system; the multiple features and capabilities allow for various industrial and home applications. Ethernet is very common and used in most networks, which makes the IRP a great candidate for networking problems both at home and in the work field.
... access to what and in which sequence. The router connects the LAN to other networks, which could be the Internet or another corporate network so that the LAN can exchange information with networks external to it. The most common LAN operating systems are Windows, Linux, and Novell. Each of these network operating systems supports TCP/IP as their default networking protocol. Ethernet is the dominant LAN standard at the physical network level, specifying the physical medium to carry signals between computers, access control rules, and a standardized set of bits used to carry data over the system. Originally, Ethernet supported a data transfer rate of 10 megabits per second (Mbps). Newer versions, such as Fast Ethernet and Gigabit Ethernet, support data transfer rates of 100 Mbps and 1 gigabits per second (Gbps), respectively, and are used in network backbones.
COMP09022 Network Design BSc COMPUTER NETWORKING COMP09022 ICMPv6 Prepared by B00270675 13-03- 2015 WORD COUNT (0000) TABLE OF CONTENTS TITLE PAGE……………………………………………... 1 TABLE OF CONTENTS………………………………….. 2 INTRODUCTION TO THE REPORT……………………. 3 TABLE OF FEATURES.......................................................4
Wireless networks – While the term wireless network may technically be used to refer to any type of network that is wireless, the term is most commonly used to refer to a telecommunications network whose interconnection between nodes is implemented without the use of wires, such as a computer network. Wireless telecommunication networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves, such as radio waves, for the carrier and this implementation usually takes place at the physical level or “layer” network.
In conclusion, a local area network is made up of computers and a myriad of devices, such as routers, servers, switches, and firewalls. In order for it to connect to the Internet, a router must be installed. Servers provide special functions such as printing, file sharing, etc. Switches connect the computers together from different parts of the network. Firewalls prevent unauthorized access. There are a host of other devices that may be used as well. These devices are hubs, gateways, repeaters, wireless access points,
In a computer network, switches are devices that are used to connect devices together. Multiple cables can be connected to a switch to enable networked devices to communicate with each other. The role of a switch is to manage the flow of data throughout a network and this process is effective in its role due to the fact that the messages are sent only to the intended target. The media access control (MAC) is the identification that each device connected to the switch carries. By each device having individual IDs this increases the overall effectiveness and security of a network.
...vantage of the overall network design and implement usable subnets with virtual local area networks. Use encryption and encapsulation to secure communications of public segments to enable extranets and cross-Internet company traffic. Use items such as intrusion detection systems and firewalls to keep unauthorized users out and monitor activity. Taken together, these pieces can make a secure network that is efficient, manageable, and effective.
A network can be based on either a peer-to-peer level or server-based, also referred to as domain-based. To distinguish the difference, a peer-to-peer network, also known as a workgroup, is a network in which a group of computers are connected together to share resources, such as files, applications, or peripherals. The computers in a peer-to-peer network are peers to one another, meaning no single computer has control over one another. There is also no central location for users to access resources, which means that each individual computer must share their files in order for other computers to have access (Muller, 2003, p.411). “In a peer-to-peer environment, access rights are governed by setting sharing permissions on individual machines.” (Cope, 2002) On the other hand, in a domain-based network, the computers connected together are either servers or clients. All of the other computers connected to the network are called client computers. The server is a dedicated machine that acts as a central location for users to share and access resources. The server controls the level of authority each user has to the shared resources. When logging on to the network, users on client machines are authenticated by the server, based on a user name and password (Lowe, 2004, p.13).
When we have the capabilities to monitor the activities of anyone on a network, the first problem that most American people think of is invasion of privacy.
In this modernize world, internet and network are very vital and important not only for individuals but also for companies, organization, institution, etc. Because of this, it is very important to make use of as many network devices available. We need to study more or at least to have a glimpse of information about the networking devices before we choose or start using it. There are many networking device out there that able for us to study but the chosen device for this report are hub, switch, router and repeater.
The purpose of this paper is give a summary of the function and use of Routers in today’s information age. To cover the complete subject of routers and routing, would be beyond the scope of this research paper. However the basic definition of a router is “ A device used to connect networks of different types, such as those using different architectures and protocols. Routers work at the Network layer of the OSI model. This means they can switch and route packets across multiple networks. They do this by exchanging protocol-specific information between separate networks. Routers determine the best path for sending data and filter broadcast traffic to the local segment.”
One of the latest advancements in wireless data. It is used in GSM (Global System for Mobile Communications) for transferring data in packets.
Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing Internet wirelessly at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly by a router. By transmitting signals at 2.4 or 5 GHz it allows the waves to transmit more data at a faster rate. Typical Wi-Fi standards are 802.11a, b, g, n, or ac and they can switch up the frequency depending on the model (Brain). Families can create their own wireless network that can be shared between family members without the use of hooking all their devices up to the modem and can also protect their home network from potential hackers with the use of a TKIP or AES encryption. Businesses can also create a “hotspot” which is an area that has wireless networks for free or at a set fee. This is extremely convenient for commuters that need internet access while they are at work, waiting on a plane, or just sitting at a coffee spot without the need for wires(Cox).
LANs systems can be defined and connected in many different ways. This is the reason for the standardization for every one can have a common ground to start from. “The LANs described Herein are distinguished from other types of data networks in that they are optimized for a moderate size geographic area such as a single office building, warehouse, or a campus. The IEEE 802 LAN is a shared medium peer-to-peer communications network that broadcasts information for all stations to receive. As a consequence, it does not inherently provide privacy. The LAN enables stations to communicate directly using a common physical medium on a point-to-point basis without any intermediate switching node being required. There is always need for an access sublayer in order to arbitrate to access to the shared medium. The network is generally owned, used, and operated by a single organization. This is in contrast to Wide Area Networks (WANs) that interconnect communication facilities in different parts of a country or are used as a public utility. These LANs are also different from networks, such as backplane buses, that are optimized for the interconnection of devices on a desk top or components within a single piece of equipment.”(IEEE 802 Standard 1990) That is the standard definition for LANs by Institute of Electrical and Electronics Engineer committee 802. They are the committee used to set the standard in workmanship and operations for technicians that set-up and perform maintenance on LANs systems. And through all the technical words what they are trying to say is a LAN is a small area network that distributes information among computer in a small work environment unlike WANs that distribute information across global areas.
Wireless local area networks (WLANs) have the potential to improve the flexibility, productivity, and the quality of work life of an enterprise (Sage Research Staff, 2001). Berean Institute is a typical two year college with about a staff of sixty eight employees and 250 students per semester. Berean teaches cosmetology, barbering and the latest software and hardware technology, which is located in Philadelphia, Pennsylvania. Berean currently has two locations in the Philadelphia area and using a Local Area Network (LAN).