LAN Performance Measurements Lab

Size: px
Start display at page:

Download "LAN Performance Measurements Lab"

Transcription

1 LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February

2 Introduction: The goal of this laboratory is for students to gain some first hand experience measuring and observing the performance characteristics of the two LAN technologies, Ethernet and token-ring. The hands-on experience gained in the lab is intended to supplement and reinforce the student's understanding of the operational and performance aspects of the MAC-layer protocols. For student's to benefit from this experience it is essential that they have a basic understanding of IEEE 802.3(Ethernet) and 802.5(Token Ring) specifications. Specific measurements observed in this experiment may vary considerably from commonly held theoretical results. Keep in mind that these popular rules-of-thumb are based upon a number of simplifying assumptions which are not applicable to all environments. For this reason, they should be put in the proper perspective as general guidelines, and not steadfast rules. Furthermore, there are number of limitations to the methodology employed in this lab experiment. Therefore, these results must also be put in the proper perspective. Keep in mind the following limitations to the practical validity of these experiments: (1) packet gap times and (2) frame lengths are deterministic rather than stochastic, (3) the number of stations is small, and (4) the propagation delay for Ethernet and ring latency for token ring are small because the physical network segments are short. These are all significant factors in relation to LAN performance. Furthermore, the traffic generation and monitoring equipment are low-end devices which provide only moderately accurate information and may behave inconsistently under high loads. When analyzing their results, students should keep these factors in mind. They should also attempt to understand why these issues might skew performance measures. Using PC based traffic generators, students will transmit known loads on each network. A range of input loads will be achieved by varying the frame rate and the frame length. To simplify the experiment, configurations will be held constant across all the traffic generators for each experiment. Students will measure the network utilization or throughput, and the time it takes to perform a simple FTP file transfer as the loads are varied. Simple observations should reveal some basic relationships among load, throughput, frame length and delay. Using their understanding of each network's MAClayer protocol, and their understanding of the particular environment they should be able to assess the reasons for the behavior they have observed. Students should understand that it is difficult to compare the performance of Ethernet and token-ring in an absolute sense. But this lab should provide some opportunity to observe relative effects. Students are expected to give some thought as to why the technologies behave differently and when it may be more appropriate to use one versus the other. When considering what they have observed in this lab students should consider the following questions: (1) How performance issues might affect LAN design. (2) What kinds of things might be done to improve LAN performance in an Ethernet or token-ring environment? (3) What should a LAN analyst or engineer look for when assessing LAN performance and design? Lan Performance Lab Ver 1.4, February

3 Equipment and Setup To be efficient, students will be distributed to two groups. One group works on Ethernet while the other works on Token Ring. Then switch. Please gather all your data during your time-slot before attempting to work out any of the problems. During your assigned lab lecture, the TA will introduce you to the equipment, procedures and concepts needed to complete this lab. There are two parts to this lab. The first part involves performance measurements for 10 Mbps Ethernet. The second part involves a similar set of procedures to measure the performance of a 4-Mbps token-ring. You should verify that the necessary equipment is in place, configured properly and operational before continuing with the lab procedures. Ethernet Configuration Verification: The following is a list of the equipment required for part one of this lab. This equipment should be pre-configured for you before coming into the lab. In general you will not have to worry about the details; they are presented primarily for informational purposes: 8 PC running windows XP 8 Network Interface Cards (NICs). 6 FETEST LanXL - LAN monitoring and traffic generation software. 2 FTP stations, one is FTP server, the other is FTP client. 8 10base-T Ethernet cables linking each PC on the segment to the Hub. 8 RJ45-connectors Table 1: Ethernet Equipment List All the PCs have already been appropriately labeled as traffic generator, or monitor, or FTP server, or FTP clients. Once you have identified the traffic generators, close LanXL and reopen it again. re-boot each machine by powering it off and on. It is important that you perform a cold start because certain software which may have been running causes the network interface to halt when LanXL is run. Procedure-1 Ethernet Traffic Generator and Monitor function Verification: Double click the LanXL icon on windows XP desktop On the LanXL PC which is labeled as "Monitor" 1) Click "Module-> Mode of Operation->" from the main menu, and make sure "capture" and "monitor" are selected 2) Click the start icon on the menu bar Assuming this PC is functioning properly, you should be capturing traffic seen on the Lan Performance Lab Ver 1.4, February

4 Ethernet segment. However you should not see anything yet because none of the other stations are generating traffic. Next you should test each of the other traffic generators one at a time. Select an un-tested generator: Procedure-2 1) Double click the LanXL icon on windows XP desktop 2) Click "transmit" icon to set it to transmit mode 3) Click detail view icon enter into detail view 4) Click "create/modify transmit buffer icon 5) Click Delete to delete the old settings if it exists. 6) Set the destination address as FFFFFFFF 7) Choose continuous as sending mode 8) Modify packet size and packet gap 9) Click Add 10) Click Load Module 11) Click the start icon on the menu bar At this point the traffic generator should be transmitting Ethernet frames according to its default settings. Check the monitor station to confirm that frames are actually being transmitted. On the monitor PC you should see some indication that frames are being sent by the test traffic generator PC. Hopefully you won't have a problem generating traffic on one PC and monitoring from another. If it is working, stop the traffic generator by clicking "stop" icon. Next you will want to repeat this step with all of the other 5 generator PCs. Procedure-3 Ethernet FTP Verification: Up to now, you have all traffic generators and monitors working. Then, you need to test FTP server and FTP client. Before doing this, you need to stop all the traffic generators. IP address of FTP Server for Ethernet segment And the service is automatically enabled. Start the FTP software on the client machine: Lan Performance Lab Ver 1.4, February

5 1) Enter DOS mode by clicking Start->run, then type cmd in the "open" field. 2) In the DOS mode, type ftp username: ftpaccess password: ftpaccess 3) Now, you are connected to FTP server. Set file type to Binary by typing the command Binary 4) Get file from FTP server, in the later steps, you need to record the displayed time. get file.exe The file transfer should take about 3 seconds. Note: On the FTP client machine, pressing <F3> will repeat the previous command. You will use this key throughout the lab. Lan Performance Lab Ver 1.4, February

6 Token-Ring Configuration Verification: The following is a list of the equipment required for part two of this lab. This equipment should be pre-configured for you before coming into the lab. In general you will not have to worry about the details; they are presented primarily for informational purposes: 8 PC running windows XP 8 4/16 Mbps Network Interface Cards (NICs). 6 FETEST LanXL - LAN monitoring and traffic generation software. 2 FTP stations, one is FTP server, the other is FTP client. 1 IBM 8226 token-ring MAU. 8 RJ-45 connectors and twisted cables connecting each PC to the MAU. Table 2: Token-Ring Equipment List You will have 8 PCs for the token-ring experiment: 5 traffic generators, 1 monitor, 1 FTP client and 1 FTP server. All the PCs have already been appropriately labeled as traffic generator, or monitor, or FTP server, or FTP clients. All the NICs had been put into promiscuous mode. Each of the token-ring PCs must be connected to the IBM 8226 MAU via UTP cable. The UTP cable connects to the token-ring NICs and the MAU using RJ-45 type connectors. Procedure-4 Token-Ring Traffic Generator Verification: Monitor setup: Double click the LanXL icon on windows XP desktop On the LanXL PC which is labeled as "Monitor" 1) Click "Module-> Mode of Operation->" from the main menu, and make sure "capture" and "monitor" are selected 2) Click the start icon on the menu bar Assuming this PC is functioning properly, you should be capturing traffic seen on the Token Ring network. Unlike Ethernet, token-ring involves some active management. You should be able to observe captured token-ring monitor frames. Next test each of the traffic generators in turn. Procedure-5 Traffic generator setup: Lan Performance Lab Ver 1.4, February

7 Select an un-tested generator: Do the same thing step by step as in Ethernet traffic generator setup case which is showed in Procedure-2. At this point the traffic generator should be transmitting Token Ring frames according to its default settings. Check the monitor station to confirm that frames are actually being transmitted. On the monitor PC you should see some indication that frames are being sent by the test traffic generator PC. Hopefully you won't have a problem generating traffic on one PC and monitoring from another. If it is working, stop the traffic generator by clicking "stop" icon. Next you will want to repeat this step with the other generator PCs. The traffic generator should indicate that it is transmitting frames, and you should be able to observe a flurry of capture activity on the network monitor. Procedure-6 Token-Ring FTP Connection Verification: IP address of FTP Server for Token Ring And the service is automatically enabled. Start the FTP software on the client machine: 1) Enter DOS mode by clicking Start->run, then type cmd in the "open" field. 2) In the DOS mode, type ftp username: ftpaccess password: ftpaccess 3) Now, you are connected to FTP server. Set file type to Binary by typing the command Binary 4) Get file from FTP server, in later steps you need to record the displayed time. Remember for normalization compare with Ethernet, this file size is 2.5 times less than the file used in Ethernet case. (Guess why?) get file.exe Lan Performance Lab Ver 1.4, February

8 Lab Procedures: Part I: Ethernet (IEEE 802.3) Performance Measurements Overview: On a single 10BaseT Ethernet segment there are 6 PCs running LanXL LAN monitoring and traffic generation software. You will configure the 5 traffic generators to generate traffic on the LAN segment by specifying the frame length and the frame inter-arrival time for each iteration of the experiment as specified in the Ethernet configuration charts below. Each configuration imposes a known offered load on the network. The offered load is a function of the frame length, frame inter-arrival time, and the number of stations. For example: Assume the frame length is 1518 octets, the packet gap is 24.2msec and there are 5 stations. First we can calculate the frame rate which is the reciprocal of the packet gap: 41.3 frames per second. Given that each frame is 1518 octets long, we can calculate the load generated by one station as being 1518 x 8 x 41.3 = bps. Since there are 5 stations we have a total load of 5 x = bps. Divide this by the capacity of Ethernet which is 10 Mbps and we have a total offered load of 25%. The drop-off varies between PCs and by the particular rate being requested. Therefore the offered loads should be understood as reasonable approximations. Care should be taken not to confuse the term inter-arrival time with inter-frame gap. The IEEE standard calls for minimum 9.6us inter-frame gap after the channel has become free before the MAC-layer can initiate a new transmission. This inter-frame gap is enforced at the MAC-layer to meet constraints imposed by the Physical-layer. Interarrival time represents the time between successive MAC-UNITDATA. Request primitives issued by the MAC service user. Keep in mind that the MAC-layer may not be able to service these requests immediately due to on-going network activity. The rate at which these requests are serviced reflects the station's throughput, whereas the rate at which they are made reflects the offered load. In some literature, offered load includes the additional load due to retransmission attempts. Our definition does not include these effects. For each configuration you will estimate the total network utilization by reading utilization from the throughput table on each of the traffic generators and adding them together to get total network utilization. Each of the generators indicates the throughput it is currently achieving. Under light loads, these numbers will be stable and consistent across the network; however as the load increases, these indications will begin to fluctuate considerably due to the effects of contention and collision handling. To record the network utilization you will have to estimate the average value you see and multiply it by 5. Two additional PCs will be used to transfer a file using FTP. The transfer should be done 5 times for each load configuration. Do not to transfer the file while you are determining the utilization. The traffic generated by the file transfer increases the load on the network and thus has a direct impact on the utilization. For light loads the transfer Lan Performance Lab Ver 1.4, February

9 time stays relatively constant. Under heavy loads it may vary considerably. You should take about 5 readings and calculate an average for each iteration.. There are tables corresponding to each of two sets of experiments. The first uses maximum length Ethernet frames of 1518 octets. The second set uses frame length of 512 octets. You should observe different FTP file transfer performance with same offer load but different packet size on traffic generator (why?). Follow the example procedures detailed following the configuration tables (table 3 and 4) for the first configuration set, and then repeat those procedures for each subsequent configuration. Lan Performance Lab Ver 1.4, February

10 Ethernet Configuration tables: Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (octets) (msec) (%) (%) (sec) 1518 NA Table 3: Ethernet Octet Frames Packet Size Packet Gap # of Stations Offered Load Utilization FTP File-Transfer Time (octets) (msec) (%) (%) (sec) 512 NA Table 4: Ethernet Octet Frames Lan Performance Lab Ver 1.4, February

11 Ethernet Example Step-by-Step Procedures 1) Ethernet Traffic Generator and Monitor function Verification, refer to Procedure-1 and Procedure-2. 2) Ethernet FTP verification, refer to Procedure-3 3) Stop FTP transfer 4) Stop traffic generator and monitor 5) From FTP client, transfer file from server to client 6) Transfer five times, when finished, record the average time into table3 and table 4. 7) On each traffic generator, set its operation mode as transmitting mode and set the transfer buffer parameters based on table 3 and 4. Refer to Procedure-2. Note: Each of the traffic generators will be configured identically for each run of the experiment. Be sure to confirm that they are the same before you take any measurements. 8) Repeat 7) on each traffic generator. 9) Click start for each traffic generator. 10) Wait for about 15 seconds, click start on the monitor. 11 ) Read the Utilization from the monitor and record it. Note: The total offered load to the network is the sum of the offered load from each of the traffic generators. The total network utilization, which could be seen from monitor, is equal to the sum of the utilization reported by each station. This may become difficult to do as the load increases. Get the best average estimate you can. Determine the utilization and record it in the appropriate place on the Ethernet table. This should be about 20-25% for the experiment corresponding with the first configuration. 12. Connect to FTP server using the Procedure From FTP client, run get file.exe 5 times, and record the average transfer time on the table. 14. Change the traffic generator settings and repeat the procedure from 7 to 13 and record the data. Lan Performance Lab Ver 1.4, February

12 Part II: Token-Ring (IEEE 802.5) Performance Measurements Overview On a single 4 Mbps token-ring network there are 6 PCs running LanXL network monitoring and traffic generation software. As with the Ethernet experiments, you will configure each of these to generate traffic on the LAN specifying the frame length and the frame inter-arrival rate according to the token-ring configuration table provided below. Each configuration imposes a known offered load on the network. The definition and calculation of offered load is consistent as with the Ethernet, except when dividing to obtain the % of the network's capacity. In this case the aggregate bit rate is divided by 4 Mbps rather than 10 Mbps. A PC is running LanXL in the Capture and Monitor mode. This allows you to observe the traffic on the network and read the total network utilization directly from the monitoring station. The token-ring monitor does not have to be very sophisticated in order to provide this capability; however accurately assessing Ethernet utilization from a monitoring station is far more difficult due to the presence of collisions and retransmissions. For each experiment you will observe and record the total network utilization by reading the average utilization from the Network Utilization window of the monitor PC. Two PCs will be used to transfer a file using FTP. The transfer should be done several times for each load configuration. As with the Ethernet, do not transfer the file while you are determining the utilization. You should take about 5 readings and calculate an average. There are charts corresponding to each of two sets of experiments. The first uses large frame lengths of 1518 octets. The second set uses small length frames of 512 octets. The justification for these choices parallel the explanations given for the Ethernet experiments. Follow the example procedures detailed following the configuration tables for the first configuration set, and then repeat those procedures for each subsequent configuration. Lan Performance Lab Ver 1.4, February

13 Token-Ring Configuration Charts: Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (octets) (msec) (%) (%) (sec) 1518 NA Table 5: Token-Ring Octet Frames Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (bytes) (msec) (%) (%) (sec) 512 NA Table 6: Token-Ring Octet Frames Lan Performance Lab Ver 1.4, February

14 Token-Ring Example Step-by-Step Procedures 1) Token-Ring Traffic Generator and Monitor function Verification, refer to Procedure- 4 and Procedure-5. 2) Token-Ring FTP verification, refer to Procedure-6 3) Stop FTP transfer 4) Stop traffic generator and monitor 5) From FTP client, transfer file from server to client 6) Transfer five times, when finished, record the average time into table5 and table 6. 7) On each traffic generator, set its operation mode as transmitting mode and set the transfer buffer parameters based on table 5 and 6. Refer to Procedure-5. Note: Each of the traffic generators will be configured identically for each run of the experiment. Be sure to confirm that they are the same before you take any measurements. 8) Repeat 7) on each traffic generator. 9) Click start for each traffic generator. 10) Wait for about 15 seconds, click start on the monitor. 11 ) Read the Utilization from the monitor and record it. Note: The total offered load to the network is the sum of the offered load from each of the traffic generators. The total network utilization, which could be seen from monitor, is equal to the sum of the utilization reported by each station. This may become difficult to do as the load increases. Get the best average estimate you can. Determine the utilization and record it in the appropriate place on the Ethernet table. This should be about 20-25% for the experiment corresponding with the first configuration. 12. Connect to FTP server using the Procedure From FTP client, run get file.exe 5 times, and record the average transfer time on the chart. 14. Change the traffic generator settings based on table 5 and table 6 and repeat the procedure from 7 to 13 and record the data. Lan Performance Lab Ver 1.4, February

15 Part III: Analysis and Questions Students are required to attend a lab session, then complete and hand in the questions on the following pages: Lan Performance Lab Ver 1.4, February

16 LAN Performance Lab: Analysis and Questions Supplement NAME: The measurement results should be copied from the corresponding tables in your complete lab handout. Please DO NOT turn in the complete handout. Please answer the following questions on a separate piece of paper. If you can, please type your answers. 1. Measurements Please complete the following tables using results you collected in the lab: Lan Performance Lab Ver 1.4, February

17 Ethernet Configuration tables: Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (octets) (msec) (%) (%) (sec) 1518 NA Table 3: Ethernet Octet Frames Packet Size Packet Gap # of Stations Offered Load Utilization FTP File-Transfer Time (octets) (msec) (%) (%) (sec) 512 NA Table 4: Ethernet Octet Frames Lan Performance Lab Ver 1.4, February

18 Token-Ring Configuration Charts: Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (octets) (msec) (%) (%) (sec) 1518 NA Table 5: Token-Ring Octet Frames Packet Size Packet Gap # of Stations Offered Load Utilization FTP File Transfer Time (bytes) (msec) (%) (%) (sec) 512 NA Table 6: Token-Ring Octet Frames Lan Performance Lab Ver 1.4, February

19 2. Required Graphs: You will be required to use MATLAB to plot six graphs as part of the analysis of this lab experiment.. NOTE: MAKE SURE THAT YOU SET THE X AND Y COORDINATES AS INDICATED IN THE LAB, OTHERWISE YOUR GRAPHS WILL BE MARKED WRONG. Label all relevant information on each submitted graph. This includes a title, axis labels and clear indication of the scale on each axis. The dependent variable should be along the vertical axis, the independent variable along the horizontal axis. Graphs: Please complete the following graphs based upon the data you collected in the lab: 3. Questions 1. Graph total offered load (y - axis) versus network utilization (x - axis) for each of the following cases: Ethernet using 1518-octet frames. Ethernet using 512-octet frames. Token-ring using 1518-octet frames. Token-ring using 512-octet frames. 2. Graph network utilization (y - axis) versus file transfer time (x - axis) for each of the following cases: Assume utilization is the independent variable for these graphs. Ethernet using 1518-octet frames. Token-ring using 1518-octet frame. Please provide concise answers to the following questions on an attached sheet. 1. Explain any differences in the Ethernet utilization curves for the two frame sizes tested. 2. What are the advantages and/or disadvantages of using small or large frames on Ethernet? 3. Why does the file transfer time rise so dramatically on the heavily loaded Ethernet network using 1518 byte frames? 4. What can you say about the relative throughput characteristics of Ethernet and token-ring. 5. Explain any differences in delays between lightly loaded token-ring and Ethernet networks. 6. Why do the delay characteristics on the token-ring network remain relatively flat even under heavily loaded conditions? Lan Performance Lab Ver 1.4, February

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

RTT 60.5 msec receiver window size: 32 KB

RTT 60.5 msec receiver window size: 32 KB Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

More information

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1)

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program. Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

ETHERNET WEATHER STATION CONNECTIONS Application Note 33

ETHERNET WEATHER STATION CONNECTIONS Application Note 33 ETHERNET WEATHER STATION CONNECTIONS Application Note 33 With WeatherLink and a Device Server INTRODUCTION It is possible to substitute an Ethernet connection for the direct USB or serial connection that

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL

TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL TCP/IP MODULE CA-ETHR-A INSTALLATION MANUAL w w w. c d v g r o u p. c o m CA-ETHR-A: TCP/IP Module Installation Manual Page Table of Contents Introduction...5 Hardware Components... 6 Technical Specifications...

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

RFC 2544 Testing of Ethernet Services in Telecom Networks

RFC 2544 Testing of Ethernet Services in Telecom Networks RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Smoking and any food or drinks are not permitted in the Applications Lab!

Smoking and any food or drinks are not permitted in the Applications Lab! 220 Lab C Introduction to Cisco IP Telephony Pre-Lab Activities: None Purpose of the experiment: To explore the Cisco IP Telephony System configuration options, and its use. Smoking and any food or drinks

More information

USB 3.0 Universal Mini Docking Station Adapter

USB 3.0 Universal Mini Docking Station Adapter USB 3.0 Universal Mini Docking Station Adapter User Manual DSH-M100U3 Ver. 1.00 All brand names and trademarks are properties of their respective owners. www.vantecusa.com Copyright 2015 Vantec Thermal

More information

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn) NETVIGATOR Wireless Modem Setup Guide (TG789Pvn) Configure the NETVIGATOR Wireless Modem Make sure that system meets the following requirement prior to NETVIGATOR Wireless Modem usage: - Subscribers who

More information

ProSAFE 8-Port and 16-Port Gigabit Click Switch

ProSAFE 8-Port and 16-Port Gigabit Click Switch ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Lab assignment #1 Firewall operation and Access Control Lists

Lab assignment #1 Firewall operation and Access Control Lists University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab GSA: Carlos Caicedo Document version: 1.0 / 2008 I. Lab resources for this assignment Lab assignment #1 Firewall

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the

More information

Compulite File Server

Compulite File Server Compulite File Server General Information Compulite File Server (CFS) is an application that runs on Microsoft Windows based PCs. This application enables Compulite lighting consoles to access the PC's

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto

More information

ENET-710. ENET-710 - Ethernet Module ENET-710 JAN / 06 FOUNDATION

ENET-710. ENET-710 - Ethernet Module ENET-710 JAN / 06 FOUNDATION ENET-710 ENET-710 - Ethernet Module JAN / 06 ENET-710 FOUNDATION E N E T 7 1 0 ME smar www.smar.com Specifications and information are subject to change without notice. Up-to-date address information is

More information

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above. Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

MFC7840W Windows Network Connection Repair Instructions

MFC7840W Windows Network Connection Repair Instructions Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine

More information

WUA-0605 300Mbps Wireless USB Network Adapter

WUA-0605 300Mbps Wireless USB Network Adapter WUA-0605 300Mbps Wireless USB Network Adapter User Manual V1.0 Certification FCC CE FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant

More information

How to add a SIP server How to register a handset

How to add a SIP server How to register a handset How to add a SIP server How to register a handset Contents Contents... 1 Hardware required equipment... 2 Software required equipment... 3 Add server... 3 Register handset to base... 7 1 of 12 Hardware

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

ZyXEL AES-100 V2.03(AS.0) Release Notes/Manual Supplement

ZyXEL AES-100 V2.03(AS.0) Release Notes/Manual Supplement Date: May 22, 2002 ZyXEL AES-100 V2.03(AS.0) Release Notes/Manual Supplement Version: F/W Version: V2.03(AS.0) 5/22/2002 This version is the same as V2.03(AS.0)b10 Release by Glen Lin 1 Date: May 21, 2002

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A

1-Port Wireless USB 2.0 Print Server Model # APSUSB201W. Quick Installation Guide. Ver. 2A 1-Port Wireless USB 2.0 Print Server Model # APSUSB201W Quick Installation Guide Ver. 2A Section 1 Step 1Connect one end of the Ethernet cable to the RJ-45 port of the Print Server and attach the other

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

Using a simple crossover RJ45 cable, you can directly connect your Dexter to any computer.

Using a simple crossover RJ45 cable, you can directly connect your Dexter to any computer. Dexter is a network device using the Ethernet protocol to connect and communicate with other devices on the network: Computers, routers, DHCP servers. Thus you have to setup your Dexter and your network

More information

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying

More information

USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks

USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks USER MANUAL GUIMGR Graphical User Interface Manager for FRM301/FRM401 Media Racks CTC Union Technologies Co., Ltd. Far Eastern Vienna Technology Center (Neihu Technology Park) 8F, No. 60 Zhouzi St. Neihu,

More information

Debugging Network Communications. 1 Check the Network Cabling

Debugging Network Communications. 1 Check the Network Cabling Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps

More information

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking StarMOBILE Network Configuration Guide A guide to configuring your StarMOBILE system for networking INTRODUCTION... 3 BEFORE YOU BEGIN... 3 1) CONFIRM YOU HAVE THE LATEST SOFTWARE... 3 2) INSTALL THE STARMOBILE

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations : SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the

More information

Preparing the Computers for TCP/IP Networking

Preparing the Computers for TCP/IP Networking Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or

More information

TE100-P21/TEW-P21G Windows 7 Installation Instruction

TE100-P21/TEW-P21G Windows 7 Installation Instruction Hardware Installation TE100-P21/TEW-P21G Windows 7 Installation Instruction 1. Go to http://www.trendnet.com/downloads/ to download the Windows 7 Utility. Save the file to your desktop. 2. Right click

More information

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use

More information

IP-Pro (Virtual IP Protocol Independent Version) User Instructions

IP-Pro (Virtual IP Protocol Independent Version) User Instructions IP-Pro (Virtual IP Protocol Independent Version) User Instructions - Table of Contents - 1. IP Pro introduction 2. IP Pro installation 3. IP Pro setup 4. Virtual IP function check 5. Virtual IP changes

More information

Qvis Security Technical Support Field Manual LX Series

Qvis Security Technical Support Field Manual LX Series Table of Contents Page 1: Motion Detection 1.0 Configuring Motion Detection for LX Apollo / LX Zeus DVRs 2 1.1 Motion Playback on LX Apollo / LX Zeus DVRs 3 1.2 Scheduling Motion and Continuous Recording

More information

Verifying Network Bandwidth

Verifying Network Bandwidth Verifying Network Bandwidth My current project is to install a new Gigabit link between the datacenter and Smith Hall on the far side of the campus, says Joe Homes, the network administrator for a Pacific

More information

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network This lab has been originally designed as supplemental material for Prof. Panko s textbook Business Data Networks and Telecommunications.

More information

Sweex Wireless BroadBand Router + 4 port switch + print server

Sweex Wireless BroadBand Router + 4 port switch + print server Sweex Wireless BroadBand Router + 4 port switch + print server Advantages Internet Sharing - A broadband internet connection makes it possible for several PCs to use the internet simultaneously. Wireless

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Ten top problems network techs encounter

Ten top problems network techs encounter Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,

More information

File Sharing. Peter Lo. CP582 Peter Lo 2003 1

File Sharing. Peter Lo. CP582 Peter Lo 2003 1 File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring

More information

Enabling Internet Connection Sharing on Windows 2000 15. Enabling ICS On Windows XP As The Host 4 Enabling ICS On Windows XP As The Client 11

Enabling Internet Connection Sharing on Windows 2000 15. Enabling ICS On Windows XP As The Host 4 Enabling ICS On Windows XP As The Client 11 Sharing an Internet Connection with SatDirect Plus Table of Contents Contents Section 1: Section 2: Section 3: Introduction... 1 Physical Setup......2 Enabling Internet Connection Sharing on Windows XP

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014 WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234

More information

Volume. Instruction Manual

Volume. Instruction Manual Volume 1 Instruction Manual Networking EVERFOCUS ELECTRONICS CORPORATION Networking Instruction Guide 2004 Everfocus Electronics Corp 2445 Huntington Drive Phone 626.844.8888 Fax 626.844.8838 All rights

More information

Network Performance Evaluation. Throughput. Troy Bennett. Computer Science Department. School of Engineering. California Polytechnic State University

Network Performance Evaluation. Throughput. Troy Bennett. Computer Science Department. School of Engineering. California Polytechnic State University Network Performance Evaluation Throughput by Troy Bennett Computer Science Department School of Engineering California Polytechnic State University 1998 Date Submitted: Advisor: TABLE OF CONTENTS Page

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring

More information

How to Setup and Connect to an FTP Server Using FileZilla. Part I: Setting up the server

How to Setup and Connect to an FTP Server Using FileZilla. Part I: Setting up the server How to Setup and Connect to an FTP Server Using FileZilla The ability to store data on a server and being able to access the data from anywhere in the world has allowed us to get rid of external flash

More information

Model 288B Charge Plate Graphing Software Operators Guide

Model 288B Charge Plate Graphing Software Operators Guide Monroe Electronics, Inc. Model 288B Charge Plate Graphing Software Operators Guide P/N 0340175 288BGraph (80207) Software V2.01 100 Housel Ave PO Box 535 Lyndonville NY 14098 1-800-821-6001 585-765-2254

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Network Security: Workshop

Network Security: Workshop Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

1. Hardware Installation

1. Hardware Installation 4 Port 10/100M Internet Broadband Router with USB Printer server Quick Installation Guide #4824904AXZZ0 1. Hardware Installation A. System Requirement Before you getting started, make sure that you meet

More information

Monitoring Load-Balancing Services

Monitoring Load-Balancing Services CHAPTER 8 Load-balancing is a technology that enables network traffic to follow multiple paths to a specific destination. It distributes incoming service requests evenly among multiple servers in such

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

PRILINK PRI Management System

PRILINK PRI Management System www.prilink.com PRILINK PRI MANAGEMENT SSTEM INSTALLATION GUIDE PRI Management PRILINK PRI Management System Installation Guide Version 3.0, Rev. 12-01-24 Page 1 Table of Contents 1 HARDWARE INSTALLATION...

More information

CCNA Tutorial Series SUBNETTING

CCNA Tutorial Series SUBNETTING CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By

More information

Exploring the Remote Access Configuration Utility

Exploring the Remote Access Configuration Utility Exploring the Remote Access Configuration Utility in Ninth-Generation Dell PowerEdge Servers The Remote Access Configuration Utility supports local and remote server management in ninth-generation Dell

More information

Connecting to the Internet

Connecting to the Internet Connecting to the Internet Connecting the Gateway to the Internet Configuration of TCP/IP Protocol Installing the USB Drivers Connecting Ethernet Network Devices Connecting USB Network Devices Connecting

More information

NAS 307 Link Aggregation

NAS 307 Link Aggregation NAS 307 Link Aggregation Set up link aggregation on your ASUSTOR NAS A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Have a basic understanding of

More information

Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)

Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE) Network Setup Guide 1 Glossary 1.1 Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service Provider) means

More information

Lab 7.1.9b Introduction to Fluke Protocol Inspector

Lab 7.1.9b Introduction to Fluke Protocol Inspector Lab 7.1.9b Introduction to Fluke Protocol Inspector DCE SanJose1 S0/0 S0/0 SanJose2 #1 #2 Objective This lab is a tutorial demonstrating how to use the Fluke Networks Protocol Inspector to analyze network

More information

Quick Setup Guide High Power Wireless Ethernet Converter WLI-TX4-G54HP

Quick Setup Guide High Power Wireless Ethernet Converter WLI-TX4-G54HP Quick Setup Guide High Power Wireless Ethernet Converter WLI-TX4-G54HP This guide is intended to help you quickly and easily install your High Power Wireless Ethernet Converter. For more setup and configuration

More information

Business Model - Create and Thrustling Group Policy in Windows Vista

Business Model - Create and Thrustling Group Policy in Windows Vista Bandwidth with Policy-Based Quality of Service Page 1 of 11 Managing Windows Vista and Windows Server Longhorn Network Bandwidth with Policy-Based Quality of Service Abstract Policy-based Quality of Service

More information

Ultra Thin Client TC-401 TC-402. Users s Guide

Ultra Thin Client TC-401 TC-402. Users s Guide Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE

More information

IPS Attack Protection Configuration Example

IPS Attack Protection Configuration Example IPS Attack Protection Configuration Example Keywords: IPS Abstract: This document presents a configuration example for the attack protection feature of the IPS devices. Acronyms: Acronym Full spelling

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

Configuring an A Series LED Sign Controller for your Network

Configuring an A Series LED Sign Controller for your Network Configuring an A Series LED Sign Controller for your Network A Series LED displays from Optec support both serial and 10BaseT Ethernet communication. Serial communication via RS232 or RS485 is independent

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Turbo 85 Mbps Powerline Ethernet Adapter Model # APL8512. User s Manual. Ver. 1A

Turbo 85 Mbps Powerline Ethernet Adapter Model # APL8512. User s Manual. Ver. 1A Turbo 85 Mbps Powerline Ethernet Adapter Model # APL8512 User s Manual Ver. 1A Table of Contents 1. Introduction... 3 1.1 Package Contents... 3 1.2 Features... 3 2. Installing Adapters... 4 3. Installing

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Configuring NETGEAR PROSAFE 8-port, 16-port and 24-port switches Supporting Power over Ethernet with Avaya Communication Manager, Avaya one-x Quick Edition G10

More information

ADSL MODEM. User Manual V1.0

ADSL MODEM. User Manual V1.0 ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...

More information