LAN Analysis: Cable Testing and Protocol Decoding Amitava Dutta-Roy
|
|
- Shon Harris
- 8 years ago
- Views:
Transcription
1 LAN Analysis: Cable Testing and Protocol Decoding Amitava Dutta-Roy Payoff Smooth operation of LANs is critical to a company's productivity and profitability. LANs do, however, sometimes crash. More often than not cables are at fault, although problems may occur at higher layers as well. This article examines two tools used in LAN troubleshooting: cable testers and protocol decoders. Introduction Local area networks are an integral part of most corporate information systems infrastructures. By allowing many users to share information, LANs increase productivity while reducing the cost of data base maintenance at multiple sites. But this increase in productivity is somehow inversely proportional to the response time of the network. If the response from a LAN server is more than a few seconds, users tend to get frustrated or distracted and productivity drops. If for some reason the LAN crashes, workers who depend on a LAN are forced to stop working. Various industry reports have cited case studies of LAN downtimes and emphasized the importance of monitoring LANs for healthy performance. LAN analyzers - cable testers and protocol decoders -help systems administrators keep networks running smoothly. Furthermore, analyzers may be used to evaluate the performance of a LAN before installation, under simulated stress conditions. The results of such an evaluation can indicate limits of the various LAN components and may even suggest a different configuration or selection of more robust components. Cable Testers Cable testers are hand-held devices for examining cables that physically connect the different components of a LAN. Although LAN users and administrators blame the server or the communications hardware and software for network downtime, many network integrators and consultants have found that approximately 65% of LAN downtimes are caused by cable failures. Most LAN components now commercially available are of reasonably good quality. The only exception to this appears to be the cabling. Cables usually connect equipment over long distances. LAN performance can be jeopardized by an invisible break in the cable along its path, an inadvertently coiled cable, a bad contact at either end, a cable thrown out of alignment, incorrect pin connections, electromagnetic interference, or simply a cable of inferior quality. Every cable should be checked before a network is switched on and after a network crash. How to Select a Cable Tester There are several vendors of cable testers in the market. A good cable tester should be able to perform tests on a variety of cables such as Unshielded Twisted-pair, Shielded Twistedpair, and coaxial cables, in combination with the standard connectors for both Ethernet and token-ring networks. Some quality cable testers include Pair Scanner, Cable Scanner, Quick Scanner, and LANMETER. List prices vary between $1,000 and $9,000, depending
2 on the variety of features offered and their sophistication. Therefore, an organization's needs should be carefully evaluated before a cable tester is selected. It is practically impossible to develop a cut-and-dried plan for the acquisition of such equipment. Price and utility should be considered, as well as the needs of each environment. Factors to consider in general include: How complex is the corporate network? Who will install the network? An outside systems integrator or in-house personnel? How critical is LAN downtime to the company s operations? Are there any maintenance contracts with outside firms? Does the company have technical personnel to undertake the testing, interpret the test results, and make necessary corrections? Tests Performed Fully featured cable testers should be able to perform most or all of the following tests. Open and Short-Circuit Tests This test uses the principles of Time Domain Reflectometry. A short electrical pulse is transmitted from one end of the cable and reflected back from the other end. If the far end is open, the excursions of the transmitted and reflected pulses have the same sense. If the far end is shorted, however, the sense of excursion of the reflected pulse is inverted (see Exhibits 1 and 2). Some cable testers show the directions of the excursions and travel time of the pulses in an oscilloscope-like display. Others may show it in an alphanumeric display (see Exhibit 3). Both types of displays, however, use the same basic time domain reflectometry (TDR) principle. TDR Oscilloscope Displays Cable Fault Location Using TDR(Length vs. Scan) Typical LANMETER Display DC Resistance Measurement This test gives a reading of the direct current (DC) resistance connected to the far end of the cable. These measurements, coupled with open and short-circuit tests, indicate if the cable is connected properly. Nominal Velocity of Propagation (NVP) Electrical signals traveling along a metal cable have a finite velocity of propagation that varies between 60% and 90% of the speed of light. The best cable manufacturers try to
3
4
5
6 keep this velocity constant over a band of frequencies at which the LANs are expected to operate. Otherwise the signals become distorted, which can cause errors in the detection of the ones and zeros of a data stream. The Nominal Velocity of Propagation is measured by taking a sample of the cable used in the network installation and injecting a short pulse into one end. The other end could be left open or short-circuited. The cable tester measures the time it takes the pulse to travel up and down the sample cable. The recorded time gives a fairly accurate indication of the nominal velocity at the frequency of operation. Most cable testers have this capability. Once the Nominal Velocity of Propagation is determined, it can be retained in the memory of the equipment and used for further tests. Linear Distance Between the Point of Test and the Far End Given the nominal velocity of propagation, a cable tester should be able to calculate the linear distance between the point of measurement and the far end of a cable. Wire Map This feature checks all of the conductors in Unshielded Twisted-pair cable cabling. A message flashes if any of them is poorly connected at either end. Cable Grading Most cable testers can verify the grade of the cable and if it meets the standards requirements. Crosstalk Crosstalk is defined as the electrical noise in a wire spuriously generated by a signal in an adjacent wire; it is caused by electrical coupling between the two in a multiwire cable. When the crosstalk is measured near the point where the signals are generated, it is known as the Near-end crosstalk. If the Near-End crosswalk coupling is high, it signifies that the signals arriving from the far end will be drowned by the near-end interference. A cable tester should be able to measure the NEXT and flash a signal to the operator when this figure is not acceptable. The cause may be a cable of inferior quality or a nearby strong source of electromagnetic radiation. Most of the parameters just mentioned are specified in the IEEE 802 series standards and by the vendors of cables or system integrators. Any significant deviation from the norm is a harbinger of potential problems. Cable testers offer a fairly straightforward method of detecting problems, especially after any physical relocation of workstations or servers. Protocol Decoders Cable testers from most vendors examine only cables. The principal purpose of using a protocol decoder for troubleshooting in a LAN is to examine the inner workings of the LAN components, which operate in layers 1 through 7 of the Open Systems Interconnection (OSI) model. Exhibits 4, 5 and 6 show sample results from obtained from a protocol decoder.
7
8
9
10 Fluke LANMETER Softkeys for Ethernet and Token Ring Ethernet Error Statistics Sample Results Token-Ring Expert-T Autotest Sample Results To perform such a task, a decoder needs to strip open the data frames going back and forth between the various components (e.g., a PC and the server or a bridge) and determine, for example, the protocol type (e.g., TCP/IP, Internetwork Packet exchange, or others) used for communications, the size of the frames, their origins and destinations, and the routes they follow in moving data from one point to another, for both hardware and software. Most decoders can store accurate logs of these parameters and network-related events over a period of time and for printout later. Careful examination of such a log helps detect faulty components or misguided operations. A protocol decoder thus complements the cable testers in a complete analysis of a network. Protocol Decoder Classifications Protocol decoders may be classified into three groups Software-based Protocol Decoders Several vendors, including Digilog Corp. (LANVista), File Transfer Protocol Software(LanWatch), and Triticom (LANdecoder/tr), have developed such software. These software packages are priced between $1,200 and$1,800. They run on PCs. No special attachments are necessary, other than the network interface card. For medium-size networks, the software-based protocol decoder offers many features. Monitor displays are relatively easy to interpret (see Exhibit 7). Monitor Displays Using Triticom's LANdecoder Integrated Protocol Decoders This type of protocol decoder is essentially a special-purpose PC with both hardware and software integrated in one package. Some can be folded like a briefcase and are convenient to carry from one location to another. Vendors of protocol decoders in this medium-priced category include Network General Corp. (Sniffer and Expert Sniffer), Novell Inc. (LanAnalyzer), and Hewlett-Packard (LAN Advisor), among others. Many reputable manufacturers have integrated decoding capabilities in their hubs. Suggested prices of the standalone decoders with attachments vary between $15,000 and $25,000. High-End Protocol Decoders There are several vendors of high-end decoders in the marketplace. Because they offer much more than the medium-price analyzers, their prices are higher. Some of the products are: Dataglance (IBM Corp.),Protocol Tester (Siemens Industrial Automation Inc.), Chameleon(Tekelec Inc.), and DA-30 Protocol Decoder (Wandel & Goltermann
11
12 Technologies Inc.). These decoders are suitable for high-volume network integrators and benchmarking laboratories. Features of a Protocol Decoder The large variation in the prices of protocol decoders suggests that the range of features offered also varies greatly. It takes time and practice for a technical support person to become proficient in both selecting and using protocol decoders and in interpreting their displays. Some of the most common features to consider are described next. Use in Both Ethernet and Token-Ring Networks If a firm owns a mixture of Ethernet and token-ring networks, it is essential that the protocol decoder works with both. Some decoders will work only with one type, mainly Ethernet. There is also the question of accurate measurements to consider. It is more difficult to work with token-ring LANs, both 4M b/s and 16M b/s. Some industry reviews also claim that decoder results are less accurate for token-ring networks. Before the network administrator decides to purchase a decoder, these points should be thoroughly investigated with the vendor. Identification of Type of Protocol Protocol decoders can detect most of the protocols used in LANs(e.g., IPX and TCP/IP). Before acquiring a protocol decoder, the administrator must ensure that it detects the protocol being used on the network. Measurement of Network Utilization In an Ethernet or IEEE network, if a node tries to access the LAN when there are frames already present on the wires nearest to the node (carrier sense), the transmission from this node is deferred for a randomly determined interval before another attempt of transmission is made. It is also possible that one node unknowingly transmits a frame before the signal from an earlier transmission arrives at that point. Obviously, these two frames will collide somewhere along the wire and a collision signal is generated. Immediately the transmissions are halted for a random interval of time. As the number of users increases, so does the number of collisions, because in a Carrier Sense Multiple Access/Collision Detection (carrier sense multiple access/collision detection) network, all users have an equal right of access. A large number of collisions leads to frequent deferment of transmissions, which eventually slows down the network. In other words, as the utilization of the network increases, the response time gets worse. A protocol decoder can measure the utilization and express it in terms of percentage of maximum theoretical utilization of the bandwidth. The utilization figures may be plotted against time in the form of line plot, a bar chart, or even displayed in a fashion resembling an automobile speedometer. From these charts, a network administrator is able to learn the peak periods of network utilization. Usually these peaks occur in the morning when most users in an office try to log in and get their working files from the server. Another peak period might be in the evening when backups are executed. One way to avoid peak loads would be to stagger the Login or backup processes. Under normal circumstances, a utilization of 20% to 25% of the theoretical maximum is considered acceptable. A protocol decoder is also able to count the number of collisions
13 occurring during a specified period. This data helps a network administrator systematically isolate a problem. Exhibits 8, 9, and 10 show sample displays. LANanalyzer Network Dashboard Display Sample of Network Performance Analysis Using LANanalyzer Sample of Decoding and Analysis Using LANanalyzer Measurement of Token Rotation Time In token-ring LANs, the frames move from node to node as they are read and then accepted by the right destination station or thrown back on the wire. Each of these operations takes a finite length of time. Thus, when the number of stations is large (the maximum is 255 per network) and the sizes of the frames are also large, the time for the frames to come around to the original source station, known as the token rotation time, also increases. Consequently, there may be severe delays in the response time. A protocol decoder can measure and display this token rotation time. Measurement of Packet Size It is important for a network administrator to know the frame sizes traveling on the network. Long frames indicate a faulty component. It is necessary to locate the source of long frames using a systematic probe with the protocol decoder. For Ethernet networks, a large number of runt frames (i.e., remnants of collisions and short in length)indicates a faulty component. Probing the network with a protocol decoder can help determine the cause of the runt frames. Detection of Broadcast Storms Broadcast storms are generally caused by faulty network interface cards on Ethernet networks. A broadcast storm takes up practically the whole bandwidth available on a network. A scrutiny of all transmitted frames can easily reveal the source of a broadcast storm. Setting of Filters and Alarms Filters may be placed in protocol decoders to filter all traffic on the network for the detection of a specified occurrence. An alarm could be set to go off if such an event occurs. For example, an alarm may go off if the network utilization exceeds 25%. Logging of Access Nodes to the Servers A protocol decoder can identify and log the nodes attempting to access a certain file in a particular server, and can also identify the source of the request, the time of the access, and the number of bytes read. In short, the whole history of the network during a specific interval of time may be compiled and stored for later examination.
14
15
16
17 Detection of Data Paths through Hubs, Bridges, and Routers. Hubs and bridges are excellent points at which to connect the protocol decoders to the network, since all traffic passes through those points. Most protocol decoders identify the sources of frames, frame numbers, and the routes they follow. This information can assist in detection of a poor configuration. Detection of Beaconing Signals In token-ring networks, a beacon signal signifies a faulty node. A protocol decoder should be able to identify the faulty node and the time at which the node is first detected as faulty. Promiscuous Mode of Operation Decoders operate in a promiscuous mode, which means that they can listen to every frame going past them in a network. Use of this feature, however, calls for caution, because the frame may containsensitive information that should not fall into the hands of the operator of the equipment. For token-ring networks, a decoder should work without being attached like a legal node on the network. Local Decoding and Distributed Decoding Some decoders, though they work well for the purposes of local decoding, may not be able to do any decoding of an enterprisewide distributed network. However, a few of these tools are designed for the specific purpose of examining devices that are physically distant. Examples include Expert Sniffer (Network General Corp.) and Network Advisor (Hewlett-Packard). Proactive and Reactive Analysis Proactive analysis of a LAN helps to check a network's optimal configuration and possibly determine whether the LAN should be segmented into two or more subnetworks so that all workers on a LAN get a fair share of the resources within a reasonable response time. Most protocol decoders can generate frames for checking a network under stress. In complex cases, however, it is best to use commercially available frame generators for proactive analysis. Routine stress analysis can, among other things, indicate failure before it occurs. For example, a buffer may not be adequate for a server under a heavy load. In this case a stress test will reveal this weakness and measures may be taken to prevent a real failure. Data from a proactive analysis can also be fed into some commercially available LAN simulation programs. These procedures are useful to visualize the simulated performance of an extended LAN even before purchasing additional equipment for this extension. Reactive analysis, as the name suggests, is used for detection of faults on a network after a crash. Difference Between a Protocol Decoder and an SNMP-based Management Tool The difference between a good protocol decoder and a Simple Network Management Protocol system is fuzzy. These management tools are often embedded in a hub and can get and set desired parameters in remote components such as workstations, hubs, bridges, routers, and even uninterrupted power supplies (UPS) in an enterprisewide network.
18 Operation of these management tools is based on Remote MONitoring protocols. These tools depend on agents and superagents residing on the equipment. The agents gather the data, send it to the central monitoring station, and if necessary, set alarms or new values on the parameters. It should be emphasized, however, that neither a protocol decoder nor a more elaborate and sophisticated simple network management protocol (SNMP)-based management tool is a substitute for the other. The two have distinctly different uses in the smooth operation of a LAN. Conclusion To avoid costly LAN downtime, systems administrators should select and use troubleshooting tools that are appropriate for their networks. Using cable testers to eliminate the most common cause of LAN downtimes and protocol decoders to monitor the inner workings of LANs, a network administrator can greatly improve the performance record of the company LAN. Author Biographies Amitava Dutta-Roy Amitava Dutta-Roy is a principal for Optimarc in New York NY and a regular contributor to several international technical journals. He earned B.Sc. and Ph.D. degrees in electronic engineering from Imperial College, University of London. He has taught at Queen's University of Belfast, Northern Ireland, University of Sao Paolo, Brazil, and the Brazilian Institute for Space Research. He has served as a UN consultant in Central America on applications of science and technology for development and was recently elected as an IEEE Fellow.
Network Troubleshooting with the LinkView Classic Network Analyzer
November 2, 1999 www.wwgsolutions.com Network Troubleshooting with the LinkView Classic Network Analyzer Network Troubleshooting Today The goal of successful network troubleshooting is to eliminate network
More information52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller
52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationNetwork Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More information52-20-16 Using RMON to Manage Remote Networks Gilbert Held
52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management
More informationNETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
More informationNetworks. The two main network types are: Peer networks
Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationChapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationRegion 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationControlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation
More informationHow To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationToken-ring local area network management
Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area
More informationFSW-0505TX/0805TX 5/8 Port SOHO 10/100Mbps NWay Switch FSW-0505TX FSW-0805TX. 5/8 Port SOHO 10/100Mbps NWay Switch. User s Manual. (Revision 1.
FSW-0505TX FSW-0805TX 5/8 Port SOHO 10/100Mbps NWay Switch User s Manual (Revision 1.0) FCC Class A Appliance This equipment generates and uses radio frequency energy. If it is not installed and used
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationChapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
More informationLevel 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
More informationWireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
More informationLesson 5-2: Network Maintenance and Management
Unit 5: Network Operating Systems Lesson 5-2: Network Maintenance and Management At a Glance This lesson presents an overview of network planning and management tasks. It also discusses hardware and software
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationNZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks
Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationZarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
More informationSecurity+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
More informationNETWORK BASELINING AS A PLANNING TOOL
50-40-02 DATA COMMUNICATIONS MANAGEMENT NETWORK BASELINING AS A PLANNING TOOL Gilbert Held INSIDE Baselining Tools and Techniques, SimpleView, NEWT, EtherVision, Foundation Manager INTRODUCTION Baselining
More informationConfiguring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
More informationIntrusion Detection, Packet Sniffing
Intrusion Detection, Packet Sniffing By : Eng. Ayman Amaireh Supervisor :Dr.: Lo'ai Tawalbeh New York Institute of Technology (NYIT)- Jordan s s campus-2006 12/2/2006 eng Ayman 1 What is a "packet sniffer"?
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More information51-30-10 Selecting a Firewall Gilbert Held
51-30-10 Selecting a Firewall Gilbert Held Payoff Although a company may reap significant benefits from connecting to a public network such as the Internet, doing so can sometimes compromise the security
More informationThe ABCs of Spanning Tree Protocol
The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,
More informationMathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
More informationComputer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationLocal Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral
More informationDomain 5.0: Network Tools
ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 5.0: Network Tools Chapter 5 5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality
More informationIntroduction to Computer
PDHonline Course E175 (8 PDH) Introduction to Computer Instructor: Dale W. Callahan, Ph.D., P.E. and Lea B. Callahan, P.E. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationTen top problems network techs encounter
Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,
More informationChapter 2 TCP/IP Networking Basics
Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)
More informationFiber Distributed Data Interface
CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI
More information51-30-21 Selecting a Web Server Connection Rate Gilbert Held
51-30-21 Selecting a Web Server Connection Rate Gilbert Held Payoff Determining the best operating rate for a WAN connection to the Internet is a common problem for organizations wishing to obtain a presence
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationNexus Technology Review -- Exhibit A
Nexus Technology Review -- Exhibit A Background A. Types of DSL Lines DSL comes in many flavors: ADSL, ADSL2, ADSL2+, VDSL and VDSL2. Each DSL variant respectively operates up a higher frequency level.
More informationChapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test:
1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of
More informationIP Office Technical Tip
IP Office Technical Tip Tip no: 195 Release Date: October 26, 2007 Region: GLOBAL Using Packet Capture Software To Verify IP Network VoIP Quality Of Service (QoS) Operation Converged networks can experience
More informationNetwork Design and Management
Fundamentals of Networking and Data Communications, Sixth Edition 13-1 Network Design and Management Chapter 13 Learning Objectives After reading this chapter, students should be able to: Recognize the
More informationPage 1 of 7. Computer Networking
Page 1 of 7 Computer Networking 7.1 What Is Computer Networking? A computer network consists of several computers that are connected to one another using devices that allow them to communicate. Computer
More informationThe Impact of QoS Changes towards Network Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact
More informationLAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationBroadband 101: Installation and Testing
Broadband 101: Installation and Testing Fanny Mlinarsky Introduction Today the Internet is an information superhighway with bottlenecks at every exit. These congested exits call for the deployment of broadband
More informationImplementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
More informationGigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet
Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for
More informationTechnology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Tenth Edition. Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Tenth Edition Technology in Action Chapter 10 Behind the Scenes: Networking and Security in the Business World 2 Chapter Topics Client/Server
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationUnit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationNetwork Topologies. Network Topologies
Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical
More informationNetwork Design and Management
Network Design and Management Chapter 13 Learning Objectives After reading this chapter, you should be able to: Recognize the systems development life cycle and define each of its phases Explain the importance
More informationCisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
More informationAgilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402
Agilent Technologies Performing Pre-VoIP Network Assessments Application Note 1402 Issues with VoIP Network Performance Voice is more than just an IP network application. It is a fundamental business and
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationLayer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
More informationLecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN
Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan
More informationHow to Choose the Right Cable Category
How to Choose the Right Cable Category Why do I need a different category of cable? Not too long ago, when local area networks were being designed, each work area outlet typically consisted of one Category
More information51-10-50 Circuit-Switched Router Connections Nathan J. Muller
Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible
More informationPROACTIVE PERFORMANCE MANAGEMENT
51-11-99 DATA COMMUNICATIONS MANAGEMENT PROACTIVE PERFORMANCE MANAGEMENT Tim Clark INSIDE The Current State of Performance Management; Proactive Performance Management; Developing a Baseline; Online Utilization
More informationArchitecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern
More informationIntroduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
More informationRedundant Serial-to-Ethernet Data Connections for Mission-critical Devices
Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since
More informationUnderstand VLANs, Wired LANs, and Wireless LANs
LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)
More informationAccess Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
More informationHow To Manage A Network
Network Management Keeping the Network Alive from Afar Network management is the process of documenting, monitoring, troubleshooting, and configuring network devices. Network management gives visibility
More informationTutorial. www.ccontrols.com
Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationCUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
More informationAppendix B Network, Routing, Firewall, and Basics
Appendix B Network, Routing, Firewall, and Basics This chapter provides an overview of IP networks, routing, and networking. Related Publications As you read this document, you may be directed to various
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More informationDiagnosing the cause of poor application performance
Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.
More informationCCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
More informationTCP/IP SUPPLEMENT SCALE NETWORKING
TCP/IP SUPPLEMENT SCALE NETWORKING 701 S. RIDGE AVENUE TROY, OHIO 45374-0001 FORM 34001 (5-98) Table of Contents Understanding TCP/IP Communications Protocol...3 Understanding the IP Address... 3 Setting
More informationNetwork performance and capacity planning: Techniques for an e-business world
IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,
More informationThe WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
More informationOptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationET225 Networking Concepts. Chapter 1 What is a Computer Network?
ET225 Networking Concepts Chapter 1 What is a Computer Network? Objectives Identify the advantages of connecting computers and devices on a network. Recognize common network components in a lab setting.
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationLAN Performance Measurements Lab
LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for
More informationChapter Thirteen. Network Design and Management. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Thirteen Network Design and Management Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Recognize the systems
More informationIntraVUE Diagnostics. Device Failure
IntraVUE provides a method to record and capture the issues that occur in the Ethernet networks being used for automation applications. Automation networks are susceptible to subtle disturbances due to
More information