LAYER CONCEPTS-NETWORKS
#1

LAYER CONCEPTS-NETWORKS

[attachment=18214]

LIFE CYCLE OF LAN

Analysis phase
• Looking into the problem and analyzing the options available for solving the problem.
• It is aimed at what the system should do and how it should it.
Eg.(1)The students have to work with a central server in a programming lab.(2)how many students?(3)what application?(4)need a high speed connection?
Design Phase
• The purpose of this phase is to determine how the requirements of the specification are to be met.
• Should include drawings and documentation of the network.
• The overview of the s/w to be installed should be prepared.

Implementation
• This involves physical installation of LAN.
• Cables are run, soft wares are installed, Commuters and other hardwares are put in place.
• Users are trained for using it.
Integration and System tesing
• Testing whether the meet the specifications. resources are added more and more to test the efficiency.
• Simulated hacking and intuitions are made to test security.

Operation and maintenance.
• This phase is important .
• If the network crashes ,or security is broken, results in serious consequences.
• There should be specially trained employees to watch the operation of n/w and maintain it



DATA LINK or LINK LAYER



• LLC protocols deals with establishing a connection oriented low level service between the peer machine.
• LAN model have additional layer called MAC which controls access to a medium, resolving the conflicts between the mutually competing machines on a LAN.
• MAC is responsible for routing the LAN.
• IEEE 802.x networks are peer-to-per networks on a shared medium.
• IEEE standards take account toplogies,access methods,transmission media and speeds.



TOKEN RING(MAC)
• Empty information frames are continuously circulated on the ring.
• When a computer has a message to send, it inserts a token in an empty frame (this may consist of simply changing a 0 to a 1 in the token bit part of the frame) and inserts a message and a destination identifier in the frame.
• The frame is then examined by each successive workstation. If the workstation sees that it is the destination for the message, it copies the message from the frame and changes the token back to 0.
• When the frame gets back to the originator, it sees that the token has been changed to 0 that the message has been copied and received. It removes the message from the frame.
• The frame continues to circulate as an "empty" frame, ready to be taken by a workstation when it has a message to send.



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Mobile Ad Hoc Networks project uploader 1 1,751 20-12-2012, 12:31 PM
Last Post: seminar details
  SSL – Secure Socket Layer seminar details 1 1,134 12-11-2012, 01:16 PM
Last Post: seminar details
  Mobile Ad Hoc Networks (MANETs) Are Not A Fundamentally Flawed Architecture seminar details 1 1,393 16-10-2012, 01:41 PM
Last Post: seminar details
  Optical networks seminar addict 1 1,544 10-10-2012, 01:49 PM
Last Post: seminar details
  Optical Networks ppt seminar details 1 1,858 10-10-2012, 01:49 PM
Last Post: seminar details
  Post-Fault Restoration in Multi-Domain Networks with Multiple Failures seminar details 0 899 11-06-2012, 05:45 PM
Last Post: seminar details
  Secure Data Collection in Wireless Sensor Networks full report seminar details 0 1,155 09-06-2012, 05:40 PM
Last Post: seminar details
  DISTRIBUTED DATABASE ARCHITECTURE FOR GLOBAL ROAMING IN FUTURE MOBILE NETWORKS seminar details 0 979 08-06-2012, 05:22 PM
Last Post: seminar details
  Blocking Misbehaving Users in Anonymizing Networks seminar details 0 910 08-06-2012, 01:00 PM
Last Post: seminar details
  Design of p-Cycles for full node protection in WDM Mesh Networks seminar details 0 937 07-06-2012, 04:15 PM
Last Post: seminar details

Forum Jump: