You are on page 1of 4

LANs, WANs, and NETWORK MODELS

Local Area Network: data network restricted to a single geographic location, enc
ompasses an area like a office building or school. connects workstations to shar
e files and resources.
Wide Area Network: spans more than one geographic location, often connects separ
ated LANs. also referenced as a Metropolitan Area Network, but a MAN is technica
lly smaller than a WAN.
Network Models
Peer-to-peer: decentralized network model offering no centralized
storage of data or centralized control over the sharing of files or
resources. Does not work well with large numbers of systems! Lack of
centralized data storage make it difficult to locate and back up
key files. Rule of thumb is to have no more than ten computers
connecte
d to a peer-to-peer network.
Client/Server: most widely implemented model and the one most
encountered in real-world environments. enables centralized network
management of all network services such as user management, security,
and backup procedures. Despite the increased cost due to the need for
skilled personnel and dedicated software, the perks of having
centralized management, storage, adminstration, and security make this
the model of choice
Comparing PTP and Client/Server
The client computer in the client/server model requests the data from
the server and presents the data to the user.
PTP models only recommene up to 10 computers, while CS models can have
up to thousands, depending on server size, hardware, and budget.
PTP models don't require an admin; each person is responsible for their
own system. CS models require a network admin.
Each person is also responsible for securing files and devices
connected to the system on PTP models, while an administrator manages
security from a central location with CS models.
PTP models are less expensive than CS models.
And are easier to configure.
Centralized vs Distributed
Centralized: One system provides the data storage and processing power
for client systems. Associated with mainframes/dumb terminals. Rare.
Distributed: Processing power is distributed between the client systems
and the server. Most modern networks have client workstations that
share processing responsibilities.
NETWORK TOPOLOGIES
Topology is a network's physical and logical layout, with physical
being the actual layout of cables, etc. and logical being the way the
network appears to devices that use it.

Bus Topology: uses a trunk or backbone to connect computers to the


network. systems connect using T connectors. to avoid signal
reflection, a physical bus topology requires that each end of the
physical bus be terminated, with one end being grounded. Loose/missing
terminators disrupt data transmissions. most common implementation is
the IEEE 802.3 standard
Pros/Cons: cheap and easy to implement, but also difficult to
troubleshoot, and breaks in the cable prevent network access
for all systems.
Ring Topology: the data travels in a circular fashion from one computer
to another on the network. if a computer/cable fails, the signal is
interrupted and the entire network becomes inaccessible. Not good in
environments where the network changes often because disruption occurs
when computers are added/removed. Fault-tolerant design uses a primary
and secondary ring that can be used if the primary fails.
Pros/Cons: network is easy to install and troubleshooting is
easier, but any additions to the network or breaks in the
cables will disrupt the entire network.
Star Topology: each computer/network device connects to a hub/switch
via point-to-point connection between the device and the hub. network
can be expanded without dispruption, and breaks in the cable don't
affect the entire network.
Pros/Cons: Easily expanded and easy to troubleshoot, but more
expensive, and any devices connected to the switch would lose
access to the network if the switch fails.
Mesh Topology: each computer on the network shares a point-to-point
connection between every other device on the network. if one network
fails, the data would have an alternate path to get to its destination.
More popular with servers or routers.
Pros/Cons: Network can be expanded without disruption and
creates redundant paths between topologies, but requires more
cable and implementation can be complicated.
Multiprotocol Label Switching: uses short labels to direct packets and
forward them through the network, as opposed to the packet traveling
from one router to the next. MPLS analyzes the packet only one time,
and then creates a channel for a sequence of packets to reach their
destination, with each packet having an assigned label associated with
its path.
WIRELESS TOPOLOGIES
Infrastructure: uses access points to extend a wired LAN to include
wireless devices. all transmissions between two wireless stations or
a system and a wired network client go through access points.
Ad Hoc: devices communicate directly between themselves wihout using an
access point. a quick method for sharing files and resources between a
small number of systems
Point-to-Point: communication links travel from one node directly to

another. usually connects two remote locations, but lack of redundancy


results in a failure of available communication if the link should
fail.
Point-to-Multipoint: links multiple wired networks. signals travel from
a central node. reliability of the topology depends on the strength
of the quality of the central node and connecting nodes.
Wireless Mesh: each network node connects to other nodes on the
network. data can travel multiple paths, adding nodes provide new paths
for other nodes. Self-healing (adapts to network failure should a node
be moved), Scalable (you can add to the network without needing
cables), Reliable (redundant number of paths), Cost-efficient (selfconfiguring, no cables needed)
HYBRID TOPOLOGIES
Combinations of wired/wireless topologies.
VIRTUAL PRIVATE NETWORKS
VPNs extend a LAN by establishing a remote connection using a public
network. provides a point-to-point link between two points over a
public IP network, allowing access to resources as if locally logged on
to the network.
VPN client: initiates connection to the VPN server
VPN server: authenticates connections from VPN clients
Access method: IP-based network that is used to access the VPN server
VPN protocols: establish, manage, and secure data over the VPN
connection. PPTP and L2TP enable authentication and encryption in VPNs.
** VPNs support analog modems, Integrated Services Digital Network,
wireless connections, and broadband connections such as cable and DSL.
Pros and Cons:
Cost: Using the Internet as an infrastructure would cut the
cost of needing private connections to link clients and also
cut the
need for support personnel for support.
Easy scalability: Employees who have laptops can simply get on
the web and access the private network.
Security: VPNs use security protocols to address data security,
but data administrators must understand data security over
public n
etworks to ensure that data is not tampered with or
stolen.
Reliability: VPN communication depends on the public network
and is not under an organization's direct control, relies on
the qual
ity of the ISP.
VIRTUAL LOCAL AREA NETWORKS
VLANs are groups of connected computers that act as if they are on
their own network segments. can enable all personnel to be combined and
access network resources as if they were connected on the same physical

segment. VLANs enable you to create multiple broadcast domains on a


witch, basically creating separate networks for each VLAN.

single s

Pros and Cons:


Security: Network segments can be isolated.
Performance: Reduces broadcast traffic, freeing up bandwidth.
Organization: Users/Resources that communicate frequently can
be grouped in a VLAN.
Administration: Easier to move users between LAN segments,
recable, address new stations, and reconfigure switches.
VLAN Membership
Protocol-based VLANs: computers are assigned to VLANs using the
protocol in use and the Layer 3 address. enables an
Internetwork Pac
ket Exchange or a particular IP subnet to have
its own VLAN. Layer 3 ad
dress refers to the Open Systems
Interconnect reference model, wh
ich describes a network
architecture that enables data to be pas
sed between computer
systems. Layer 3 (Network Layer) identifies mech
anisms by which
data can be moved between two networks or system
s.
Port-based VLANs: require that specific ports on a network
switch be assigned to a VLAN. switches determine VLAN
membership by ta
king note of the port used by a particular
packet.
MAC address-based VLANs: MAC address type of a VLAN assigns
membership according to the workstation's MAC address.
workstations can
be moved anywhere without needing to be
reconfigured. MAC addres
ses don't change, so the workstation
remains a member of the VLAN.
VLAN Segmentation
Segmenting a LAN provides flexibility, organization, and
security.

You might also like