LAN Analysis: Cable Testing and Protocol Decoding Amitava Dutta-Roy

Size: px
Start display at page:

Download "51-20-53 LAN Analysis: Cable Testing and Protocol Decoding Amitava Dutta-Roy"

Transcription

1 LAN Analysis: Cable Testing and Protocol Decoding Amitava Dutta-Roy Payoff Smooth operation of LANs is critical to a company's productivity and profitability. LANs do, however, sometimes crash. More often than not cables are at fault, although problems may occur at higher layers as well. This article examines two tools used in LAN troubleshooting: cable testers and protocol decoders. Introduction Local area networks are an integral part of most corporate information systems infrastructures. By allowing many users to share information, LANs increase productivity while reducing the cost of data base maintenance at multiple sites. But this increase in productivity is somehow inversely proportional to the response time of the network. If the response from a LAN server is more than a few seconds, users tend to get frustrated or distracted and productivity drops. If for some reason the LAN crashes, workers who depend on a LAN are forced to stop working. Various industry reports have cited case studies of LAN downtimes and emphasized the importance of monitoring LANs for healthy performance. LAN analyzers - cable testers and protocol decoders -help systems administrators keep networks running smoothly. Furthermore, analyzers may be used to evaluate the performance of a LAN before installation, under simulated stress conditions. The results of such an evaluation can indicate limits of the various LAN components and may even suggest a different configuration or selection of more robust components. Cable Testers Cable testers are hand-held devices for examining cables that physically connect the different components of a LAN. Although LAN users and administrators blame the server or the communications hardware and software for network downtime, many network integrators and consultants have found that approximately 65% of LAN downtimes are caused by cable failures. Most LAN components now commercially available are of reasonably good quality. The only exception to this appears to be the cabling. Cables usually connect equipment over long distances. LAN performance can be jeopardized by an invisible break in the cable along its path, an inadvertently coiled cable, a bad contact at either end, a cable thrown out of alignment, incorrect pin connections, electromagnetic interference, or simply a cable of inferior quality. Every cable should be checked before a network is switched on and after a network crash. How to Select a Cable Tester There are several vendors of cable testers in the market. A good cable tester should be able to perform tests on a variety of cables such as Unshielded Twisted-pair, Shielded Twistedpair, and coaxial cables, in combination with the standard connectors for both Ethernet and token-ring networks. Some quality cable testers include Pair Scanner, Cable Scanner, Quick Scanner, and LANMETER. List prices vary between $1,000 and $9,000, depending

2 on the variety of features offered and their sophistication. Therefore, an organization's needs should be carefully evaluated before a cable tester is selected. It is practically impossible to develop a cut-and-dried plan for the acquisition of such equipment. Price and utility should be considered, as well as the needs of each environment. Factors to consider in general include: How complex is the corporate network? Who will install the network? An outside systems integrator or in-house personnel? How critical is LAN downtime to the company s operations? Are there any maintenance contracts with outside firms? Does the company have technical personnel to undertake the testing, interpret the test results, and make necessary corrections? Tests Performed Fully featured cable testers should be able to perform most or all of the following tests. Open and Short-Circuit Tests This test uses the principles of Time Domain Reflectometry. A short electrical pulse is transmitted from one end of the cable and reflected back from the other end. If the far end is open, the excursions of the transmitted and reflected pulses have the same sense. If the far end is shorted, however, the sense of excursion of the reflected pulse is inverted (see Exhibits 1 and 2). Some cable testers show the directions of the excursions and travel time of the pulses in an oscilloscope-like display. Others may show it in an alphanumeric display (see Exhibit 3). Both types of displays, however, use the same basic time domain reflectometry (TDR) principle. TDR Oscilloscope Displays Cable Fault Location Using TDR(Length vs. Scan) Typical LANMETER Display DC Resistance Measurement This test gives a reading of the direct current (DC) resistance connected to the far end of the cable. These measurements, coupled with open and short-circuit tests, indicate if the cable is connected properly. Nominal Velocity of Propagation (NVP) Electrical signals traveling along a metal cable have a finite velocity of propagation that varies between 60% and 90% of the speed of light. The best cable manufacturers try to

3

4

5

6 keep this velocity constant over a band of frequencies at which the LANs are expected to operate. Otherwise the signals become distorted, which can cause errors in the detection of the ones and zeros of a data stream. The Nominal Velocity of Propagation is measured by taking a sample of the cable used in the network installation and injecting a short pulse into one end. The other end could be left open or short-circuited. The cable tester measures the time it takes the pulse to travel up and down the sample cable. The recorded time gives a fairly accurate indication of the nominal velocity at the frequency of operation. Most cable testers have this capability. Once the Nominal Velocity of Propagation is determined, it can be retained in the memory of the equipment and used for further tests. Linear Distance Between the Point of Test and the Far End Given the nominal velocity of propagation, a cable tester should be able to calculate the linear distance between the point of measurement and the far end of a cable. Wire Map This feature checks all of the conductors in Unshielded Twisted-pair cable cabling. A message flashes if any of them is poorly connected at either end. Cable Grading Most cable testers can verify the grade of the cable and if it meets the standards requirements. Crosstalk Crosstalk is defined as the electrical noise in a wire spuriously generated by a signal in an adjacent wire; it is caused by electrical coupling between the two in a multiwire cable. When the crosstalk is measured near the point where the signals are generated, it is known as the Near-end crosstalk. If the Near-End crosswalk coupling is high, it signifies that the signals arriving from the far end will be drowned by the near-end interference. A cable tester should be able to measure the NEXT and flash a signal to the operator when this figure is not acceptable. The cause may be a cable of inferior quality or a nearby strong source of electromagnetic radiation. Most of the parameters just mentioned are specified in the IEEE 802 series standards and by the vendors of cables or system integrators. Any significant deviation from the norm is a harbinger of potential problems. Cable testers offer a fairly straightforward method of detecting problems, especially after any physical relocation of workstations or servers. Protocol Decoders Cable testers from most vendors examine only cables. The principal purpose of using a protocol decoder for troubleshooting in a LAN is to examine the inner workings of the LAN components, which operate in layers 1 through 7 of the Open Systems Interconnection (OSI) model. Exhibits 4, 5 and 6 show sample results from obtained from a protocol decoder.

7

8

9

10 Fluke LANMETER Softkeys for Ethernet and Token Ring Ethernet Error Statistics Sample Results Token-Ring Expert-T Autotest Sample Results To perform such a task, a decoder needs to strip open the data frames going back and forth between the various components (e.g., a PC and the server or a bridge) and determine, for example, the protocol type (e.g., TCP/IP, Internetwork Packet exchange, or others) used for communications, the size of the frames, their origins and destinations, and the routes they follow in moving data from one point to another, for both hardware and software. Most decoders can store accurate logs of these parameters and network-related events over a period of time and for printout later. Careful examination of such a log helps detect faulty components or misguided operations. A protocol decoder thus complements the cable testers in a complete analysis of a network. Protocol Decoder Classifications Protocol decoders may be classified into three groups Software-based Protocol Decoders Several vendors, including Digilog Corp. (LANVista), File Transfer Protocol Software(LanWatch), and Triticom (LANdecoder/tr), have developed such software. These software packages are priced between $1,200 and$1,800. They run on PCs. No special attachments are necessary, other than the network interface card. For medium-size networks, the software-based protocol decoder offers many features. Monitor displays are relatively easy to interpret (see Exhibit 7). Monitor Displays Using Triticom's LANdecoder Integrated Protocol Decoders This type of protocol decoder is essentially a special-purpose PC with both hardware and software integrated in one package. Some can be folded like a briefcase and are convenient to carry from one location to another. Vendors of protocol decoders in this medium-priced category include Network General Corp. (Sniffer and Expert Sniffer), Novell Inc. (LanAnalyzer), and Hewlett-Packard (LAN Advisor), among others. Many reputable manufacturers have integrated decoding capabilities in their hubs. Suggested prices of the standalone decoders with attachments vary between $15,000 and $25,000. High-End Protocol Decoders There are several vendors of high-end decoders in the marketplace. Because they offer much more than the medium-price analyzers, their prices are higher. Some of the products are: Dataglance (IBM Corp.),Protocol Tester (Siemens Industrial Automation Inc.), Chameleon(Tekelec Inc.), and DA-30 Protocol Decoder (Wandel & Goltermann

11

12 Technologies Inc.). These decoders are suitable for high-volume network integrators and benchmarking laboratories. Features of a Protocol Decoder The large variation in the prices of protocol decoders suggests that the range of features offered also varies greatly. It takes time and practice for a technical support person to become proficient in both selecting and using protocol decoders and in interpreting their displays. Some of the most common features to consider are described next. Use in Both Ethernet and Token-Ring Networks If a firm owns a mixture of Ethernet and token-ring networks, it is essential that the protocol decoder works with both. Some decoders will work only with one type, mainly Ethernet. There is also the question of accurate measurements to consider. It is more difficult to work with token-ring LANs, both 4M b/s and 16M b/s. Some industry reviews also claim that decoder results are less accurate for token-ring networks. Before the network administrator decides to purchase a decoder, these points should be thoroughly investigated with the vendor. Identification of Type of Protocol Protocol decoders can detect most of the protocols used in LANs(e.g., IPX and TCP/IP). Before acquiring a protocol decoder, the administrator must ensure that it detects the protocol being used on the network. Measurement of Network Utilization In an Ethernet or IEEE network, if a node tries to access the LAN when there are frames already present on the wires nearest to the node (carrier sense), the transmission from this node is deferred for a randomly determined interval before another attempt of transmission is made. It is also possible that one node unknowingly transmits a frame before the signal from an earlier transmission arrives at that point. Obviously, these two frames will collide somewhere along the wire and a collision signal is generated. Immediately the transmissions are halted for a random interval of time. As the number of users increases, so does the number of collisions, because in a Carrier Sense Multiple Access/Collision Detection (carrier sense multiple access/collision detection) network, all users have an equal right of access. A large number of collisions leads to frequent deferment of transmissions, which eventually slows down the network. In other words, as the utilization of the network increases, the response time gets worse. A protocol decoder can measure the utilization and express it in terms of percentage of maximum theoretical utilization of the bandwidth. The utilization figures may be plotted against time in the form of line plot, a bar chart, or even displayed in a fashion resembling an automobile speedometer. From these charts, a network administrator is able to learn the peak periods of network utilization. Usually these peaks occur in the morning when most users in an office try to log in and get their working files from the server. Another peak period might be in the evening when backups are executed. One way to avoid peak loads would be to stagger the Login or backup processes. Under normal circumstances, a utilization of 20% to 25% of the theoretical maximum is considered acceptable. A protocol decoder is also able to count the number of collisions

13 occurring during a specified period. This data helps a network administrator systematically isolate a problem. Exhibits 8, 9, and 10 show sample displays. LANanalyzer Network Dashboard Display Sample of Network Performance Analysis Using LANanalyzer Sample of Decoding and Analysis Using LANanalyzer Measurement of Token Rotation Time In token-ring LANs, the frames move from node to node as they are read and then accepted by the right destination station or thrown back on the wire. Each of these operations takes a finite length of time. Thus, when the number of stations is large (the maximum is 255 per network) and the sizes of the frames are also large, the time for the frames to come around to the original source station, known as the token rotation time, also increases. Consequently, there may be severe delays in the response time. A protocol decoder can measure and display this token rotation time. Measurement of Packet Size It is important for a network administrator to know the frame sizes traveling on the network. Long frames indicate a faulty component. It is necessary to locate the source of long frames using a systematic probe with the protocol decoder. For Ethernet networks, a large number of runt frames (i.e., remnants of collisions and short in length)indicates a faulty component. Probing the network with a protocol decoder can help determine the cause of the runt frames. Detection of Broadcast Storms Broadcast storms are generally caused by faulty network interface cards on Ethernet networks. A broadcast storm takes up practically the whole bandwidth available on a network. A scrutiny of all transmitted frames can easily reveal the source of a broadcast storm. Setting of Filters and Alarms Filters may be placed in protocol decoders to filter all traffic on the network for the detection of a specified occurrence. An alarm could be set to go off if such an event occurs. For example, an alarm may go off if the network utilization exceeds 25%. Logging of Access Nodes to the Servers A protocol decoder can identify and log the nodes attempting to access a certain file in a particular server, and can also identify the source of the request, the time of the access, and the number of bytes read. In short, the whole history of the network during a specific interval of time may be compiled and stored for later examination.

14

15

16

17 Detection of Data Paths through Hubs, Bridges, and Routers. Hubs and bridges are excellent points at which to connect the protocol decoders to the network, since all traffic passes through those points. Most protocol decoders identify the sources of frames, frame numbers, and the routes they follow. This information can assist in detection of a poor configuration. Detection of Beaconing Signals In token-ring networks, a beacon signal signifies a faulty node. A protocol decoder should be able to identify the faulty node and the time at which the node is first detected as faulty. Promiscuous Mode of Operation Decoders operate in a promiscuous mode, which means that they can listen to every frame going past them in a network. Use of this feature, however, calls for caution, because the frame may containsensitive information that should not fall into the hands of the operator of the equipment. For token-ring networks, a decoder should work without being attached like a legal node on the network. Local Decoding and Distributed Decoding Some decoders, though they work well for the purposes of local decoding, may not be able to do any decoding of an enterprisewide distributed network. However, a few of these tools are designed for the specific purpose of examining devices that are physically distant. Examples include Expert Sniffer (Network General Corp.) and Network Advisor (Hewlett-Packard). Proactive and Reactive Analysis Proactive analysis of a LAN helps to check a network's optimal configuration and possibly determine whether the LAN should be segmented into two or more subnetworks so that all workers on a LAN get a fair share of the resources within a reasonable response time. Most protocol decoders can generate frames for checking a network under stress. In complex cases, however, it is best to use commercially available frame generators for proactive analysis. Routine stress analysis can, among other things, indicate failure before it occurs. For example, a buffer may not be adequate for a server under a heavy load. In this case a stress test will reveal this weakness and measures may be taken to prevent a real failure. Data from a proactive analysis can also be fed into some commercially available LAN simulation programs. These procedures are useful to visualize the simulated performance of an extended LAN even before purchasing additional equipment for this extension. Reactive analysis, as the name suggests, is used for detection of faults on a network after a crash. Difference Between a Protocol Decoder and an SNMP-based Management Tool The difference between a good protocol decoder and a Simple Network Management Protocol system is fuzzy. These management tools are often embedded in a hub and can get and set desired parameters in remote components such as workstations, hubs, bridges, routers, and even uninterrupted power supplies (UPS) in an enterprisewide network.

18 Operation of these management tools is based on Remote MONitoring protocols. These tools depend on agents and superagents residing on the equipment. The agents gather the data, send it to the central monitoring station, and if necessary, set alarms or new values on the parameters. It should be emphasized, however, that neither a protocol decoder nor a more elaborate and sophisticated simple network management protocol (SNMP)-based management tool is a substitute for the other. The two have distinctly different uses in the smooth operation of a LAN. Conclusion To avoid costly LAN downtime, systems administrators should select and use troubleshooting tools that are appropriate for their networks. Using cable testers to eliminate the most common cause of LAN downtimes and protocol decoders to monitor the inner workings of LANs, a network administrator can greatly improve the performance record of the company LAN. Author Biographies Amitava Dutta-Roy Amitava Dutta-Roy is a principal for Optimarc in New York NY and a regular contributor to several international technical journals. He earned B.Sc. and Ph.D. degrees in electronic engineering from Imperial College, University of London. He has taught at Queen's University of Belfast, Northern Ireland, University of Sao Paolo, Brazil, and the Brazilian Institute for Space Research. He has served as a UN consultant in Central America on applications of science and technology for development and was recently elected as an IEEE Fellow.

Network Troubleshooting with the LinkView Classic Network Analyzer

Network Troubleshooting with the LinkView Classic Network Analyzer November 2, 1999 www.wwgsolutions.com Network Troubleshooting with the LinkView Classic Network Analyzer Network Troubleshooting Today The goal of successful network troubleshooting is to eliminate network

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

52-20-16 Using RMON to Manage Remote Networks Gilbert Held

52-20-16 Using RMON to Manage Remote Networks Gilbert Held 52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

Networks. The two main network types are: Peer networks

Networks. The two main network types are: Peer networks Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

Token-ring local area network management

Token-ring local area network management Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area

More information

FSW-0505TX/0805TX 5/8 Port SOHO 10/100Mbps NWay Switch FSW-0505TX FSW-0805TX. 5/8 Port SOHO 10/100Mbps NWay Switch. User s Manual. (Revision 1.

FSW-0505TX/0805TX 5/8 Port SOHO 10/100Mbps NWay Switch FSW-0505TX FSW-0805TX. 5/8 Port SOHO 10/100Mbps NWay Switch. User s Manual. (Revision 1. FSW-0505TX FSW-0805TX 5/8 Port SOHO 10/100Mbps NWay Switch User s Manual (Revision 1.0) FCC Class A Appliance This equipment generates and uses radio frequency energy. If it is not installed and used

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

Lesson 5-2: Network Maintenance and Management

Lesson 5-2: Network Maintenance and Management Unit 5: Network Operating Systems Lesson 5-2: Network Maintenance and Management At a Glance This lesson presents an overview of network planning and management tasks. It also discusses hardware and software

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

NETWORK BASELINING AS A PLANNING TOOL

NETWORK BASELINING AS A PLANNING TOOL 50-40-02 DATA COMMUNICATIONS MANAGEMENT NETWORK BASELINING AS A PLANNING TOOL Gilbert Held INSIDE Baselining Tools and Techniques, SimpleView, NEWT, EtherVision, Foundation Manager INTRODUCTION Baselining

More information

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring

More information

Intrusion Detection, Packet Sniffing

Intrusion Detection, Packet Sniffing Intrusion Detection, Packet Sniffing By : Eng. Ayman Amaireh Supervisor :Dr.: Lo'ai Tawalbeh New York Institute of Technology (NYIT)- Jordan s s campus-2006 12/2/2006 eng Ayman 1 What is a "packet sniffer"?

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

51-30-10 Selecting a Firewall Gilbert Held

51-30-10 Selecting a Firewall Gilbert Held 51-30-10 Selecting a Firewall Gilbert Held Payoff Although a company may reap significant benefits from connecting to a public network such as the Internet, doing so can sometimes compromise the security

More information

The ABCs of Spanning Tree Protocol

The ABCs of Spanning Tree Protocol The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

Domain 5.0: Network Tools

Domain 5.0: Network Tools ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 5.0: Network Tools Chapter 5 5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality

More information

Introduction to Computer

Introduction to Computer PDHonline Course E175 (8 PDH) Introduction to Computer Instructor: Dale W. Callahan, Ph.D., P.E. and Lea B. Callahan, P.E. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

Ten top problems network techs encounter

Ten top problems network techs encounter Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,

More information

Chapter 2 TCP/IP Networking Basics

Chapter 2 TCP/IP Networking Basics Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI

More information

51-30-21 Selecting a Web Server Connection Rate Gilbert Held

51-30-21 Selecting a Web Server Connection Rate Gilbert Held 51-30-21 Selecting a Web Server Connection Rate Gilbert Held Payoff Determining the best operating rate for a WAN connection to the Internet is a common problem for organizations wishing to obtain a presence

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Nexus Technology Review -- Exhibit A

Nexus Technology Review -- Exhibit A Nexus Technology Review -- Exhibit A Background A. Types of DSL Lines DSL comes in many flavors: ADSL, ADSL2, ADSL2+, VDSL and VDSL2. Each DSL variant respectively operates up a higher frequency level.

More information

Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test:

Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test: 1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip no: 195 Release Date: October 26, 2007 Region: GLOBAL Using Packet Capture Software To Verify IP Network VoIP Quality Of Service (QoS) Operation Converged networks can experience

More information

Network Design and Management

Network Design and Management Fundamentals of Networking and Data Communications, Sixth Edition 13-1 Network Design and Management Chapter 13 Learning Objectives After reading this chapter, students should be able to: Recognize the

More information

Page 1 of 7. Computer Networking

Page 1 of 7. Computer Networking Page 1 of 7 Computer Networking 7.1 What Is Computer Networking? A computer network consists of several computers that are connected to one another using devices that allow them to communicate. Computer

More information

The Impact of QoS Changes towards Network Performance

The Impact of QoS Changes towards Network Performance International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Broadband 101: Installation and Testing

Broadband 101: Installation and Testing Broadband 101: Installation and Testing Fanny Mlinarsky Introduction Today the Internet is an information superhighway with bottlenecks at every exit. These congested exits call for the deployment of broadband

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for

More information

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Tenth Edition. Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Tenth Edition. Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Tenth Edition Technology in Action Chapter 10 Behind the Scenes: Networking and Security in the Business World 2 Chapter Topics Client/Server

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Network Topologies. Network Topologies

Network Topologies. Network Topologies Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical

More information

Network Design and Management

Network Design and Management Network Design and Management Chapter 13 Learning Objectives After reading this chapter, you should be able to: Recognize the systems development life cycle and define each of its phases Explain the importance

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402 Agilent Technologies Performing Pre-VoIP Network Assessments Application Note 1402 Issues with VoIP Network Performance Voice is more than just an IP network application. It is a fundamental business and

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan

More information

How to Choose the Right Cable Category

How to Choose the Right Cable Category How to Choose the Right Cable Category Why do I need a different category of cable? Not too long ago, when local area networks were being designed, each work area outlet typically consisted of one Category

More information

51-10-50 Circuit-Switched Router Connections Nathan J. Muller

51-10-50 Circuit-Switched Router Connections Nathan J. Muller Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible

More information

PROACTIVE PERFORMANCE MANAGEMENT

PROACTIVE PERFORMANCE MANAGEMENT 51-11-99 DATA COMMUNICATIONS MANAGEMENT PROACTIVE PERFORMANCE MANAGEMENT Tim Clark INSIDE The Current State of Performance Management; Proactive Performance Management; Developing a Baseline; Online Utilization

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since

More information

Understand VLANs, Wired LANs, and Wireless LANs

Understand VLANs, Wired LANs, and Wireless LANs LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)

More information

Access Point Configuration

Access Point Configuration Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give

More information

How To Manage A Network

How To Manage A Network Network Management Keeping the Network Alive from Afar Network management is the process of documenting, monitoring, troubleshooting, and configuring network devices. Network management gives visibility

More information

Tutorial. www.ccontrols.com

Tutorial. www.ccontrols.com Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01 CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective

More information

Appendix B Network, Routing, Firewall, and Basics

Appendix B Network, Routing, Firewall, and Basics Appendix B Network, Routing, Firewall, and Basics This chapter provides an overview of IP networks, routing, and networking. Related Publications As you read this document, you may be directed to various

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Diagnosing the cause of poor application performance

Diagnosing the cause of poor application performance Diagnosing the cause of poor application performance When it comes to troubleshooting application performance issues, there are two steps you can take to make diagnosis easier, faster and more accurate.

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

TCP/IP SUPPLEMENT SCALE NETWORKING

TCP/IP SUPPLEMENT SCALE NETWORKING TCP/IP SUPPLEMENT SCALE NETWORKING 701 S. RIDGE AVENUE TROY, OHIO 45374-0001 FORM 34001 (5-98) Table of Contents Understanding TCP/IP Communications Protocol...3 Understanding the IP Address... 3 Setting

More information

Network performance and capacity planning: Techniques for an e-business world

Network performance and capacity planning: Techniques for an e-business world IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

ET225 Networking Concepts. Chapter 1 What is a Computer Network? ET225 Networking Concepts Chapter 1 What is a Computer Network? Objectives Identify the advantages of connecting computers and devices on a network. Recognize common network components in a lab setting.

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

LAN Performance Measurements Lab

LAN Performance Measurements Lab LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for

More information

Chapter Thirteen. Network Design and Management. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Thirteen. Network Design and Management. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Thirteen Network Design and Management Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Recognize the systems

More information

IntraVUE Diagnostics. Device Failure

IntraVUE Diagnostics. Device Failure IntraVUE provides a method to record and capture the issues that occur in the Ethernet networks being used for automation applications. Automation networks are susceptible to subtle disturbances due to

More information