Control of Wide Area Networks Steven Powell Frederick Gallegos Payoff

Size: px
Start display at page:

Download "87-01-45.1 Control of Wide Area Networks Steven Powell Frederick Gallegos Payoff"

Transcription

1 Control of Wide Area Networks Steven Powell Frederick Gallegos Payoff This article describes the various types of wide area networks and their access methods and connective devices, communications protocols, network services, and network topologies. It also describes the automated tools that are currently available for network monitoring, and provides a brief introduction to the Internet. Introduction Local area networks (LANs) have become commonplace in most medium and large companies. Now, wide area networks (WANs) have become the next communications frontier. However, WANs are much more complicated than LANs. In most WAN environments, the more devices an individual has to manage, the more time-consuming is the process of monitoring those devices. Complexity also increases very rapidly due to the fact that each new device on the network invariably has to interface with many existing devices. In order to get a further understanding of WANs, it is useful to explore the differences between WANs and LANs. LANs are defined as communications networks in which all components are located within several miles of each other and communicate using high transmission speeds, generally 1M-bps or higher. They are typically used to support interconnection within a building or campus environment. WANs connect system users who are geographically dispersed and connected by means of public telecommunications facilities. WANs provide system users with access to computers for fast interchange of information. Major components of WANs include CPUs, ranging from microcomputers to mainframes, intelligent terminals, modems, and communications controllers. WANs cover distances of about 30 miles, and often connect a group of campuses. WANs are usually static in nature. Changes to them require rerouting telephone lines and installing modems. LANs on the other hand can be quickly reconfigured; communications lines are set up and rerouted more easily and gateways to host computers can be quickly added. Types of Wide Area Networks There are two basic types of WANs: centralized and distributed. Centralized WANs consist of a mainframe or minicomputer that serves remotely distributed dumb terminals. Network managers lease communications channels from a common long-distance carrier and tie together terminals and the central computer using a star (or other) topology. (WAN topologies are described in more detail later in this article.) Communications is fairly straightforward; the smart computer polls the dumb terminals to find out if they have anything to transmit, and then it controls data transmission so that there are no collisions. Distributed networks provide an environment that allows independent computers to have equal levels of control in the communications architecture. Distributed networks have grown as smart computers have increased throughout organizations. Today's packet WAN technologies are capable of supporting worldwide transmission at rates that are less than LAN transmission rates. (LANs support transmission rates of 100M-bytes and higher over relatively short distances.)

2 Benefits of Wide Area Networks WANs provide a number of benefits, including: Allowing network expansion and terminal changes to be accomplished through plug-in connections over wide area locations. Support of a variety of applications and a large number of terminals. Facilitating interconnectivity by means of gateways, bridges, and routers. Distributing terminals to the most convenient locations rather than forcing them to remain in a more centralized area. Centralized network management and monitoring of use and performance to ensure maximum reliability and availability. These benefits help make users more effective in their jobs. Networking over wide areas also helps reduce or eliminate the expensive costs of gathering teams of people together. A US manufacturing team can now work closely with a team in Germany using such services as electronic mail and computer video conferencing. Elements of Wide Area Networks WANs differ according to their access methods, connective hardware and software, communications protocols, types of network services, and network topologies. These differences affect network installation, growth, and operating costs. In addition, WANs depend on the network management system for efficient and reliable operation. The following sections describe these elements. Access Methods Connections to remote networks may be accomplished over public data networks or private lines provided by long-distance and interexchange telephone carriers. The Internet requires the use of 32-bit addresses, which are administered by the Network Information Center. Locally administered private networks should encourage use of addresses that are compatible with Internet addresses to facilitate connection to the Internet. Connective Devices Information is transmitted over WANs in packets. In addition to user data, these packets contain information necessary for network management and protocols that permit local and remote devices on the network to recognize one another. For example, each packet contains address information which is necessary to ensure the correct routing of the packet. Bridges and routers are the primary connective devices used to handle these transmissions. Bridges. A bridge is a hardware and software device used to connect networks using various media and signalling systems. Bridges operate at the data-link layer of the open systems interconnection model. Bridges read and filter data packets and frames, passing traffic only if the address is on the same segment of the network cable as the originating station. (Frames contain information that is necessary for reassembling the messages contained in

3 packets after they reach their destination. There are two types of frames: control frames for link management and information frames for the transfer of information.) Routers. A router is a sophisticated hardware and software device that connects local and wide area networks. It serves packets or frames containing certain protocols, and it routes packets using network layer protocols. Multiprotocol routers can operate in heterogeneous environments by simultaneously using multiple protocols. Protocols WAN protocols are designed to provide connections for many devices within a wide area. Their purpose is to support a peer network of terminals, microcomputers, and hosts. A number of WAN protocols are available, including TCP/IP (which is the combined acronym for a pair of networking protocols, the Transmission Control Protocol [TCP] and the Internet Protocol [IP]). The TCP/IP protocols provide the prim ary communications procedures for the Internet. IBM's Systems Network Architecture (SNA) is designed to provide communications compatibility among microcomputers, minicomputers, and mainframes. For example, it can be used to connect IBM token-ring LANs to a host environment. Network Services Frame relay and asynchronous transfer mode (ATM) are technologies used to support network traffic. Their method of operation is described in the following paragraphs. The appendix at the end of this article provides a listing of selected vendors of frame relay and ATM products. Frame Relay Network Services. Frame relay is an extremely flexible and cost-effective technology that supports variable network traffic. Service bandwidth is scalable from 56K bps to 2.048M bps, and it offers a variable-length frame size from 262 bytes to 8K bytes. Frame relay allows users to gain the advantages of high-speed circuits without having to run dedicated links between all the endpoints on a private network. The other major advantage of frame relay is its minimal packet overhead. Asynchronous Transfer Mode Network Services. Asynchronous transfer mode (ATM) refers to a high-bandwidth, low-delay switching and multiplexing technology. ATM network services provide a foundation for high-speed data transmission, LAN connectivity, imaging, and multimedia applications. ATM is based on cell-switching technology that is equally effective at transmitting voice, video, and data at high speeds. ATM is better suited than packet-switching to real-time communications (e.g., video) because it uses standard-length cells with small headers containing packet and address information. ATM supports transmission speeds of up to 622M-bps. It supports services requiring both circuit-mode information transfer capabilities (characterized by a constant bit rate) and packet-mode capabilities (characterized by a variable bit rate).

4 The Network Management System Every major business wants to have the most efficient and economical operation of the corporate network. In order for a business to achieve this, it must effectively manage the computer and communications resources over the wide area network. Because most businesses buy their networking products from more than one vendor, network management systems must be able to support a wide variety of equipment on the same network. This diversity makes the task of management and troubleshooting more challenging. (Network management software is discussed later in this article.) Network Topologies Although the star topology is the most popular WAN topology, a number of other network topologies are available. Each of the these topologies has consequences with respect to reliability and availability. Star Topology. The star topology is highly reliable; loss of one node results only in the loss of a single line. Loss of that line prevents communication between the hub and the affected node, but all other nodes continue to operate normally. This topology is more limited with respect to ensuring availability. The network can only support the level of traffic that can be handled by the hub. In some cases, the hub is only able to handle one request at a time, which can cause serious delays during peak workloads. Ring Topology. The ring topology uses link segments to connect adjacent nodes; each node is actively involved in the transmission of tokens to and from other nodes. The loss of a link causes operation of the entire network to cease. Therefore, this topology is not considered very reliable. The ring topology is less effective than the mesh topology at ensuring availability of network services, but it is more effective than the star topology. Its effectiveness is limited because each node on the ring must wait to receive the token before transmitting data. Bus Topology. The bus topology is also not considered reliable. If the link fails, the entire segment connected to that link also fails. However, if the node fails, the rest of the network will continue to operate. The availability of network resources using this topology depends on the access control protocol used, the length of the bus, and the transmission load. Under a light load, availability is virtually assured, but as the load increases so too does the chance of collisions among transmissions. The chance of collisions also increases with greater bus length. Mesh Topology. This kind of topology is highly reliable, because it provides a diverse set of transmission routes. If one segment of the line fails, the rest of the line is not affected. Because of its multiple transmission paths, mesh topology also provides a high level of availability.

5 Hybrid Topology. The hybrid topology is highly reliable; the failure of one node does not affect the operation of other nodes. It also provides a high degree of availability because it provides a large number of connections to users. Tools for Network Monitoring A number of automated tools can assist the security specialist in identifying risks to network security. These include: Protocol analyzers. Network monitors. Network management software. General statistical tools. Hybrid tools. The following sections describe each of these types of tools. Protocol Analyzers Protocol analyzers can be used to observe data packets as they travel across a network, measure rates of line use, and simulate traffic to gauge changes in the network configuration. They are designed to capture and decode data packets, breaking traffic down according to the seven-layer OSI reference model. The device is physically connected to the network segments being monitored. Wandell & Goltermann's DA-30 is an example of a protocol analyzer. As described next, a WAN protocol analyzer is a specialized type of protocol analyzer. WAN Protocol Analyzers High-speed WAN protocol analyzers can be used to help network and security specialists plan and maintain multiple LANs linked to WAN services. With their unparalleled packet-filtering capabilities, these instruments are able to monitor overall network activity, view organizational data traffic patterns, simulate new circuits, and pinpoint problems. WAN analyzers allow the user to track exactly how much of a leased line is being used for a particular protocol. These analyzers can also capture and store data samples and filter out specific data packets for scrutiny. WAN analyzers are being developed with capabilities to provide fault management filters and rule-based judgments, performance trend analysis, and reports that identify problems and assign responsibility for its diagnosis and tracking. For efficient monitoring and diagnosis, it is vital that the analyzer be able to filter out specific packets from the overall data stream. This requires that the analyzer keep pace with system line speeds so that it does not overlook packets that may be critical to the network. In practice, most high-speed WAN protocol analyzers do not really filter data at the full rate of a T1 line. And the filtering and decoding processes further slow down the analyzer's operation. Because of this, most vendors of protocol analyzers specify a frame rate for their products, indicating the number of packets or frames per second that the analyzer can process. The vendors also specify the size of frames for which rates are given.

6 Most analyzers come with simulation programs that allow network managers to gauge the possible effects of specific types of data traffic on WAN circuits. With this software, sample packets are actually launched onto the network so that the analyzer can measure the effects of adding different types of protocol loads. (Running simulation applications may require shutting down network traffic.) Because most analyzers already have sophisticated packet filtering and time-stamping capabilities, it is relatively easy to add statistical software for data sampling and analysis. Such statistical packages can generally be run without interfering with network traffic. Network Monitors Network monitors track and statistically analyze traffic on network segments. As with protocol analyzers, the device is physically connected to the segments being monitored. Sample products include Network General's Distributed Sniffer System and Concord Communications Trakker. Network Management Software Network management software and workstations are designed to monitor and report on the conditions of such network elements as bridges, routers, and hubs, typically displaying information using multicolored icons on a map. These products typically use the Simple Network Management Protocol (SNMP). A number of products are available, including Hewlett-Packard's HP-OpenView, Sun Microsystems' SunNet Manager, IBM's NetView/6000, and E-Comms' E-Commander. Novell's NetWare 4.1 offers reliable network security and data integrity services. General Statistical Tools These tools are designed primarily to provide statistical information about network performance. They typically track CPU and memory levels of use, free disk space, and network I/O. Among the available products is Hewlett-Packard's PerfView. Hybrids It should be noted that many products are actually hybrids that offer elements of two or more of the preceding categories of monitoring tools. For example, many network management stations include the statistical analysis capabilities of network monitors; some network monitors provide basic protocol analysis capabilities. Among hybrid products that combine traffic monitoring, protocol analysis, and network mapping are the Distributed Sniffer System and Trakker (both introduced above), Metrix of Nashua's NetMetrix, ProTools' Network Control Series, EMC's DataReach, and TimeFinder. The Internet The Internet was started in the 1960s by the US Defense Department's Advanced Research Projects Agency to link the department with its suppliers. Today, the Internet is a worldwide collection of millions of computers tied together by means of high-speed communications lines to form an apparently single network. The Internet provides an electronic forum in which people can share information and ideas, exchange and data, use remote computers, and access public-domain information and software. Corporate customers now represent the fastest growing segment of the overall Internet user population. They use the Internet for many reasons, including file transfers, electronic mail, system maintenance, and interactive sessions. For example, one chemical company

7 uses the Internet to disseminate the results of its research; the company prefers using Internet because it is available 24 hours a day, every day. An oil company uses the Internet to transmit maps and land surveys to remote locations for oil and gas exploration; the Internet is able to reach nearly 130 countries. Users can connect to the Internet in several ways: dialing in to a personal account on an Internet-connected computer; connecting through a commercial gateway; or subscribing to a commercial service. Personal Accounts With this first alternative, service is limited to certain levels of access for example, access to USENET (an Internet-based news service), services, or file transfer protocol (FTP) services. In addition to obtaining an account on one of these systems, the user must implement a modem and communications package. A monthly connect-time fee is charged; the telephone carrier also charges the user for any long-distance calls. With this approach, the computer is not actually on the Internet it is just acting as a terminal for another computer with a direct Internet connection. The user does not need to run any Internet-protocol software with this approach. But any files the user transfers to server accounts using the Internet FTP must be downloaded using the selected communications software, which can be very expensive. To simplify the downloading process and reduce connection costs, a software access package (e.g., IBM's TalkLink or cute FTP for Windows) can be used to obtain an interface to Internet file transfer services. Commercial Gateways With this approach, users must obtain an official Internet membership for their systems; in effect, they become official Internet nodes. This can be accomplished in several ways. Server Security Server security involves limiting access to data stored on the server. Although this field is primarily the responsibility of the network administrator, the process of publishing data to the Web often requires information systems specialists to take an active hand in installing and implementing the security policy. The two primary methods in which information from databases is published to the Web are the use of static web pages and active dynamic Web page creation. These two methods require almost completely different security mechanisms. Static Web Pages Static Web pages are simply HTML files stored on the server. Many database specialists consider static page creation the simplest and most flexible method of publishing data to the Web. In a nutshell, a client program is written to query data from a database and generate HTML pages that display this information. When published as static Web pages, Web files can be uploaded to any server; for dynamic creation, however, the Web server usually must be modified (or new scripts or application software installed). Static pages have the secondary advantage of being generated by traditional client/server tools such as Visual Basic or PowerBuilder. Because almost any development system can output text files, only the necessary HTML codes must be added to make them Web pages. The creation of the pages, therefore, uses standard methods of database access control such as database security and login controls. Once created, the files must be uploaded to the Web server. Protecting the documents stored there occurs in the same manner that any other Web documents would be secured.

8 One of the most straightforward ways to protect sensitive HTML documents is to limit directory browsing. Most FTP and Web servers allow directories to be configured so that files stored within them may be read but the files may not be listed in the directory. This technique prevents any user who does not know the exact filename from accessing it. Access may be permitted by simply distributing the exact filenames to authorized personnel. Directories may also be protected using the integrated operating system security. Some Web servers allow security limitations to be placed on particular folders or directories using standard operating system techniques (i.e., file attributes) and then use this security to restrict access. This implementation will vary among Web servers. These security implementations to gain access to particular files or folders fall under the userauthentication category of security. Dynamic Page Generation Favored by large organizations, this method is gaining popularity as the technology to generate Web pages instantly from a database query becomes more robust. A dynamic Web page is stored on the Web server with no actual data but instead a template for the HTML code and a query. When a client accesses the page, the query is executed, and an HTML page containing the data is generated on the fly. The necessary data is filled into the slots defined in the template file in much the same way that a mail merge occurs in a wordprocessing program. A program may be active on the Web server to generate the necessary Web page, or a CGI script might dynamically create it. One of the first security issues that a WAN security administrator must confront is setting up access to the database from the Web server. Whether using a CGI script, serverbased middleware, or a query tool, the server itself must have access to the database. Database Connections With most of the dynamic connectors to databases, a connection with full access must be granted to the Web server because various queries will need to access different tables or views to construct the HTML from the query. The danger is obvious: A single data source on the server must be given broad access capabilities. This makes server security crucial. For example, an ODBC data source given full administrator access could potentially be accessed by any other program on the server. A program could be designed to retrieve private information from a data source regardless of whether the program's author is permitted access. This security problem is most dangerous on a system where users are allowed to upload CGI scripts or programs to run on the server. To prevent unauthorized access to your data, make sure that the server that owns the database connector is physically secure and does not permit unrestricted program execution. Table Access Control Standard table access control, if featured in the user authentication system, is more important on Web applications than on traditional client/server systems. DBAs are often lax in restricting access to particular tables because few users would know how to create a custom SQL query to retrieve data from the database. Most access to a database on a client/serve system occurs through a specifically built client that limits access from there. Not so with Web-based applications: Client/server development requires substantial experience, but even some novices can program or modify HTML code, and most user productivity applications such as word processors or spreadsheets that can access databases also save documents as HTML pages. Therefore, more solutions will be created by

9 intermediate users and so valid security is a must. Remember, a little knowledge can be a dangerous thing. User-Authentication Security Authentication security governs the barrier that must be passed before the user can access particular information. The user must have some valid form of identification before access is granted. Logins are accomplished in two standard ways: using an HTML form or using an HTTP security request. If a pass-through is provided to normal database access, traditional security controls can be brought into play. Exhibit 1 shows an example of a standard security login through Netscape Communications Corp.'s Netscape Navigator browser. A Schematic Diagram of Different Types of Layers Involving TCP/IP The HTML login is simply an HTML page that contains the username and password form fields. The actual Ids and passwords are stored in a table on the server. This information is brought to the server through a CGI script or some piece of database middleware for lookup in a user identification database. This method has the advantage of letting the DBA define a particular user's privilege. By using a table created by the DBA, numerous security privileges specific to a particular project can be defined. Once a login has occurred, a piece of data called a cookie can be written onto the client machine to track the user session. A cookie is data (similar to a key and a value in an.ini file) sent from the Web server and stored by the client's browser. The Web server can then send a message to the browser, and the data is returned to the server. Because an HTTP connection is not persistent, a user ID could be written as a cookie so that the user might be identified during the duration of the session. HTML form login security, however, must be implemented by hand. Often this means reinventing the wheel. Not only must a database table or other file be kept to track users and passwords, but authentication routines must be performed, whether through CGI script or via another method. Additionally, unless a secured connection (Please refer to subsection Secure Socket Layer (SSL), both the username and password are broadcast across the network, where they might be intercepted. HTML form login is excellent when security of the data is not paramount yet specialized access controls are required. Browser login is most useful when it is integrated with existing database security through some type of middleware. Even with users properly authenticated, additional security concerns arise. Session Security After the user has supplied proper identification and access is granted to data, session security ensures that private data is not intercepted or interfered with during the session. The basic protocols of the network do not set up a point-to-point connection, as a telephone system does. Instead, information is broadcast across a network for reception by a particular machine. TCP/IP is the basic protocol for transmission on the Internet. The protocol was never designed for security, and as such is very insecure. Because data sent from one machine to another is actually broadcast across the entire network, a program called a packet sniffer can be used to intercept information packets bound for a particular user. Therefore, even though a user has properly logged onto a system, any information that is accessed can be intercepted and captured by another user on the network. There is no easy way to prevent

10 this interception except by encrypting all of the information that flows both ways (see Exhibit 2). Need For Web Protection Levels (Encrypted) Threats Service Type 1. Destru ction2. Interfer ence 3. Modifi cation or replace ment4. Misreprese ntation 5. Adverti sing Basic Basic Strong Basic No Level Secure Internet/Intranet 1. Basic Basic Strong Basic No Inform Level ational 2. Transa ctional Elecro nical Comm erce Reputa tion 6. No Level Inadver tent misuse 7. basic Unauth orizeda ltering/ downlo ading8. No Level Unauth orized transac tion9. No Level Basic Strong Basic Basic Basic Strong Strong Basic Basic Basic Strong Basic Basic Strong Strong Strong Strong Strong Basic Strong Strong Strong

11 Threats Service Type Destruction Interference Modification Misor representation replacement Advertising Basic Basic Strong Basic Secure Internet/ Intranet 1. Informational Basic Basic Strong Basic 2. Transactional Basic Strong Strong Basic Elecronical Strong Strong Strong Strong Commerce (table continued) Reputation Inadvertent Unauthorized Unauthorized Unauthorized misuse altering/ transaction disclosures downloading Advertising No Level No Level basic No Level No Level Secure Internet/ Intranet 1.Informational No Level Basic Strong Basic Basic 2.Transactional Basic Basic Strong Basic Basic Elecronical Strong Basic Strong Strong Strong Commerce Conclusion Vendors that used to compete with each other in marketing their products are now working together to provide a common routing protocol. A common routing protocol will give customers the ability to implement an open computing environment using components from multiple vendors. Customers will no longer have to rely on a single vendor to meet their networking requirements, which will provide them greater flexibility and efficiency and help reduce network operating costs. Author Biographies Steven Powell Steven Powell, PhD, is an associate professor of computer information systems, College of Business Administration, California State Polytechnic University, Pomona CA. He has taught and written articles on communications management and controls. Frederick Gallegos

12 Frederick Gallegos, CISA, CDE, CGFM, is the EDP audit advisor for the College of Business Administration, California State Polytechnic University, Pomona CA. He has taught EDP audit and security classes at the university and has authored articles on computer security management and control.

13

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

Introduction to Networks

Introduction to Networks www.eazynotes.com Maninder Kaur [Page No. 1] Introduction to Networks Short Answer Type Questions Q-1. Which Technologies of this age had led to the emergence of computer network? Ans: The technologies

More information

524 Computer Networks

524 Computer Networks 524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

Network support for tele-education

Network support for tele-education Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,

More information

51-30-10 Selecting a Firewall Gilbert Held

51-30-10 Selecting a Firewall Gilbert Held 51-30-10 Selecting a Firewall Gilbert Held Payoff Although a company may reap significant benefits from connecting to a public network such as the Internet, doing so can sometimes compromise the security

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

Terms VON. VoIP LAN WAN CODEC

Terms VON. VoIP LAN WAN CODEC VON Voice Over the Net. Voice transmitted over the Internet. That is the technical definition. Prescient Worldwide s product, called VON, means Voice Over Network as in ANY network, whether a client s

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability. WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Computer Networks: LANs, WANs The Internet

Computer Networks: LANs, WANs The Internet 1 Computer Networks: LANs, WANs The Internet Required reading: Garcia 1.1 and 1.2 CSE 3213, Fall 2010 Instructor: N. Vlajic History of Computers 2 Computer a machine that manipulates data according to

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

Voice and Delivery Data Networks

Voice and Delivery Data Networks Voice and Delivery Data Networks Chapter 11 Learning Objectives After reading this chapter, you should be able to: Identify the basic elements of a telephone system Describe the composition of the telephone

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare

More information

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Computer networks, data communication and Internet

Computer networks, data communication and Internet **** 1 Computer networks, data communication and Internet Introduction **** Computer networks: summary 2 The following gives an overview of computer networks and data communication:»the basic principles»local

More information

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any

More information

51-10-50 Circuit-Switched Router Connections Nathan J. Muller

51-10-50 Circuit-Switched Router Connections Nathan J. Muller Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible

More information

Networking. Topic 5. Contents

Networking. Topic 5. Contents 97 Topic 5 Networking Contents 5.1 Introduction...................................... 99 5.2 Networks....................................... 99 5.2.1 The development of networks........................

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

How To Understand The Technical Specifications Of Videoconferencing

How To Understand The Technical Specifications Of Videoconferencing Videoconferencing Glossary Algorithm A set of specifications that define methods and procedures for transmitting audio, video, and data. Analog Gateway A means of connecting dissimilar codecs. Incoming

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical

More information

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R- MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features

More information

Chapter 6 Telecommunications, Networks, and Wireless. Computing

Chapter 6 Telecommunications, Networks, and Wireless. Computing Chapter 6 Telecommunications, Networks, and Wireless Computing Essay Questions: 1. Define a hub, switch, and a router. 2. List the challenges associated with managing contemporary telecommunications and

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Higher Computing Networking 1

Higher Computing Networking 1 Networking Briefly state what is meant by a computer network. What does the term topology refer to in this context? What are the ideal goals a network designer should aim for? Compare and contrast a star

More information

Overview of WAN Connections Module 1

Overview of WAN Connections Module 1 Overview of WAN Connections Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005 Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and

More information

Glossary of Telco Terms

Glossary of Telco Terms Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

Understand Wide Area Networks (WANs)

Understand Wide Area Networks (WANs) Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks

More information

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS MODEL ATC-2000 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2000 is a RS232/RS485 to TCP/IP converter integrated with a robust system and network management features designed

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

Using High Availability Technologies Lesson 12

Using High Availability Technologies Lesson 12 Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information