1 L E S S O N Understand the Concepts of the Internet, Intranet, and Extranet 1.2 Understand the Local Area Network (LAN) 1.3 Understand VLANs, Wired LANs, and Wireless LANs 1.4 Understand the Wide Area Network (WAN) 1.5 Understand Wide Area Network Connections 1.6 Understand Wireless Network Connections and Security 1.7 Understand Network Topologies and Access Methods MTA Network Fundamentals 1 Test
2 L E S S O N 1. 1 Understand the Concepts of the Internet, Intranet, and Extranet
3 L E S S O N 1. 1 Lesson Overview In this lesson, you will learn about: The Internet Intranets Extranets VPN Security Zones Firewalls
4 L E S S O N 1. 1 In 1962 ARPA opened a computer research program and appointed an MIT scientist named John Licklider to lead it. He had just published his first memorandum on the "Galactic Network" concept... a futuristic vision where computers would be networked together and would be accessible to everyone. In October 1969, Internet messaging programs (IMPs) were installed in computers at both UCLA and Stanford. UCLA students would 'login' to Stanford's computer, access its databases and try to send data.
5 L E S S O N 1. 1 The experiment was successful and the fledgling network had come into being By December 1969 ARPANET comprised four host computers with the addition of research centers in Santa Barbara and Utah This was the beginning of the Internet
6 L E S S O N 1. 1 Access to the Internet was now available and it was hypertext document servers and Mosaic, the graphical browser, that became the killer application that made the Internet popular and useful to the general public This worldwide computer network allows people to communicate and exchange information The Internet is not owned by any particular company or person
7 L E S S O N 1. 1 Intranet A private network based on Internet protocols such as TCP/IP but designed for information management within a company or organization One of the key advantages of an intranet is the broad availability and use of software applications unique to the needs of a corporation It is also a computer network and includes some of the same technologies as the Internet
8 L E S S O N 1. 1 Intranet uses include providing access to software applications; document distribution; software distribution; access to databases; and training An intranet is so named because it looks like a World Wide Web site and is based on the same technologies, yet is strictly internal and confidential to the organization and is not connected to the Internet proper Some intranets also offer access to the Internet, but such connections are directed through a firewall that protects the internal network from the external Web
9 L E S S O N 1. 1 Extranet An extension of some combination of corporate, public, and private intranet using World Wide Web technology to facilitate communication with the corporation s suppliers, customers, and associates An extranet allows customers, suppliers, and business partners to gain limited access to a company s intranet in order to enhance the speed and efficiency of their business relationship
10 L E S S O N 1. 1 VPN Virtual private network are nodes (nodes are a connection point, either a redistribution point or a communication endpoint (some terminal equipment) on a public network They communicate among themselves using encryption so that their messages are safe from being intercepted by unauthorized users VPNs operate as if the nodes were connected by private lines. An example would be teachers at home needing limited access to the school district s intranet would be given VPN software for their personal laptop
11 L E S S O N 1. 1
12 L E S S O N 1. 1 Security Zone Business/organization's need for physical and logical boundaries for accessing, controlling, and securing information throughout an organization's network The security zone contains hidden settings for how Microsoft Windows and Internet Explorer manage unsigned controls Security changes daily. A must to keep aware of the updates. Check the webcasts where leading security and privacy experts in field discuss the issues. Microsoft has webcasts covering Security Bulletins, Security Development Lifecycle, Security Intelligence Report, Security Tools, and more
13 L E S S O N 1. 1 Firewall A computer system or network firewall is designed to permit authorized communications while blocking unauthorized access The device is configured to permit or deny computer applications based upon a set of rules and other criteria Firewalls are technological barriers designed to prevent unauthorized or unwanted communications between computer networks or hosts
14 L E S S O N 1. 1 Complete Student Activity 1.1
15 L E S S O N 1. 2 Understand the Local Area Networks (LANs)
16 L E S S O N 1. 2 Lesson Overview In this lesson, you will learn about: LANs Perimeter networks Addressing Local loopback IPs An Internet collection
17 L E S S O N 1. 2 LANs - Local Area Networks Computer networks ranging in size from two computers in a home to a few computers in a single office to hundreds or even thousands of devices spread across several buildings. They function to link computers together and provide shared access to printers, file servers, and other services.
18 L E S S O N 1. 2 A group of computers and other devices dispersed over a relatively limited area and connected by a communications link that enables any device to interact with any other on the network. LANs commonly include PCs and shared resources such as laser printers and large hard disks. The devices on a LAN are known as nodes (individual pieces of equipment.) o Nodes are connected by wireless and by cables and through which messages are transmitted
19 L E S S O N 1. 2 LANs in turn may be plugged into larger networks, such as larger LANs or wide area networks (WANs), connecting many computers within an organization to each other and/or to the Internet. The physical media that connect devices, interfaces on the individual devices that connect to the media, protocols that transmit data across the network, and software that negotiates, interprets, and administers the network and its services are all a part of the LAN.
20 L E S S O N 1. 2 Perimeter Networks A perimeter network is a specialized network. Usually a physical subnet outside of the main firewall allowing a business to expose their services to the Internet.
21 L E S S O N 1. 2 Addresses A unique identifier is assigned to each node on a network. A computing address defines a range of discrete addresses: o each of which may correspond to a physical or virtual memory register o a network host o peripheral device, disk sector, or other physical entity. Just as people have addresses, computer memory and networks have addresses.
22 L E S S O N 1. 2 Reserved address ranges for local use Address ranges are reserved by IANA for private intranets, and not routable to the Internet. o Class A: o Class B: o Class C: The Internet Assigned Numbers Authority (IANA) Allocates ranges of numbers to various registries in order to enable them to each manage their particular address space.
23 L E S S O N 1. 2 Local Loopback IPs is the loopback address in IP Loopback is a test mechanism of network adapters. Messages sent to do not get delivered to the network. Instead, the adapter intercepts all loopback messages and returns them to the sending application. IP applications often use this feature to test the behavior of their network interface.
24 L E S S O N 1. 2 An Internet Connection Sharing ICS is a collection of technologies that work together to enable multiple devices on a private network to share a single Internet connection. Microsoft uses the class C reserved IP range for implementing a SOHO (small office/home office) network where one computer shares its Internet connection with other computers similar to Microsoft's printer sharing noted in the video.
25 L E S S O N 1. 2 Complete Student Activity 1.2
26 L E S S O N 1. 3 Understand VLANs, Wired LANs, and Wireless LANs
27 L E S S O N 1. 3 Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)
28 L E S S O N 1. 3 LAN A local area network (LAN) is a single broadcast domain. This means the broadcast will be received by every other user on the LAN if a user broadcasts information on his/her LAN. Broadcasts are prevented from leaving a LAN by using a router. Wired LAN An electronic circuit or hardware grouping in which the configuration is determined by the physical interconnection of the components
29 L E S S O N 1. 3 Wireless LAN Communications that take place without the use of interconnecting wires or cables, such as by radio, microwave, or infrared light Wireless networks can be installed: o Peer-to-peer Ad hoc mode wireless devices can communicate with each other o "Infrastructure" mode allows wireless devices to communicate with a central node that can communicate with wired nodes on that LAN
30 L E S S O N 1. 3 Sample example of a wireless LAN design:
31 L E S S O N 1. 3 Wired LANs: Advantages Most wired LANs are built with inexpensive hardware: 1. Network adapter 2. Ethernet cables 3. Hubs
32 L E S S O N 1. 3 Advantages Wired LANs provide superior speed and performance Disadvantages Difficult to run cables under the floor or through walls especially when computers sit in different rooms Require central devices like hubs or routers to accommodate more computers, which can be expensive Generally it costs less than wireless equipment for the equivalent wired Ethernet products
33 L E S S O N 1. 3 Wireless LANS: Advantages Easy access to the Internet in public places Less expensive to install and maintain Alleviates the need to run wiring through buildings Disadvantages The data transfer rate will decrease as computers are added Lower wireless bandwidth means video streaming will be slow Security is more difficult to guarantee and requires configuration
34 L E S S O N 1. 3 Application of LANs Home and small business computer networks can be built using either wired or wireless technology Large companies are trying to move toward wireless but there are more challenges, especially with security Wired Ethernet has been the traditional choice in homes, but Wi-Fi wireless technologies are quickly replacing wired LANs
35 L E S S O N 1. 3 VLAN A virtual LAN, known as a VLAN, is a group of hosts with a common set of requirements that communicate regardless of their physical location Sometimes called a logical network Has the same attributes as a physical LAN, but allows for end stations to be grouped together even if they are not located on the same network switch Network reconfiguration can be done through software
36 L E S S O N 1. 3 The VLAN controller can change or add workstations and manage load balancing and bandwidth allocation more easily than with a physical picture of the LAN Network management software keeps track of relating the virtual picture of the local area network with the actual physical picture
37 L E S S O N 1. 3 Complete Student Activity 1.3
38 L E S S O N 1. 4 Understand Wide Area Networks (WANs)
39 L E S S O N 1. 4 Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks (WAN)
40 L E S S O N 1. 4 Dial-up Connections A connection that uses the public switched telephone networks rather than a dedicated circuit or some other type of private network. This is often referred to as plain old telephone service/public switched telephone service (POTS/PSTN). Remote server access provides two different types of remote access connectivity: o Dial-up remote access o Virtual private network (VPN) remote access
41 L E S S O N 1. 4 With dial-up remote access, a remote access client uses the telecommunications infrastructure to create a temporary physical circuit or a virtual circuit to a port on a remote access server. After the physical or virtual circuit is created, the rest of the connection parameters can be negotiated.
42 L E S S O N 1. 4 ISDN - Integrated Services Digital Network A high-speed digital communications network evolving from existing telephone services. Designed to replace the current telephone network An ISDN communication channel carries voice, circuit, or packet conversations. The B channel is the fundamental component of ISDN interfaces. It carries 64,000 bits per second in either direction. The most common kind of ISDN interface available in the United States is BRI, which contains two B channels, each with 64-kbps capacity, and a single D channel (16- kbps) that is used for signaling and call progress messages.
43 L E S S O N 1. 4 Leased Lines A communications channel that permanently connects two or more locations. Leased lines are private or dedicated lines, rather than public ones. Also called dedicated connection and private line. A leased line is a dedicated telephone line rented from the phone company. It provides a 24 hour dedicated connection between two points. Leased lines can be almost any speed but are typically 2 Mbps. Higher speed lines are more expensive.
44 L E S S O N 1. 4 VPN - Virtual Private Network Computer devices (nodes) on a public network that communicate among themselves using encryption technology so that their messages are as safe from being intercepted and understood by unauthorized users as if the nodes were connected by private lines. VPN client uses an IP (Internet protocol) internetwork to create a virtual point-to-point connection with a remote access server acting as the VPN server. A server-based computer can be a remote-access server so that other users can connect to it by using VPN, and then access shared files on your local drives or on your network.
45 L E S S O N 1. 4 Basic VPN Requirements User Permission. Enable a user to access the VPN IP Configuration. The VPN server should have a static IP address and assign the arrange of IP addresses to VPN clients. The VPN server must also be configured with DNS (Domain Name System) and WINS (Windows Internet Name Service) server addresses to assign to the VPN client during the connection Data Encryption. Data carried on the public network should be rendered unreadable to unauthorized clients on the network
46 L E S S O N 1. 4 Basic VPN Requirements (continued) The TCP/IP (transmission control protocol/internet protocol) is a common protocol used in public networks Firewall Ports. VPN server behind the firewall requires port implementation Interface(s) for VPN server. If using a router, only one NIC (network interface controller) is needed. If the network doesn't have a router or the VPN is also a gateway, the computer must have at least two interfaces, one connecting to the Internet and another connecting to the LAN. One interface for VPN client. The interface can be a dialin modem, or a dedicated connection to the Internet
47 L E S S O N 1. 4 WAN - Wide Area Network Geographically widespread network Relies on communications capabilities to link the various network segments Can consist of a number of linked LANs (local area networks) or it can be one large network Used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations
48 L E S S O N 1. 4 LAN to a Wide Area Network
49 L E S S O N 1. 4
50 L E S S O N 1. 4 Complete Student Activity 1.4
51 L E S S O N 1. 5 Understanding Wide Area Networks Connections
52 L E S S O N 1. 5 Lesson Overview In this lesson, you will learn about: T1 T3 E1 E3 DSL Cable and its characteristics (speed, availability)
53 L E S S O N 1. 5 T1 A high-speed communications line that can handle digital communications and Internet access at the rate Mbps (megabits per second). This high-bandwidth telephone line can also transmit text and images. Speed is attained through multiplexing 24 separate 64 Kbps channels into a single data stream. Commonly used by larger organizations for Internet connectivity.
54 L E S S O N 1. 5 T3 A T-carrier that can handle Mbps (megabits per second) or 672 voice channels.
55 L E S S O N 1. 5 E1 A Mbps point-to-point dedicated, digital circuit provided by the telephone companies in Europe. The European counterpart of the North American T1 line. E1 and T1 lines can be interconnected for international use. Uses two wire pairs (one for transmit, one for receive) and time division multiplexing (TDM) to interleave Kbps voice or data channels.
56 L E S S O N 1. 5 E3 A carrier service with capacity for Mbps The E3 lines is the European counterpart to the US T3 Europe has a counterpart for every T-carrier leased line capability A speed capacity of Mbps o Interesting since E1 is faster than a T1 and E2 is faster than a T2 but E3 is slower than a T3 E2 through E5 lines provide multiple E1 channels
57 L E S S O N 1. 5 DSL - Digital Subscriber Line Provides high-speed transmissions over standard copper telephone wiring The data throughput of consumer DSL services ranges from 384 Kbps to 20 Mbps in the direction to the customer o Depends upon technology, line conditions, and service-level. The data throughput in the reverse direction from customer to the service provider is lower o Asymmetric digital subscriber line (ADSL) is the most common DSL service provided but still with limited availability o Symmetric digital subscriber line (SDSL) provides equal speed in both directions
58 L E S S O N 1. 5 Cable Internet Access through CATV Has become a viable alternative and many cable companies are offering both a home and a businessclass connection.
59 L E S S O N 1. 5 Complete Student Activity 1.5
60 L E S S O N 1. 6 Understand Wireless Networking Connections & Security
61 L E S S O N 1. 6 Lesson Overview In this lesson, you will learn about: Wireless networking Wireless networking standards and their characteristics a, b, g, n including different GHz ranges Types of network security o WPA o WEP o 802.1X Point-to-point (P2P) wireless Wireless bridging Gigahertz
62 L E S S O N 1. 6 Wireless Telecommunications Computer networks created without wires such as a local area network (LAN) The telecommunications network employ interconnections between nodes implemented without the use of wires Wireless telecommunications networks are accomplished with some type of remote information transmission system
63 L E S S O N 1. 6 Wireless Telecommunications (continued) This implementation takes place at the physical level or "layer" of the network where the waves are like radio waves. Waveform refers to the shape and form of a carrier signal such as a radio wave. A wave is a disturbance that travels through space and time moving in a solid, liquid, or gaseous medium. This carrier signal uses the same basic protocol as a modulating signal.
64 L E S S O N 1. 6 Electromagnetic Waves The wave, or "disturbance," is invisible and is called the force field. Without these charged particles, there can be no electric force fields and thus no electromagnetic waves. Examples include light, microwaves, X-rays, and TV and radio transmissions are all kinds of electromagnetic waves. Negative electrons and positive protons charges cause each other to move. Positive charge exerts an attractive force on electrons an electric force. The velocity makes no difference, the pull or force depends only upon where you put it. Electronic devices make use of the range of the electromagnetic spectrum.
65 L E S S O N 1. 6 Wireless Describes communications in which electromagnetic waves or RF carry a signal over the entire communication path. The frequencies that are available for use for communication are a public resource and are regulated by the Federal Communications Commission in the U.S.
66 L E S S O N 1. 6 Electronic Modulation The process of varying one or more properties of a high-frequency periodic waveform. In wireless we first take a signal, like a telephone conversation, and then impress it on a constant radio wave called a carrier. It modulates a constant frequency in the radio range, which we can't hear. Modulation makes voice band and radio band frequencies work together. Different modulation techniques, such as AM and FM, are different ways to shape or form electromagnetic radio waves.
67 L E S S O N 1. 6 Electronic Modulation (continued) Wireless network technologies are used in phones, laptop computers, automobiles, and public transportation. High-speed wireless Internet connection services designed to be used from arbitrary locations refers to "mobile broadband. Wi-Fi hotspots provides connectivity over a limited radius around fixed wireless access points. The data rate of a computer network connection is measured in units of bits per second (bps). One Mbps equals one megabit per second. Network equipment makers rate their products using related, larger units of Kbps, Mbps, and Gbps. Network outages happen due to limits of the service provider coverage area or obstructions from geography, or even inside larger buildings.
68 L E S S O N 1. 6 Institute of Electrical and Electronics Engineers (IEEE) Creates standards to ensure compatibility. The IEEE created the 802 project to develop the standards which are used today. There have been many changes and additions. IEEE 802 standards define only certain technologies. Most important IEEE 802 standards is the , wireless networks it defines standards for wireless LAN communication. IEEE is a set of standards carrying out wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. The base current version of the standard is IEEE They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802).
69 L E S S O N 1. 6 Popular Protocols Defined by the was the first wireless networking standard b was the first widely accepted one, followed by g and then by n n is a new multistreaming modulation technique. The family includes over-the-air modulation, which means to change or vary.
70 L E S S O N b and g use the 2.4 GHz ISM band (industrial, scientific and medical), operating in the United States under Part 15 of the US Federal Communications Commission Rules and Regulations. Gigahertz is a measure of frequency. Frequency (temporal frequency ) is the number of occurrences of a repeating event per unit time. The duration of one cycle in a repeating event, so the period is the reciprocal of the frequency. Because of this choice of frequency band, b and g equipment may occasionally suffer interference from microwaves, cordless telephones and Bluetooth devices.
71 L E S S O N 1. 6 Both and Bluetooth control their interference by using spread spectrum modulation. Bluetooth uses a frequency hopping signaling method, while b and g use the direct sequence spread spectrum signaling and orthogonal frequency division multiplexing methods, respectively a uses the 5 GHz U-NII (Unlicensed National Information Infrastructure) band, which offers at least 19 non-overlapping channels rather than the 3 offered in the 2.4 GHz ISM frequency band. Depending on the environment, channels may have better or worse performance with higher or lower frequencies.
72 L E S S O N 1. 6 WEP and WPA Wireless security protocols widely used by wireless networking devices WEP Wired Equivalent Privacy or Weak Encryption Protocol o Designed to provide equivalent level of security as a wired network WPA Wi-Fi Protected Access (WPA and WPA2) o A certification program to designate compliance with the security protocol to secure wireless computer networks o Implements the majority of the IEEE i standard The Wi-Fi Alliance intended WPA as an intermediate measure to take the place of WEP pending the preparation of i IEEE wireless networks are NOT secured by WEP as it is easily broken
73 L E S S O N 1. 6 Wireless Security Wireless network messages are more susceptible to eavesdropping than wired networks. A WEP key uses a passphrase a security code that is produced using this protocol that allows computers to hide the contents of the messages from intruders and exchange coded messages. WPA-PSK (Pre-Shared Key) mode provides strong encryption protection without the enterprise authentication server and is the easiest way to deploy WPA to home wireless network using a passphrase. WPA uses Temporal Key Integrity Protocol (TKIP) to produce unique encryption keys and automatic rekey each wireless clients from passphrase and network SSID.
74 L E S S O N 1. 6 Wireless Bridging A bridge is used to connect two network segments.
75 L E S S O N 1. 6 Bridging A forwarding technique used in packet-switched computer networks. Can be done wired or wireless and used only in LANs. Bridging depends on flooding and examination of source addresses in received packet headers to locate unknown devices. A network bridge connects multiple network segments at the data link layer (Layer 2) of the (OSI) Open System Interconnection model. A switch is a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge.
76 L E S S O N 1. 6 Bridging (continued) Another form of bridging, source route bridging, was developed for token ring networks. The main purpose of wireless bridging is to connect a wired Ethernet network segment to a wireless Ethernet network segment. This is most commonly found in a home wireless router that has a built-in multiport switch for wired devices, and a wireless networking WAN connection for DSL or cable for Internet access.
77 L E S S O N 1. 6 Point-to-Point Protocol (PPP) A data link protocol commonly used to establish a direct connection between two networking nodes Provides compression, transmission encryption privacy, and connection authentication Used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as links Internet service providers (ISPs) use PPP for customers dial-up access. Internet service providers (ISPs) use two encapsulated forms of PPP to connect Digital Subscriber Line (DSL) Internet service. o Point-to-Point Protocol over Ethernet (PPPoE) o Point-to-Point Protocol over ATM (PPPoA)
78 L E S S O N 1. 6 Complete Student Activity 1.6
79 L E S S O N 1. 7 Understand Network Topologies and Access Methods
80 L E S S O N 1. 7 Lesson Overview In this lesson, you will learn about: Network topologies and access methods Star Mesh Ring Bus
81 L E S S O N 1. 7 Network Topologies The interconnection of the various elements (links, nodes, etc.) of computer equipment Network Topologies can be physical or logical Topology is the virtual shape or structure of a network, which does not need to correspond to the actual physical design of the devices on the computer network. The physical design of a network including the devices, location, and cable installation is known as physical topology. How data actually transfer in a network, as opposed to its physical design, is the logical topology, also called signal topology. Distances between nodes, transmission rates, physical interconnections, and/or signal types may differ in two networks and yet their topologies may be identical.
82 L E S S O N 1. 7 Compare the logical and physical topology of the star If a hub is used, then the topology is a physical star and a logical bus. If switch is used, then the topology is a physical star and a logical star. If IBM MAU is used, then the topology is a physical star and a logical ring.
83 L E S S O N 1. 7 Star Network The topology structure of a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages. The hub and leaf nodes, and the transmission lines between them, form a graph with the topology of a star. An active star network has an active central node that usually has the means to prevent echo-related problems.
84 L E S S O N 1. 7 By connecting all of the systems to a central node, the star topology reduces the chance of network failure. The central hub rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network when applied to a bus-based network. All peripheral nodes may thus communicate with all others by transmitting to, and receiving from, the central node only. Isolation of a peripheral node from all others occurs when there is a failure of a transmission, but the rest of the systems will be unaffected. Each node (file servers, workstations, and peripherals) is designed to be connected directly to a central network hub, switch, or concentrator.
85 L E S S O N 1. 7 Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The functions of the network are controlled and managed by the hub, switch, or concentrator, and it acts as a repeater. The twisted pair cable is the most often used although it can be used with coaxial cable or optical fiber cable.
86 L E S S O N 1. 7 Mesh Networks Each node in the network acts as an independent router. A mesh network whose nodes are all connected to each other is a fully connected network. The component parts connect to each other via multiple hops. Is self-healing and can still operate when one node breaks down or a connection goes bad Considered more reliable than other networks Mobile ad hoc networks (MANET) must deal with the problems of the mobility of the nodes. Mesh networks do not have this problem but they are closely related with the MANET network.
87 L E S S O N 1. 7 Originally developed for military applications Wireless networks are typical of mesh architectures. The mesh network can support multiple functions such as client access, backhaul service, and scanning in mobile applications. Increased power has enabled the mesh nodes to become more modular. One node or device can contain multiple radio cards or modules, allowing the nodes to be customized to handle a unique set of functions and frequency bands. Game theory methods that analyze strategies for the allocation of resources and routing of packets have aided mesh networks.
88 L E S S O N 1. 7 Ring Network Data travels from node to node, with each node along the way handling every packet. It forms a single continuous pathway for signals through each node. May be disrupted by the failure of a single link A node failure or cable break might isolate every node attached to the ring. Each machine or computer has a unique address that is used for identification purposes. Only one machine can transmit on the network at a time.
89 L E S S O N 1. 7 Even though computers on a home network can be arranged in a circle shape, it does not mean that it presents a ring topology. By sending data on a counter clockwise ring FDDI (fiber distributed data interface) networks circumvent a node failure or cable break networks, also known as Token Ring networks, avoid the weakness of a ring topology altogether. o They actually use a star topology at the physical layer and a multi-station access unit (MAU) to imitate a ring at the data-link layer. The signal can be boosted or repeated as the computers connected to the ring act to strengthen the signals that transverse the network.
90 L E S S O N 1. 7 Bus Network A shared communications line A common backbone to connect all devices that operates and functions as a shared communication medium A single cable that devices attach or tap into with an interface connector Communicates by sending a broadcast message onto the wire for all other devices to see, but only the intended recipient actually accepts and processes the message. Devices on the bus must first determine that no other device is sending a packet on the cable before any device can send a packet.
91 L E S S O N 1. 7 Bus mastering is supported by many bus architectures that enable a device connected to the bus to initiate transactions. Devices with Ethernet communicate like they were in chat room, which is called carrier sense multiple access/ collision detection (CSMA/CD). Two packets are sometimes sent (two cards talk) at the same time. The cards arbitrate on their own to decide which one will resend its packet first when this collision occurs. All PCs share the data transfer capacity of that bandwidth (wire ) if they are on a bus network.
92 L E S S O N 1. 7 Advantages of a Bus Network Easy to implement and extend Well-suited for temporary or small networks not requiring high speeds (quick and easy setup) Cost effective; only a single cable is used Cheaper than other topologies Easy identification of cable faults
93 L E S S O N 1. 7 Disadvantages of Bus Networks Limited cable length and number of stations Only one packet can remain on the bus during one clock pulse If there is a problem with the cable, the entire network breaks down. Performance degrades as additional computers are added or with heavy traffic Slower data transfer rate than other topologies It works best with limited number of nodes
94 L E S S O N 1. 7 Hybrid Network When a combination of two or more topologies are connected If two star networks were connected together, they would exhibit a hybrid network topology. o A star ring network would be two or more star topologies linked together using a multistation access unit (MAU) as a centralized hub.
95 L E S S O N 1. 7 Two or more star topologies connected using a bus trunk would be a star-bus network. A multi-station access unit (MSAU) connects a group of computers to a token ring local area network.
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Topology Star Bus Each computer connects to a central connection device. Bus Single cable connects everything. Ring Single cable configured in a ring. Information Transfer All information passes through
Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange
1 CHAPTER ONE Introduction to Networking Objectives 2.3 Identify common physical network topologies. Star. Mesh. Bus. Ring. Point to point. Point to multipoint. Hybrid 2.7 Explain common logical network
Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
WAN Technology Heng Sovannarith email@example.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: firstname.lastname@example.org Local Area Network LANs connect computers and peripheral
Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
Computer Networks and Internets, 5e Chapters 12 and 16 Access and Interconnection Technologies (slidesets abridged/combined) By Douglas Comer Modified from the lecture slides of Lami Kaya (LKaya@ieee.org)
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs Wireless LANs were once considered expensive and slow solutions to certain network connectivity issues. Wireless LAN sales are now
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
Teacher Assessment Blueprint Test Code: 5910 / Version: 01 Copyright 2011 NOCTI. All Rights Reserved. General Assessment Information Blueprint Contents General Assessment Information Written Assessment
INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
ADSL vs Cable Cable subscribers are connected directly to high speed lines while ADSL subscribers are connected directly to medium speed lines Cable subscribers share the line connecting them to neighbourhood
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
Overview of WAN Connections Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this
Study on VLAN in Wireless Networks Rajul Chokshi and Dr. Chansu Yu Department of Electrical and Computer Engineering Cleveland State University Cleveland, Ohio 44115 April 30, 2007 Abstract This technical
Connection Services Hakim S. ADICHE, MSc email@example.com Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. firstname.lastname@example.org Ira Sharp Product Specialist Phoenix
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks
(CTNP) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you
CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our
Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka What is a network? A computer network is two or more computers connected together using a telecommunication system for the purpose
Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 10 Behind the Scenes: Networking and Security in the Business World 2 Chapter Topics Client/Server
Page 1 of 7 Computer Networking 7.1 What Is Computer Networking? A computer network consists of several computers that are connected to one another using devices that allow them to communicate. Computer
Access Points, Routers, and Hubs In the first lesson, you learned about the world of wireless standards -- what frequencies are used, distances involved, and other general topics. In this lesson, you learn
Broadband 101: Installation and Testing Fanny Mlinarsky Introduction Today the Internet is an information superhighway with bottlenecks at every exit. These congested exits call for the deployment of broadband
Networking Basics Data communications the electronic transfer of information between computers. This has become a major focus of the computer industry especially since the rapid growth of the internet.