FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking"

Transcription

1 FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

2 Learning Objectives Upon completion of this chapter, you should be able to: Describe the basic elements of computer-based data communication Know the key entities and organizations behind current networking standards, as well as the purpose of and intent behind the more widely used standards Explain the nature and intent of the OSI reference model and list and describe each of the model s seven layers Describe the nature of the Internet and the relationship between the TCP/IP protocol and the Internet Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 2

3 Networking Fundamentals Fundamental exchange of information: sender communicates message to receiver over some medium Communication only occurs when recipient is able to receive, process, and comprehend message One-way flow of information is called a channel When recipient becomes a sender, for example by responding to original sender s message, this two-way flow is called a circuit Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 3

4 Networking Fundamentals (continued) Any medium may be subject to interference, called noise, which occurs in variety of forms Attenuation: loss of signal strength as signal moves across media Crosstalk: occurs when one transmission bleeds over to another Distortion: unintentional variation of communication over media Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 4

5 Networking Fundamentals (continued) Any medium may be subject to interference, called noise, which occurs in variety of forms (continued) Echo: reflection of a signal due to equipment malfunction or poor design Impulse: sudden, short-lived increase in signal frequency or amplitude, also known as a spike Jitter: signal modification caused by malfunctioning equipment White noise: unwanted noise due to signal coming across medium at multiple frequencies Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 5

6 Reasons to Network Data communications: exchange of messages across a medium Networking: interconnection of groups or systems with purpose of exchanging information Some reasons to build a network: To exchange information To share scarce or expensive resources To allow distributed organizations to act as if centrally located Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 6

7 Types of Networks Networks can be categorized by: Components: peer-to-peer (P2P), server-based, distributed multi-server Size: local area network (LAN), metropolitan area network (MAN), wide area network (WAN) Layout or topology: physical (ring, bus, star, hierarchy, mesh, hybrid), logical (bus, star) Media: guided (wired), unguided (wireless) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 7

8 Network Standards Among the agencies that work on data communications standards are: Internet Society (ISOC) Internet Assigned Numbers Authority (IANA) American National Standards Institute (ANSI) International Telecommunication Union (ITU) Institute of Electrical and Electronics Engineers (IEEE) Telecommunications Industry Association (TIA) International Organization for Standardization (ISO) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 8

9 OSI Reference Model and Security OSI reference model allocates functions of network communications into seven distinct layers, each with its own functions and protocols Premise of model is information sent from one host is translated and encoded through various layers, from Application layer to Physical layer Physical layer initiates transmission to receiver Receiver translates and decodes message by processing information through each layer in reverse order Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 9

10 The Physical Layer The primary function of the Physical layer is to place the transmission signal carrying the message onto the communications media that is, to put bits on a wire The functions of the Physical layer are: Establish and terminate the physical and logical connection to the media Manage the flow and communication on the media Embed the message onto the signal carried across the physical media Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 10

11 Network Media Dominant media types and standards include: Coaxial cable Fiber-Optic cable Twisted-pair wire Wireless LAN Bluetooth Infrared Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 11

12 Embedding the Message Method used to embed message on signal depends on type of message and type of signal Two types of message (or information): Analog information: continuously varying source (such as voice communications) Digital information: discrete, between a few values (such as computer communications) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 12

13 Embedding the Message (continued) Multiplexing combines several circuits to create high-bandwidth stream to carry multiple signals long distances Three dominant multiplexing methods are: Frequency division multiplexing (FDM): combines voice channels Time division multiplexing (TDM): assigns a time block to each client Wave division multiplexing (WDM): uses different frequencies of light so multiple signals can travel on same fiber-optic cable Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 13

14 Managing Communication Bit (or signal) flow conducted in several ways: Simplex transmissions: flow one way through a medium Half-duplex transmissions: flow either way, but in only one direction at a time Full-duplex transmissions: can flow both ways at the same time Serial transmissions: flow one bit at a time down a single communications channel Parallel transmissions: flow multiple bits at a time down multiple channels Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 14

15 Managing Communication (continued) Asynchronous (or timing-independent) Formulate data flow so each byte or character has its own start and stop bit Used in older modem-based data transfers to send individual characters between systems Synchronous (or timing-dependent) Use computer clocking to transmit data in continuous stream between two systems Clock synchronization makes it possible for end nodes to identify start and end of data flow This protocol is much more efficient Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 15

16 Data Link Layer Primary networking support layer Referred to as first subnet layer because it provides addressing, packetizing, media access control, error control, and some flow control for local network In LANs, it handles client-to-client and client-toserver communications Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 16

17 Data Link Layer (continued) DLL is further divided into two sublayers: Logical Link Control (LLC) sublayer Primarily designed to support multiplexing and demultiplexing protocols transmitted over MAC layer Also provides flow control and error detection and retransmission Media Access Control (MAC) sublayer Designed to manage access to communications media in other words, to regulate which clients are allowed to transmit and when Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 17

18 DLL Protocols Dominant protocol for local area networking is Ethernet for wired networks and Wi-Fi for wireless networks Other DLL LAN protocols include: Token ring Fiber Distributed Data Interface (FDDI) Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) WANs typically use ATM and frame relay Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 18

19 Forming Packets and Addressing First responsibility of DLL is converting Network layer packet into DLL frame DLL adds not only a header but also a trailer When necessary, packet is fragmented into frames, with corresponding information embedded into each frame header Addressing is accomplished with a number embedded in network interface card (NIC) This MAC address allows packets to be delivered to an endpoint; typically shown in hexadecimal format (e.g., A3-6A-B2-1A) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 19

20 Media Access Control A primary function of DLL is controlling flow of traffic that is, determining which station is allowed to transmit when Two general approaches: Control Contention Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 20

21 Media Access Control (continued) Control (deterministic) Well-regulated network: traffic transmitted in orderly fashion, maintaining optimal data rate Facilitate priority system: key clients or servers can be polled more frequently than others Contention (stochastic) Clients listen to determine if channel is free and then transmit Must have mechanisms to deal with collisions Collision avoidance vs. collision detection Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 21

22 Switches and Bridges Specific technologies used to connect networks at Data Link layer While hub connects networks at Physical layer, connecting two networks with hub results in one large network (or collision domain) Connection via Layer 2 switch, capable of bridging, maintains separate collision domains Bridging: process of connecting networks with DLL protocols while maintaining integrity of each network, only passing messages that need to be transmitted between the two Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 22

23 Network Layer and Packetizing Network layer is primary layer for communications between networks Three key functions: Packetizing Addressing Routing During packetizing, Network layer takes segments sent from Transport layer and organizes them into packets for transmission across a network Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 23

24 Addressing Network layer uses network-layer address to uniquely identify destination across multiple networks Typical address consists of the network ID and the host ID In TCP/IP, IP address is network-layer address IP address contains source and destination IP address along with additional packet information Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 24

25 Addressing (continued) Addresses maintained and issued by Internet Assigned Numbers Authority (IANA) In early years, addresses distributed as follows: Class A: consists of primary octet (the netid) with three octets providing host ID portion; allows up to 16,777,214 hosts on network Class B: consists of two octets in netid with two octets providing host IDs Class C: consists of three octets in netid with one octet providing 254 host IDs Class D and Class E addresses are reserved Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 25

26 Addressing (continued) This address assignment method proves inefficient Internet moving to new version of IP, IPv6, which uses 128-bit address instead of 32-bit Increases available addresses by factor of Network Address Translation (NAT): uses device, like a router, to segregate external Internet from internal network Device maps organizational addresses to different addresses inside the intranet Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 26

27 Routing Moving Network layer packets across networks Routing protocols include static and dynamic Internal routing protocols: Used inside autonomous system (AS) Distance-vector routing protocols and link-state routing protocols External routing protocols: Communicate between autonomous systems Translate different internal routing protocols Border Gateway Protocol (BGP) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 27

28 Transport Layer Primary function of Transport layer is to provide reliable end-to-end transfer of data between user applications Lower layers focus on networking and connectivity while upper layers, beginning with Transport layer, focus on application-specific services Transport layer also responsible for end-to-end error control, flow control, and several other functions Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 28

29 Error Control Process of handling problems with transfer process, which may result in modified or corrupted segments Broken into two components: error detection and error correction Errors are typically single-bit or multiple-bit Bit errors are most likely the result of noise interference Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 29

30 Error Control (continued) Errors detected using one of several schemes: Repetition: data transmitted redundantly Parity: check bits at end of each byte of data Redundancy: parity calculated for blocks of data rather than individual byte (LRC, VRC, CRC) Errors typically corrected by retransmission of damaged segment Dominant error correction techniques are automatic repeat requests (ARQs) Three most common ARQs are Stop-And-Wait, Go-Back-N, and Selective Repeat Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 30

31 Flow Control Purpose is to prevent receiver from being overwhelmed with segments, preventing effective processing of each received segment Some error correction techniques have built-in flow control Dominant technique is sliding window protocol, which provides mechanism by which receiver can specify number of segments (or bytes) it can receive before sender must wait Receiver enlarges or reduces window size as necessary Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 31

32 Other Functions of the Transport Layer Assignment of ports, which identify the service requested by a user Combination of Network layer address and port is referred to as a socket Tunneling protocols also work at Transport layer These protocols work with Data Link layer protocols to provide secure connections Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 32

33 Session Layer Responsible for establishing, maintaining, and terminating communications sessions between two systems Regulates whether communications are simplex (one way only), half-duplex (one way at a time), or full-duplex (bidirectional) Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 33

34 Presentation Layer Responsible for data translation and encryption functions For example, if one system is using standard ASCII and another is using EBCDIC, the Presentation layer performs the translation Encryption can also be part of operations performed at this level Presentation layer encapsulates Application layer messages prior to passing them down to Transport layer Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 34

35 Application Layer At Application layer, user is provided with a number of services, most aptly called application protocols TCP/IP protocol suite includes applications such as (SMTP and POP), World Wide Web (HTTP and HTTPS), file transfer (FTP and SFTP), and others Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 35

36 The Internet and TCP/IP The Internet incorporates millions of small, independent networks, connected by most of the major common carriers Most services we associate with the Internet are based on Application layer protocols The Internet is a physical set of networks, while the World Wide Web (WWW) is a set of applications that run on top of the Internet Web uses domain name-based Uniform Resource Identifiers (URIs), Uniform Resource Locator (URL) being best-known type Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 36

37 TCP/IP TCP/IP actually suite of protocols used to facilitate communications across the Internet Developed before OSI reference model, it is similar in concept but different in detail TCP/IP model is less formal than OSI reference model Each of the four layers of TCP/IP model represents a section of one or more layers of OSI model Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 37

38 Application Layer TCP/IP Application layer consists of utility protocols that provide value to end user Data from users and utilities are passed down to Transport layer for processing Wide variety of Application layer protocols that support Internet users: SMTP, POP for , FTP for data transfer, HTTP for Web content Application layers on each host interact directly with corresponding applications on other hosts to provide requisite communications support Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 38

39 Transport Layer Responsible for transferring of messages, including resolution of errors, managing necessary fragmentation, and control of message flow, regardless of underlying network Connection or connectionless messages Connects applications through use of ports Lowest layer of TCP/IP stack to offer any form of reliability TCP: connected, reliable protocol UDP: connectionless, unreliable protocol Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 39

40 Internetwork Layer Handles moving packets in a single network Examples of protocols are X.25 and ARPANET s Host/IMP Protocol Internet Protocol (IP) performs task of moving packets from source host to destination host IP carries data for many different upper-layer protocols Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 40

41 Internetwork Layer (continued) Some protocols carried by IP function on top of IP but perform other Internetwork layer functions All routing protocols are also part of Network layer Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 41

42 Subnet Layers TCP/IP Subnet layers include Data Link and Physical layers TCP/IP relies on whatever native network subnet layers are present For example, if user s network is Ethernet then IP packets are encapsulated into Ethernet frames No specification for Data Link layer or Physical layer Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 42

43 Chapter Summary Fundamental exchange of information: sender communicates message to receiver over some medium Communication only occurs when recipient is able to receive, process, and comprehend message Any medium may be subject to interference: attenuation, crosstalk, distortion, echo, impulse, jitter, white noise Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 43

44 Chapter Summary (continued) Some reasons to build a network: To exchange information To share scarce or expensive resources To allow distributed organizations to act as if centrally located Networks can be categorized by: components, size, layout or topology, media OSI reference model allocates functions of network communications into seven distinct layers, each with its own functions and protocols Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 44

45 Chapter Summary (continued) OSI reference model layers: Physical: puts transmissions onto media Data Link: primary networking support layer Network: primary layer for communications between networks Transport: provides reliable end-to-end transfer of data between user applications Session: establishes, maintains, terminates communications sessions between two systems Presentation: data translation and encryption Application: provides application protocols Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 45

46 Chapter Summary (continued) Each of four layers of TCP/IP model represents a section of one or more layers of OSI model Application: consists of utility protocols that provide value to end user Transport: responsible for transferring messages, regardless of underlying network Internetwork: handles moving packets in a single network Subnet: includes Data Link and Physical layers, relying on whatever native network subnet layers are present for signal transmission Firewalls & Network Security, 2nd ed. - Chapter 2 Slide 46

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

TCP IPX/SPX. 1 The Mattapan/Greater Boston Technology Learning Center.

TCP IPX/SPX. 1 The Mattapan/Greater Boston Technology Learning Center. 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

OSI Reference Model: An Overview

OSI Reference Model: An Overview OSI Reference Model: An Overview Gaurav Bora 1, Saurabh Bora 2, Shivendra Singh 3, Sheikh Mohamad Arsalan 4 ( 1 Department of Electronics, Uttarakhand Technical University, Dehradun, INDIA) ( 2 Department

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS

COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Post-Class Quiz: Telecommunication & Network Security Domain

Post-Class Quiz: Telecommunication & Network Security Domain 1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

Network Models and Protocols

Network Models and Protocols 669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham 1 Wide-area Networks (WANs) 2 Metropolitan-Area Network (MANs) 3 Path Determination 4 Internetworking Any internetwork must include

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI

More information

Study Guide CompTIA A+ Certification, Domain 2 Networking

Study Guide CompTIA A+ Certification, Domain 2 Networking Study Guide CompTIA A+ Certification, Domain 2 Networking Brought to you by RMRoberts.com Introduction to CSR Domain - 2 (220-801) The CompTIA A+ 220-801 Domain 2 Networking has expanded a lot since the

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

Computer Networks III

Computer Networks III Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router

More information

1 Chapter 1 Networking Fundamentals Chapter 1 Networking Fundamentals

1 Chapter 1 Networking Fundamentals Chapter 1 Networking Fundamentals 1 Chapter 1 Networking Fundamentals Chapter 1 Networking Fundamentals This chapter provides an overview of basic networking concepts, including network architecture, design, and project management. Table

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Internetworking and IP Address

Internetworking and IP Address Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address

More information

The OSI Model and the TCP/IP Protocol Suite

The OSI Model and the TCP/IP Protocol Suite The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere

More information

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

ET225 Networking Concepts. Chapter 1 What is a Computer Network? ET225 Networking Concepts Chapter 1 What is a Computer Network? Objectives Identify the advantages of connecting computers and devices on a network. Recognize common network components in a lab setting.

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Data Communication Networks and Converged Networks

Data Communication Networks and Converged Networks Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

EC 301 COMPUTER NETWORKING FUNDAMENTALS

EC 301 COMPUTER NETWORKING FUNDAMENTALS EC 301 COMPUTER NETWORKING FUNDAMENTALS CHAPTER 1: INTRODUCTION TO NETWORKING Prepared By: Sheila/JKE/PKB CHAPTER 1 DURATION 6 HOURS (3 weeks) Lecture CLO 1 Explain the hardware and network devices to

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Data Communication Networks Introduction

Data Communication Networks Introduction Data Communication Networks Introduction M. R. Pakravan Department of Electrical Engineering Sharif University of Technology Data Networks 1 Introduction The course introduces the underlying concepts and

More information

524 Computer Networks

524 Computer Networks 524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

T/A/Mentors Office and Office Hours: Check the Staff Information Page on class site

T/A/Mentors Office and Office Hours: Check the Staff Information Page on class site University of Southern California Course Title: EE450: Computer Networks Semester: Fall Semester 2014 Instructor: Professor A. Zahid, azahid@usc.edu Office: PHE 418, 213-740-9058 Office Hours: TTH 9:00

More information

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult: How Networks Differ Differences that can occur at network layer, which makes internetworking difficult: It is impossible to resolve all differences, and the solution is to take a simple approach (as in

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

2 Basic Concepts. Contents

2 Basic Concepts. Contents 2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

DATA COMMUNICATION (Basics of data communication, OSI layers.)

DATA COMMUNICATION (Basics of data communication, OSI layers.) DATA COMMUNICATION (Basics of data communication, OSI layers.) K.K.DHUPAR SDE (NP-II) ALTTC ALTTC/NP/KKD/Data Communication 1 Data Communications History 1838: Samuel Morse & Alfred Veil Invent Morse Code

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

COMPUTER NETWORK TECHNOLOGY (40)

COMPUTER NETWORK TECHNOLOGY (40) PAGE 1 OF 16 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2013 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must

More information

Local Area Network. OSI Seven Layer Model. Whole Building Network

Local Area Network. OSI Seven Layer Model. Whole Building Network (MECH3023) 2 Local Area Network Networking for BAS Centralized & Decentralized networks LAN topologies LAN standards & examples Transmission hardware OSI Seven Layer Model Importance of interoperability

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS CIS 175 NETWORK TECHNICIAN JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS Course Description A course designed to enable students to understand and work with network media and topologies, protocols and

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1. Introduction. Version 2 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

More information