Chapter 1. Networking and the OSI Model

Size: px
Start display at page:

Download "Chapter 1. Networking and the OSI Model"

Transcription

1 Chapter 1 Networking and the OSI Model 3

2 4 Nortel Networks: The Complete Reference Although many aspects of networking change as time goes by, some things remain constant. In order for different local area network (LAN) and wide area network (WAN) technologies to interact together, standards need to be in place to ensure interoperability. Vendors of different networking technologies must adhere to these standards so that the multitude of networking equipment functions together correctly. A wide variety of standards are already in place for technologies such as Ethernet, token ring, Fiber Distributed Data Interface (FDDI), and Asynchronous Transfer Mode (ATM), and new standards are being created continually as technology advances. The Seven-Layer OSI Model The Open Systems Interconnection (OSI) model, formulated by the International Organization for Standardization (ISO), defines the seven different networking layers (see Figure 1-1). The purpose of this model is to define how information from a user application, such as or a web browser, should be converted into a physical signal for transport across the LAN or WAN, and then converted back again for use at the application layer on the receiving side. Although sometimes thought of as a standard, the OSI model is really more of a guideline indicating how data is to be converted from a user application, transmitted over a physical medium, and then converted back again. The OSI model describes the seven networking layers and the functions of each, but it doesn t define the specific manner in which these layer functions work, because that varies depending on the networking architecture being used. This is a flexible model, as not every technology (ATM most notably) will fit the model exactly. Figure 1-1. The seven-layer OSI model

3 Chapter 1: Networking and the OSI Model 5 Physical Layer (Layer 1) The first layer of the OSI model is the physical layer, which defines how data should pass over the physical medium and how that data should be encoded at the bit level. Included in the physical layer are the physical medium, including cabling types and pinouts, voltage levels, and physical transmitters and receivers. Physical mediums include coaxial cable, twisted-pair cable, fiber optics, and wireless. As shown in Figure 1-1, the physical layer is divided into four sections: AN OVERVIEW OF NETWORKING Physical layer signaling (PLS) Defines how the signaling should be performed Attachment unit interface (AUI) Defines the transceiver cable specifications Physical medium attachment (PMA) Defines the actual transceiver specifications Medium-dependent interface (MDI) Specifies the actual connection between the transceiver and the specific cable type the transceiver is designed for An example of a physical layer device is a repeater, which simply refreshes the incoming signal and repeats it, increasing the overall distance that the signal can travel before degrading beyond use. Data-Link Layer (Layer 2) The data-link layer is responsible for transmission, flow control, and error detection, so that data received by the lower layers is screened for potential problems before being passed to the higher layers. The data-link layer is broken into two sublayers (see Figure 1-1): Logical Link Control (LLC) Handles the interface between the upper layers, and connection to the physical media type. The LLC, which is defined in the Institute of Electrical and Electronics Engineers (IEEE) standard, provides a common interface between the upper layers and the particular network architecture. Media Access Control (MAC) Responsible for receiving data from the LLC and actually encapsulating the data into the correct packet format for transmission onto the physical media. The MAC layer first determines whether the physical media is available for transmission, and then determines whether retransmission is necessary due to a collision or other failure. The receiving MAC is responsible for error checking and passing the data to the LLC. Network Layer (Layer 3) The network layer is responsible for logical addressing, which involves mapping logical addresses to MAC-layer addresses so that devices can intercommunicate. Layer 3 also is responsible for determining a packet s destination and making sure that packets are

4 6 Nortel Networks: The Complete Reference correctly routed through the network. The Internet Protocol (IP) is an example of a protocol that exists at the network layer. Transport Layer (Layer 4) The transport layer is responsible for repackaging long messages into a series of smaller packages (if necessary), and then sequencing these packages so that they can be reassembled at the receiving end. Layer 4 also is responsible for determining the packet size, based on the amount of data being sent, as well as the network architecture being used (Ethernet, FDDI, and so forth). When the transport layer receives data from the network layer, it makes sure that the frame sequence is in order and that the sequence doesn t have any duplicate or missing frames. Other transport layer responsibilities include error recognition, error recovery, and sending receipt acknowledgements. Session Layer (Layer 5) The session layer is responsible for allowing two remote applications to establish a session between them. This includes setting up, maintaining, and ending such a session, as well as regulating data flow for the sending and receiving sides. The session layer defines the rules associated with any such session, as well as determining and monitoring the service type (best effort, required acknowledgements, handshaking, and so forth). Presentation Layer (Layer 6) The presentation layer receives information from the application layer and provides intermediary services, such as data compression and data encryption. It also handles the translation between different file formats. Application Layer (Layer 7) The highest layer, the application layer, involves the actual applications used across the LAN, which can include systems and database applications. The application layer represents the actual application manipulated by the user. Networking Architectures A variety of LAN and WAN architectures have been developed over the years to transport network data. Some of the common LAN types include Ethernet, token ring, FDDI, and ATM. Some of the popular WAN methods include frame relay, T-1 lines, Integrated Services Digital Network (ISDN), and Digital Subscriber Line (DSL). Each network type has its own advantages and disadvantages; Ethernet, token ring, and ATM are covered in this book, along with managing LAN traffic with switches and bridges, and internetworking these technologies with routers and routing switches.

5 Chapter 1: Networking and the OSI Model 7 Ethernet The Ethernet standard, which is perhaps the most common networking architecture, began to be developed by Xerox in 1973 as a bus topology data-passing system. Later, in 1980, the first version of Ethernet (as we know it today) was released by a partnership of Digital, Intel, and Xerox (DIX), although the current standard wasn t approved until The original Ethernet network consisted of physical segments of 10Base5 coaxial cable fitted with transceiver taps, which provided connectivity to individual stations, as well as to devices such as repeaters, bridges, and routers in a bus-type architecture. Since its conception, Ethernet has evolved from the thick-coax backbone to the chassis-based, stand-alone, hub-and-switch implementations that are commonly used today. Ethernet has also grown from its original 10 Mbps capacity to include 100 Mbps, as well as 1,000 Mbps, with support for both half-duplex communications (in which data is transmitted and received in turn) and full-duplex communications (in which data is received and transmitted simultaneously). Ethernet has also evolved to run over a very wide variety of media types, such as thin-coax, twisted-pair, fiber optics, and microwave. Ethernet supports a theoretical maximum of 1,024 end stations per segment. However, depending on the types of network traffic and their bandwidth requirements, you generally are advised to use a more conservative number. You can manage Ethernet traffic by separating individual segments with devices such as bridges, switches, and routers. AN OVERVIEW OF NETWORKING Token Ring First established in the 1970s, token ring became the network architecture of choice for IBM s Systems Network Architecture (SNA) protocol. As its name implies, token ring is a token-passing, ring-based system in which an individual station must have possession of a MAC frame, called the token, before it can transmit data. Token ring is designed to run at speeds of 4 or 16 Mbps, with full-duplex token ring designed to run at speeds up to 32 Mbps. Token ring is rated to run over a variety of different media types, including shielded twisted-pair (STP), unshielded twisted-pair (UTP), and fiber optics. Token ring supports a maximum of approximately 250 stations per ring, and, as with Ethernet, rings (segments) can be separated by bridges, switches, or routers to manage network traffic more efficiently. Fiber Distributed Data Interface (FDDI) The Fiber Distributed Data Interface is described in the XT39.5 American National Standards Institute (ANSI) specification. Like token ring, FDDI is a ring-based, token-passing system consisting of a dual-ring system in which one ring is primary and the other ring is secondary. Stations in an FDDI network are either single-attached, to the primary or secondary ring only, or dual-attached, to both rings simultaneously.

6 8 Nortel Networks: The Complete Reference In the event of a ring failure, the primary and secondary rings may be wrapped together, ensuring the ring s integrity. FDDI utilizes a token-passing system that is more efficient than token ring and that has greater bandwidth: 100 Mbps compared to token ring s 4, 16, or 32 Mbps. For these reasons, as well as the additional cost associated with it, FDDI is generally considered to be a backbone technology. Despite its name, FDDI is also rated to run over copper (sometimes referred to as CDDI, or FDDI over copper). FDDI rings can be separated by bridges, switches, or routers. Asynchronous Transfer Mode (ATM) ATM is a connection-oriented network architecture, in which point-to-point or point-to-multipoint circuits are built end to end throughout the network to pass data between two end systems. These circuits consist of pairings of virtual paths and virtual circuits that identify data flows uniquely throughout the ATM mesh. Unlike Ethernet, token ring, and FDDI, ATM doesn t use varying sized frames, but instead uses fixed-sized 53-byte cells to transmit data. ATM connections provide a bandwidth of 155 Mbps (OC3), 622 Mbps (OC12), 100 Mbps (TAXI Transparent Asynchronous Transmitter/Receiver Interface), and 45 Mbps (DS3). Other implementations are being developed to provide even greater bandwidth. ATM is rated to run over fiber optics and twisted-pair, and the possibility of wireless ATM is currently being studied. ATM functions in a variety of different ways, including the following: Native ATM Devices utilize ATM addresses to route data throughout the switched network. LAN Emulation (LANE) If ATM is being used in conjunction with legacy LAN technologies, such as Ethernet or token ring, LANE may be used to handle the broadcast and multicast functions, which aren t inherent in ATM. LANE currently doesn t support FDDI networks. Wide Area Inevitably, it becomes necessary to interconnect enterprise LANs at different sites, and a wide array of technologies have been developed over the years to accomplish this. From the enterprise perspective, this typically involves a connection to a public provider that is responsible for carrying the data from a myriad of customers. Passing data from one location to another geographically remote location can be accomplished in a variety of ways: leased T-1 or fractional T-1, T-3, leased 56 Kbps or 128 Kbps lines, frame relay, DSL, ISDN, E-1 (in Europe), and cable modems, to name a few. ATM can also often be found in the carrier class network, and a direct ATM connection can also be utilized as a wide area technology. While T-1 and T-3 connections to the public carrier are still common, they provide somewhat limited bandwidth; for instance, a T-1 connection provides a Mbps

7 Chapter 1: Networking and the OSI Model 9 channel. Given the capabilities of more recent technologies such as ATM and gigabit Ethernet, which are capable of offering up to gigabit rates and beyond as well as the soaring bandwidth demands of web applications such as streaming video, wide area technologies can be expected to remain as dynamic as those in the enterprise arena. Networking Components In keeping with the OSI model, different networking components function at different layers. For instance, repeaters operate at the physical layer (Layer 1) of the OSI model, switches operate at the MAC or bridging layer (Layer 2), and routers operate at the network layer (Layer 3). Some hybrids, such as the routing switch, have the capability of operating at different levels simultaneously. Each networking component has a unique purpose, and each has its own circumstances in which it is best used. In general, devices such as bridges, switches, and routers are used not only for the transport of network data, but also for the organization and management of LAN and WAN traffic. Each technology has a limited bandwidth; thus, in practice, limiting the scope of network traffic is a good idea so that it goes only where it specifically needs to go. This reduces unnecessary overhead and prevents bandwidth from being wasted on data that will never be used. Some of the devices used to manage traffic and limit the scope of network traffic are discussed in the following sections. AN OVERVIEW OF NETWORKING Repeaters A repeater is a Layer 1 device whose only purpose is to revitalize incoming signals and then repeat the signal out one or more ports. Each data impulse can travel only a certain distance before the signal degrades to the point where it can no longer be interpreted at the receiving side; the exact distance depends on the technology being used (Ethernet, token ring, FDDI, and so forth) and the media type over which the signal is traveling (twisted-pair, coaxial cable, fiber optics, and so forth). This distance can be increased, in most cases, by positioning a repeater device to clean up and boost the signal, and then send it off again. The maximum distance that the signal can travel is generally defined by the protocols used by the technology. For instance, an Ethernet impulse must make its round trip (from sender to receiver, and then back to sender) in 51.2 ms. This is the window that the Ethernet specification allots for the sender to determine whether a collision has taken place. A collision requires retransmission of the lost frame, so the sender must be able to determine whether the last frame transmitted was received before it sends the next frame. Initially, repeaters were generally stand-alone devices, used to increase the distance of transmissions over traditional 10Base5 coaxial backbones, connecting them via unpopulated links known as inter-repeater links (IRL). Today, repeater functionality exists in hubs, switches, and other networking devices.

8 10 Nortel Networks: The Complete Reference If a repeater detects 32 consecutive collisions, it partitions the port upon which the collisions were received. This is done to protect the rest of the network from the problems occurring on a single port, because a straight repeater normally forwards all traffic, including collisions. If a port enters a partitioned state, it is separated from the rest of the network, and no signal will pass through it. Each time a transmission is destined for the partitioned port, the repeater attempts to send; if a collision occurs on that port, the port remains in a partitioned state. If the transmission is successful, the port automatically unpartitions and rejoins the network. The following are the two basic repeater types: Class I repeaters Incur a 168-bit time delay between the input and output ports; generally used when varying physical types are being used, such as 10BaseT in combination with 100BaseT or 100BaseFL. Class II repeaters Incur a 92-bit time delay (maximum) between the input and output ports; generally used when a single physical type is used. Bridges Bridges provide a way to expand a LAN beyond the scope of its local limitations. For instance, a token ring may support a maximum of 250 stations. A bridge placed between two such rings enables the maximum number of stations in the network to be doubled to 500 stations, while still allowing communication between the two rings. Likewise, in an Ethernet network, bridges can be used to establish intercommunication between separate segments. For example, 200 users on a single segment works much less efficiently than four segments of 50 users each, interconnected by Ethernet bridges. The specifics of how bridges make their forwarding or filtering decisions, as well as the specifics of the Spanning Tree Protocol (STP) used to prevent network loops in bridged networks, are covered in Chapter 2 for Ethernet and in Chapter 23 for token ring. Store-and-Forward Bridges Store-and-forward bridges receive and store the entire packet before forwarding, if the packet is to be forwarded. After the store-and-forward bridge receives a packet in its entirety, it checks the frame for errors before sending it out to the appropriate interface. Consequently, by examining each packet, store-and-forward bridges add an increased propagation delay, but they prevent the possible propagation of errors and corrupted frames. Cut-Through Bridges Cut-through bridges forward frames the instant that the filter or forward decision can be made. If the proper entries already exist in the bridge s forwarding table, a cut-through bridge begins forwarding the frame as soon as the destination address is known, without performing any error checking. Cut-through bridges are faster for this reason, but they don t prevent the propagation of potentially corrupt frames.

9 Chapter 1: Networking and the OSI Model 11 Translational Bridges Translational bridges can be used to interconnect LANs of different types, such as Ethernet and token ring. Translational bridges perform frame conversion between the different LAN types, and make filter or forwarding decisions for bridges, performing these actions in such a way that the bridging functions and the translations are invisible to the end stations on either LAN. Switches In concept, switches are very similar to bridges; each uses a forwarding table of MAC addresses to determine where each address is located and, based on that information, whether incoming frames should be filtered or forwarded. Switches can be regarded in many ways as multiport bridges, although they are often now positioned more as a concentrator would be. Switches employ the same filter-or-forward method as bridges do, on a port-by-port basis. Although a switch port usually is similar in appearance to a shared-media hub or concentrator, each switch port acts as a bridge port, and collisions aren t propagated beyond the local bridged port. This places each individual port in its own collision domain, whereas the switch as a whole remains in a single broadcast domain (provided virtual LANs, or VLANs, aren t being used). Each switch port also participates in the Spanning Tree Protocol (if enabled), which means that redundant connections may exist between switches. Switches have traditionally been positioned as core devices, hosting a series of separate hubs (segments). However, as the per-port cost of switches continually declines, switches more commonly are being used to host individual users, replacing shared-media hubs altogether. Virtual LANs (VLANs) Another innovation of switching technology is the concept of the virtual LAN. VLANs provide a way of logically, rather than physically, separating groups of users in a common network, and they can be user-configured to allow a single physical switch to be divided into several logical broadcast domains. As with any separate broadcast domains, communicating from one VLAN to another requires the use of a router. VLANs have become very common since their inception some years ago; they provide a very valuable function in the network, since keeping broadcast domains reasonably small cuts down on overhead and increases performance without having to necessarily purchase additional equipment. In conjunction with multicast protocols, such as DVMRP (Distance Vector Multicast Routing Protocol) and IGMP (Internet Group Management Protocol), VLANs can help keep departments traffic isolated to only those who need to see it, and increase network efficiency considerably. VLANs have gone through different iterations, particularly in the early days of the technology when no standard had yet been arrived at. Typically, these early VLANs were port based, and they used proprietary protocols (such as Nortel Networks AN OVERVIEW OF NETWORKING

10 12 Nortel Networks: The Complete Reference LattisSpan technology). VLANs have now been standardized under the 802.1Q VLAN standard, and use a method known as frame tagging. More information on VLANs can be found in Chapter 9. Routers Routers operate at the network layer (Layer 3) of the OSI model. Routers are much more complex than bridges or switches and are used to separate broadcast domains within the network. In a traditional bridged or switched network, broadcasts are propagated out all ports; this is the method used initially to discover unknown destination address locations and to ensure that broadcast traffic is received by all stations in the broadcast domain. Broadcasts are not propagated by routers. A multiport router, upon receiving an Address Resolution Protocol (ARP) broadcast, for example, won t flood the packet. Instead, the multiport router first uses the Layer 3 protocol information (IP, in this case) to determine with which network the destination is associated, and then it initiates its own ARP broadcast if the destination network is associated with one of its local interfaces, or it forwards the packet to the next hop on the way to the destination network. This cuts down tremendously on the amount of broadcast traffic in the network as a whole and directs broadcasts only where they need to go (and no further). Routers support a variety of Layer 3 protocols, such as IP, Internetwork Packet Exchange (IPX), DECnet, and AppleTalk, and they provide a way to organize LAN traffic at the network layer. Routers also utilize their own Layer 3 routing protocols to communicate network information to one another, ensuring that data arrives at its proper destination in the most efficient manner. Such routing protocols include Open Shortest Path First (OSPF), the Routing Information Protocol (RIP), and RIPv2, which are covered in Chapters 32 and 33. Routers can also facilitate the translation between dissimilar network architectures, such as Ethernet, token ring, FDDI, and ATM. This translation can occur at the network layer or, if bridging services are supported on the router, at the data-link layer. Protocol-Based Traffic Management Different protocols operate in different ways, but each provides a logical addressing system that maps to the hardware address at the MAC layer. This allows packets to be routed through the network according to the logical addressing scheme, which, in turn, allows packets to be routed over greater distances while minimizing the amount of broadcast traffic within each domain. Wide Area Routing Routers are generally used for wide area connections, too. However, because wide area bandwidth is usually limited, only traffic that is destined for the remote network should be sent across the connection, which means that broadcast traffic associated with each domain should be excluded. There are a variety of wide area connections,

11 Chapter 1: Networking and the OSI Model 13 including point-to-point connections over T-1 lines or other leased lines such as 56 Kbps or 128 Kbps lines, frame relay connections, and ISDN. Layer 3 Switching Layer 3 switches, sometimes referred to as routing switches, are a relatively recent development in networking technology. As the name implies, the Layer 3 switch is a hybrid device, combining the functionality of a router and a Layer 2 switch. The Passport 1000 and 8000 series are examples of routing switches. The idea behind Layer 3 switching is to make the device Layer 3 protocol aware and capable of steering traffic correctly based on Layer 3 information, but to prevent it from actually going into the third layer of the packet, thus avoiding the overhead associated with true routing. The Passport product line also supports true routing and port-based VLANs. Layer 3 switches generally use the 802.1Q frame-tagging specification. Port-Based VLANs Layer 3 protocols can be kept separate by issuing them into port-based VLANs. A port-based VLAN is not protocol aware; but different protocols, or even different IP subnets, can be segmented into these separate broadcast domains, while a router may be used to route between them. By using frame tagging, the traffic can be kept separated, even when it is passed from switch to switch based on its tag, so that it can be distributed to the proper VLAN at the receiving switch. For example, this allows users on IP subnet in VLAN 1 to communicate with other users on the same subnet as long as they are also in VLAN 1, even though they may be on different switches. Protocol-Based VLANs Protocol-based VLANs use Layer 3 information to route packets through the switched network. By examining the Protocol ID in each frame, the VLAN can determine which protocol the frame uses and, based on this Layer 3 information, perform frame distribution at Layer 2 of the OSI model. For example, a Layer 3 switch configured with an IP VLAN, an IPX VLAN, and an AppleTalk VLAN could be configured with a port that is a member of all three VLANs. If a segment containing groups of users (each of which utilizes one of these three protocols) is connected to this port, then incoming traffic on this port will be distributed to the appropriate VLAN based on Protocol ID. Layer 3 Switching by IP Subnet The Passport routing switch functionality enables traffic to be distributed both by IP Protocol ID (0800) and, after the protocol is identified as IP, by subnet. This allows incoming traffic to be distributed not only into different VLANs based on their different protocol types, but also within the IP protocol based on an even more specific designation. AN OVERVIEW OF NETWORKING

12 14 Nortel Networks: The Complete Reference For example, IP subnet can be distributed into VLAN 1, and IP subnet can be distributed into VLAN 2, without the use of a router to make that decision. The specifics of this function are covered in Chapter 7. Virtual Router Services The Passport product line also includes traditional routing services in the form of an internal virtual routing entity, capable of routing between VLANs, isolated routing ports, and any combination of the two. This entity supports protocol distribution at the second layer, for traffic management between switches, combined with true Layer 3 routing.

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Cabling LANs and WANs

Cabling LANs and WANs Cabling LANs and WANs CCNA 1 v3 Module 5 10/11/2005 NESCOT CATC 1 Cabling the LAN Each media has advantages and disadvantages: Cable length Cost Ease of installation Susceptibility to interference The

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

Network Topologies. Network Topologies

Network Topologies. Network Topologies Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

CORPORATE NETWORKING

CORPORATE NETWORKING CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Typical example of Ethernet local networks Mostly based

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1 Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

Introduction To Computer Networks

Introduction To Computer Networks Introduction To Computer Networks 1. LAN s and WAN s 2. Some network and internetwork components 3. The communication process 4. Communication media 5. Topologies 6. Communication models and Standards

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

Cisco Network Performance Evaluation Using Packet Tracer

Cisco Network Performance Evaluation Using Packet Tracer Cisco Network Performance Evaluation Using Packet Tracer doi: 10.17932/ IAU.IJEMME.m.21460604.2015.5/1.905-911 Muhammet Emin KAMİLOĞLU 1 Abstract In this study, a wide area network designed and simulated.

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1 Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Data Communication Networks

Data Communication Networks Data Communication Networks Data communication networks typically do not send real time data As a result, packet switching is often used OPTI 500, Spring 2011, Lecture 6, Data Networks 1 Packet Switching

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP

AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP Mst. Najnin Sultana, Abu Jafar Md. Masud Karim Daffodil International University, Dhaka, Bangladesh E-mail: apesnajnin@yahoo.com

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

John Ragan Director of Product Management. Billy Wise Communications Specialist

John Ragan Director of Product Management. Billy Wise Communications Specialist John Ragan Director of Product Management Billy Wise Communications Specialist Current Substation Communications Physical Infrastructure Twisted Pair, 4 Wire, COAX, Cat5 & Cat6, 9 Pin Serial Cable, Single-mode

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Data Communication Networks and Converged Networks

Data Communication Networks and Converged Networks Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET

INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET 51-20-97 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET Colin Mick INSIDE How It Works: An Iso View, 100BASE-TX, 100BASE-T4, 100BASE-T2, Gigabit Ethernet, Impacts

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain

Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/

More information

LAN / WAN Technologies

LAN / WAN Technologies The Hong Kong Polytechnic University Industrial Centre Knowledge Update Course for Secondary Computer Teachers LAN / WAN Technologies By Edward Cheung email: icec@polyu.edu.hk 15 July, 2003. 030715 LAN

More information

RFC 2544 Testing of Ethernet Services in Telecom Networks

RFC 2544 Testing of Ethernet Services in Telecom Networks RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in

More information

The OSI Model and the TCP/IP Protocol Suite

The OSI Model and the TCP/IP Protocol Suite The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Layer 3 Routing User s Manual

Layer 3 Routing User s Manual User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

OSI Reference Model: An Overview

OSI Reference Model: An Overview OSI Reference Model: An Overview Gaurav Bora 1, Saurabh Bora 2, Shivendra Singh 3, Sheikh Mohamad Arsalan 4 ( 1 Department of Electronics, Uttarakhand Technical University, Dehradun, INDIA) ( 2 Department

More information

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer Data Link Layer Physical

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Chapter 2 TCP/IP Networking Basics

Chapter 2 TCP/IP Networking Basics Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information