Lesson 2-3: Ethernet Basics
|
|
|
- Evan Logan
- 9 years ago
- Views:
Transcription
1 Unit 2: LAN Configurations Lesson 2-3: Ethernet Basics At a Glance Ethernet LAN topology is currently the most common network architecture. Ethernet topologies are generally bus and/or bus-star topologies. Ethernet networks are passive, which means Ethernet hubs do not reprocess or alter the signal sent by the attached devices. Ethernet technology uses broadcast topology with baseband signaling and a control method called Carrier Sense Multiple Access/Collision Detection (CSMA/CD) to transmit data. The IEEE standard defines Ethernet protocols for (Open Systems Interconnect) OSI s Media Access Control (MAC) sublayer and physical layer network characteristics. The IEEE standard defines protocols for the Logical Link Control (LLC) sublayer. A solid understanding of Ethernet basics is necessary for all network personnel. What You Will Learn After completing this lesson, you will be able to: Describe Ethernet topology. Explain how CSMA/CD is used within an Ethernet LAN. Compare and contrast two Ethernet frame types. Describe the relationship between IEEE Ethernet standards and the OSI model. Troubleshoot an Ethernet problem. ST A 177
2 Lesson 2-3: Ethernet Basics Tech Talk Back Off Mode A waiting mode in Ethernet topology where computer devices wait a specific amount of time before attempting to retransmit data after they have detected a collision. Bandwidth The amount of data a transmission medium can carry. Baseband A data transmission method in which the entire bandwidth of the cable is used to transmit a single signal. Only one signal can be transmitted at a time. Broadband A data transmission method in which cable capacity is divided into multiple independent bandwidth channels. This allows several data transmissions to occur simultaneously over the cable. Bus A bus is a common pathway (usually copper wire or fiber-optic cable) between multiple devices such as computers. A bus is often used as a backbone between devices. Carrier Sense The ability to detect or sense the presence of other data transmissions on a network. In Ethernet technology, this ability helps avoid or prevent collisions. Collision Detection The ability to detect whether any other devices are trying to access the network simultaneously. Collision Domain All devices on the same Carrier Sense Multiple Access/Collision Detection wire segment are considered one collision domain. A collision in one domain does not affect any other domain on the network. Contention Based In Ethernet topology, a computer device must wait for a turn to use the network. Computer devices must contend with other devices for network access. This means that all devices have an equal opportunity to send signals. No device has priority. Ethernet A LAN topology based on Carrier Sense Multiple Access/Collision Detection (CSMA/CD). Network Operating System (NOS) Software that allows computer devices to interconnect in order to transmit data across media. Passive Hub A central connecting device in a network that joins wires from several stations, but does not provide signal processing or regeneration. 178 ST A Internetworking Fundamentals
3 Unit 2: LAN Configurations Ethernet Origins Ethernet topology, which is based on bus and bus-star physical configurations, is currently the most frequently configured LAN network architecture. A bus is a common pathway (usually copper wire or fiber cable) between multiple devices such as computers. A bus is often used as a backbone between devices. It is a technology that has been evolving for more than 25 years and is still evolving to meet the ever increasing and changing needs of the internetworking community. Digital Equipment Corporation and Xerox (DIX) worked together to develop the first Ethernet standards. These standards are the DIX Ethernet standards and are still in use today. As Ethernet topology became more popular, industry-wide standards became necessary. In 1985, the IEEE adopted the current Ethernet standards. These standards are called the IEEE and standards. They differ slightly from the DIX standards, but both define the protocols for the physical and data link layers of the OSI Model. These standards include cabling specifications, frame format, and network access conventions. Ethernet is a passive, contention-based broadcast technology that uses baseband signaling. Baseband signaling uses the entire bandwidth of a cable for a single transmission. Only one signal can be transmitted at a time and every device on the shared network hears broadcast transmissions. Passive technology means that there is no one device controlling the network. Contention-based means that every device must compete with every other device for access to the shared network. In other words, devices take turns. They can transmit only when no other device is transmitting. Ethernet popularity is a result of several factors. Ethernet technology is: Inexpensive Easy to install, maintain, troubleshoot and expand A widely accepted industry standard, which means compatibility and equipment access are less of an issue Structured to allow compatibility with network operating systems (NOS) Very reliable ST A 179
4 Lesson 2-3: Ethernet Basics Check Your Understanding Explain what is meant by passive, contention based, broadcast technology that uses baseband signaling. Why is Ethernet topology currently the most frequently configured LAN network architecture? Ethernet Configuration and Communication Ethernet Configuration Ethernet is a broadcast topology that may be structured as a physical bus or physical star with a logical bus. Ethernet Physical Bus Topology 180 ST A Internetworking Fundamentals
5 Unit 2: LAN Configurations The physical star with a logical bus is created with the use of a hub or concentrator. Ethernet Physical Star/Logical Bus Topology Hub Ethernet Communication Communication protocols for Ethernet networks encompass both the datalink and physical layers of the OSI model. This lesson deals mainly with the data-link layer, which is subdivided into a Media Access Control layer and a Logical Link Control layer. Lesson 2-4 covers physical layer issues. Ethernet uses Carrier Sense Multiple Access/Collision Detection (CSMA/CD) when transmitting data. Carrier Sense allows a computer device to sense whether or not another transmission is being carried over the network. So, before a device sends data, it listens for a carrier (jam) signal. If a carrier signal is detected, it waits until that transmission is completed. Early DIX Ethernet did not have a carrier signal. Therefore, a collision was not detected until the destination device received the framed packet. The addition of a jam signal is one example of how Ethernet technology has evolved. Multiple Access means that all devices have equal access to the network. Since Ethernet is contention-based, equal access to the network for all is ensured. No device has priority over others, nor can it lock out any other device connected to the network. Information can be transmitted at any time by any device. All devices on the network receive the transmission and check the framed packet s destination address. If the destination address matches the device s address, the device accepts the data; if the address does not match, the device simply ignores the transmission. ST A 181
6 Lesson 2-3: Ethernet Basics Ethernet Collision Device A Device B Device C Collision Detection means that a sending device can detect simultaneous transmission attempts. When two or more devices try to send data at the same time, the signals collide. The illustration above shows devices A, B, and C sending signals simultaneously, and a collision occurs. When this happens, each device then transmits a jam signal, called a carrier, to alert all other devices that a collision has occurred. All devices then go into back off mode and wait a random amount of time before attempting to retransmit data. The random time provision prevents simultaneous retransmissions. All devices on the same Carrier Sense Multiple Access/Collision Detection wire segment are part of the same collision domain. A collision domain is defined as those devices that share CSMA/CD of the same wire. Two or more collision domains are connected together with an internetworking device such as a router, bridge, or switch. With the use of internetworking devices, large networks are created which include multiple collision domains. When a collision occurs it affects all the devices on the same collision domain. It does not affect devices on any other collision domains within the same network. You can think of two collision domains as two roads that are on different sides of a bridge. You can travel up to the bridge on either side, but must get permission to cross the bridge. On an Ethernet collision domain, frames of data travel within their own domain unless they need to talk to a device on the other side of the bridge. If it is necessary to talk to a device on the other side of a bridge, the bridge must give permission for the frame to cross the bridge to reach the other collision domain. Bridges are capable of this because they are store and forward devices: they store the frame from the source domain until permission is granted to forward it. The requirement is to keep traffic and collisions to a single collision 182 ST A Internetworking Fundamentals
7 Unit 2: LAN Configurations domain whenever possible. Collision domains are also called segments in Ethernet. Ethenet Collision Domain Data transmitted from one device to another on the same collision domain will not affect any other collision domains. This allows each collision domain to continue to transmit with no effect on each other except when a device needs to talk to a device on another collision domain. When this is required, the frame must be sent across one or more internetworking devices to reach its destination. Each internetworking device must allow the frame to pass. As the frame reaches each collision domain the port of the internetworking device must contend for the right to transmit according to the rules of CSMA/CD. To better understand CSMA/CD, think about trying to make a telephone call. Many of us have more than one telephone in our homes (a telephone network). When you pick up the telephone to make a call, you sense a dial tone or someone else on the line. If there is a dial tone, you proceed with your call. If the telephone line is currently in use, you can not make a call at this time and you try again later. This is similar to Ethernet Carrier Sense protocols. All telephones in the house can be used at any time to make calls. All phones in the house have equal access to the telephone network. This is comparable to Multiple Access. Should two individuals in the house attempt to make a phone call simultaneously, both hear dial tone; neither party senses a carrier, (someone else on the line). However, like Ethernet technology, only one individual can use the line at any one time. Both parties must ST A 183
8 Lesson 2-3: Ethernet Basics hang-up and wait a random amount of time before making a second attempt. This is how Ethernet s Collision Detection protocols work. In summary, a computer device checks to see if the transmission media is busy, recognizes that multiple devices access the network, and detects when a collision has taken place and goes into back off mode. Check Your Understanding Explain CSMA/CD in your own words. When your teacher asks a question in class, what might the result be if everyone answered the question simultaneously? What rules do use in your class use to prevent simultaneous responses? How is a polite conversation similar to CSMA/CD protocols? Ethernet Frames In Ethernet, both the data link and the physical layers are involved in the creation and transmission of frames. The physical layer is related to the type of LAN cabling and how the bits are transmitted and received on the cable. The data link layer is divided into sublayers, the Logical Link Control (LLC) and the Media Access Control layers (MAC). The frames created by these layers contain several fields that are processed by Network Interface Cards (NICs) in the sending and receiving devices. Ethernet and the OSI Layers Data Link LLC MAC Physical 184 ST A Internetworking Fundamentals
9 Unit 2: LAN Configurations The MAC sublayer address is the physical hardware address of the source and destination computer. It is called the MAC layer address and should not be confused with the network address. All devices on a LAN must be identified by a unique MAC address. This sublayer controls which computer devices send and receive the data and allows NICs to communicate with the physical layer. IEEE protocols control the format of the MAC sublayer frame fields. The next level of processing is the LLC sublayer. It is responsible for identifying and passing data to the network layer protocol. Two LLC protocols are IP and Novell s IPX. Frame Format The two frame formats discussed in this lesson are DIX frames, which are what the Internet uses, and IEEE frames. It should be noted that if one device uses an NIC and the other device uses a DIX Ethernet NIC, they would not be able to communicate with one another. Devices must create the same Ethernet frame format in order to be compatible. Although only the IEEE frames format is outlined in the standard, both formats are in use today. One way to tell them apart is that the DIX frame has a type field, which defines the protocol used for the frame, and IEEE has a length field in its place. IEEE also has additional fields not used with the DIX format. The DIX, also called Ethernet II, frame includes the following fields: DIX Frame (Ethernet II) Preamble Destination Address Source Address Type Data FCS The Preamble of the frame (the first 7 ) indicates the start of a new frame and establishes synchronization conditions between devices. The last byte, or start frame delimiter, always has a bit pattern. This byte indicates the start of a frame. The Destination Address is the hardware (MAC) address of the receiving device, and the source address specifies the hardware (MAC) address of the sending device. The Type field specifies the network layer protocol used to send the frame, for example TCP/IP. ST A 185
10 Lesson 2-3: Ethernet Basics The Data field is for the actual data being transmitted from device to device. It also contains information used by the network layer and indicates the type of connection. The Cyclic Redundancy Check (CRC) checks that the frame is received free from corruption. IEEE Frame Format The IEEE standard was adopted in The frame format is below: Preamble SFD Destination Address Source Address Length Data and Pad FCS Fields one and two perform the same function as the DIX preamble; however, the fields are separate. The Start Frame Delimiter (SFD) has the same bit sequence found at the end of the DIX preamble. Both formats use the same number of to perform the synchronization of the signals. The Destination and Source Addresses can be either 2 or 6. Whether 2 or 6 are used, all devices within the same network must use the same format. IEEE protocols specify that a 10Mbs network must use 6. The 2 byte length is obsolete. The Length field indicates the number of in the data field. If the data field is less than the required 46, a pad field is added to the data frame. The added for padding purposes are usually zeros. The data field contains the data to be transmitted from device to device. The Frame Check Sequence (FCS) field is used as an error detection function. The error detection function is a calculation completed by both the source and destination devices. If the calculations do not match, an error is then generated. 186 ST A Internetworking Fundamentals
11 Unit 2: LAN Configurations IEEE LLC Frame In between the length field and the data/pad field, is the LLC field. 7 1 byte Preamble SFD Destination Address Source Address Length Data and Pad FCS 1 byte 1 byte 1 byte DSAP SSAP Control DSAP, destination service access protocol, is the protocol processing layer the data is to be sent to. SSAP, source service access protocol, is the protocol used to encapsulate the data at the source. Control is the field that defines the type of LLC frame this is. ST A 187
12 Lesson 2-3: Ethernet Basics SNAP Format of byte 1 byte 1 byte 3 2 DSAP (AA) SSAP (AA) Control Organization EtherType SNAP (Sub-Network Access Protocol) was created by the IEEE to identify the Network layer protocol used. The original Ethernet version 2.0 Type field had been reused as a Length field by the IEEE when creating the IEEE standard. SNAP was defined to enable this Length field to remain while also allowing the vendor and protocol to be defined in the first 40 bits of the Data field. Together, these two fields (Organization and EtherType) are called the Protocol ID. AA in the DSAP or SSAP fields indicates that the LLC field is using SNAP format. Control is the field that defines the type of LLC frame this is. Organization is the field that indicates which organization created the protocol identified in the EtherType field, though generally this is coded as all zeros by most organizations. EtherType is a two-byte identifier for the protocol being used to encapsulate the data. For example, IP is indicated by the code 0x08-00, ARP by 0x08-06 and NetWare IPX/SPX by 0x Depending on how the vendor decided to manufacture the Ethernet hardware, the hardware will create frames that are either DIX, 802.3, or with SNAP. Frame Types There are three types of frames; each has a different purpose. The three types are: Unicast Multicast Broadcast If the first bit of the frame is 0, it is Unicast; if it is 1, it is multicast. Broadcast frames always have 1 as the second bit. A Unicast frame is addressed to a single network device. This means that the frame is to be read only by the device that matches the destination address. All other devices in the collision domain will receive a copy of the 188 ST A Internetworking Fundamentals
13 Unit 2: LAN Configurations frame but will discard it because it does not match their destination address. The address used is the MAC address or hardware address of the network device. A multicast frame is addressed to several but not all devices. All devices that are a part of the specified group may read the frame. A multicast address is a deviation from the normal hardware address. For example, a group of devices are assigned access to a particular server on the network. They are the only devices that receive frames announcing the availability of that server. Any device that does not belong to this group will ignore or discard these frames. A broadcast frame is addressed for all network devices to read and process. A broadcast address is a unique address used only for broadcast frames. It is not a hardware address. Broadcast frames are transmitted across bridges and switches; however, routers will stop broadcast frames. Check Your Understanding Describe what the LLC layer does. What do the MAC sublayer protocols specify? Create a table that compares a DIX frame and an IEEE frame. Compare and contrast unicast, multicast, and broadcast frames. ST A 189
14 Lesson 2-3: Ethernet Basics Try It Out Ethernet LAN As you complete this lab, keep a record of the problems you encounter, how you solve them, notes indicating how you would prevent these problems from occurring the next time you encounter this situation, and any other thoughts you feel should be incorporated into your portfolio. This information is critical to discovering some very simple troubleshooting techniques. Recall from the cabling lesson that there are tip and ring wires on cables. You crimped a straight-through, category 5 cable, with a RJ-45 connector. Your computer transmits straight through. In order to receive transmissions, the cable or the device you re connecting to must be crossover. That is because the Tx pin/wire on one device must eventually enter the Rx pin/wire on the end device. Hubs are crossover devices, that is, the crossover takes place internally. As a result, you use straight through cables to connect your computer to the hub. Media dependent interface (MDI) is the IEEE standard for the interface to unshielded twisted pair (UTP) cable. In order for two devices to communicate, the transmitter of one device must connect to the receiver of the other device. The connection is established through a crossover function, which can be a crossover cable or a port that implements the crossover function internally. Ports that implement the crossover function internally are known as MDI- X ports, where X refers to the crossover function. Ethernet single collision domains may be configured in several ways. In this lab you will configure a single collision domain using a single hub. Work in groups of three or four. All the members of your team will connect their computers to the hub and your team will become an Ethernet segment. Materials Needed Manual for BayStack BaseT Hub Power cords for Hub network connectivity Straight through cable you crimped in Unit 1 Part 1: Identify Hardware 1. Obtain the BayStack BASE-T Hub documentation from your teacher. 190 ST A Internetworking Fundamentals
15 Unit 2: LAN Configurations 2. Read Chapter 1: Introduction, Features, and Description, pages 1-1 to Obtain the diagram of the BayStack BASE-T Hub that you placed in your portfolio during the Connectivity and Internetworking Devices lesson. 4. Refer to pages 1-5 and 1-6 of the Hub documentation. Label all of the parts. Keep diagram in your portfolio. 5. Attach the power cord to the back of the hub and power on the hub. How many host (RJ-45) ports on the hub? What are the configuration settings available for port 1? How is the configuration set for port 1?What is the configuration for the other ports? MDI or MDI-X?What type of port is on the NIC on the back of your computer? What is the configuration of the NIC card port? MDI or MDI-X? Part 2: Connecting to the Hub 1. Use the straight through cable you crimped or obtain another straight through cable from your teacher. Connect from your NIC to a host port on the hub. Why do you need to use a straight through cable?did the Link LED turn to green for your connection? Yes or No 2. If the link did not turn to green, contact your teacher. 3. After all team members are connected to the hub, verify that all LEDs on the LED display on the hub where workstations are connected are green. 4. PING will be used to verify each connection. 5. Select the Start menu, select Programs, and select MS DOS Prompt. A window similar to the following is presented on the screen ST A 191
16 Lesson 2-3: Ethernet Basics Press Enter. Four ping frames will be sent to verify connectivity to the IP address you requested. Were you successful? Yes or No 8. If you were not successful, check all connections and the status LEDs of each host port. Are there any amber LEDs? Yes or No If the answer is yes, verify the connection to the computer, the cable quality, the accuracy of the IP address assigned to the computer you are tying to reach and the accuracy of your PING request. Did you find the problem? Yes or No If you cannot resolve your problem, ask the teacher for help. Can you PING all members of your team? Yes or No Have you configured one or two collision domains? 192 ST A Internetworking Fundamentals
17 Unit 2: LAN Configurations 9. Record the IP addresses on the diagram you created for the structured cabling lesson. When you have successfully proven connectivity to all team members and your instructor, you have completed this lab. Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Participation and teamwork 20 Accurately followed directions 25 Thorough and accurate answers to questions 30 Portfolio. Clarity of notes, relevance of potential solutions for future similar problems TOTAL ST A 193
18 Lesson 2-3: Ethernet Basics Stretch Yourself Troubleshooting Ethernet LANs Materials Needed BayStack 152 Hub and documentation LAN Directions: Refer to the documentation that came with the BayStack 152 Hub. Record the answers to the questions in your portfolios for future troubleshooting recommendations. Each of the ports has an LED to indicate port status. The LEDs indicate link, activity, and partitioning status. The port status indicators always come on when the hub is powered on. In normal operation, after the POST (power-on self-test) is completed, the LEDs turn off. Answer the following questions regarding the description of Hub Status LEDs. When the Master is green, what does that indicate?when the Con is green, what does that indicate? When the AUI is green and blinking, what does that indicate? When the Runt is amber, what does that indicate? When the F/A is amber, what does that indicate? When the L/C is amber, what does that indicate? When the Other is amber, what does that indicate? When the Isolate is amber, what does that indicate? What does the Hub ID tell you? 194 ST A Internetworking Fundamentals
19 Unit 2: LAN Configurations Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score On time delivery of assignment 15 Questions and answers added to portfolio for future reference. Completeness and accuracy of answers questions 60 TOTAL ST A 195
20 Lesson 2-3: Ethernet Basics Network Wizards Troubleshooting an Ethernet LAN Case Study A small company has hired you to solve their networking problem. The wait time for access to and other services at the company is very slow, resulting in lowered productivity. The network is an Ethernet LAN, bus topology (physical and logical), with 55 devices all connected to the same collision domain. There are three user groups: sales (30 devices), accounting (5 devices), and marketing (18 devices), each with its own server. The company executives know a little bit about LANs and connectivity devices; however, they do not know whether to purchase a repeater, a bridge, a hub, or a combination of these devices. Materials Needed None Your assignment is to prepare a document with a proposed solution to their problem. The document must contain the following: Explain the shortcomings of bus topology in this case. Suggest an alternative topology and defend your choice. Provide a computer-generated sketch of the proposed topology. Prepare documentation that explains the purpose of a hub, repeater, router, bridge, and switch, and relate these devices to their corresponding OSI layer. Explain which devices will help solve their problem and tell them why. Prepare a one-page summary of your proposed solution. 196 ST A Internetworking Fundamentals
21 Unit 2: LAN Configurations Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score On time delivery of proposed solution document 20 Thorough explanation of the shortcomings of bus topology and defense of proposed topology changes Accurate sketch of proposed topology 20 Complete and accurate explanation of the various computer devices, their relationship to the OSI layers, and which ones will help solve the company s networking problems Plausibility of the proposed solution 20 TOTAL Summary In this lesson, you learned to do the following: Describe Ethernet topology. Explain how CSMA/CD is used within an Ethernet topology. Compare and contrast two Ethernet frame types. Describe the relationship between Ethernet standards and the OSI model. Set up an Ethernet LAN and ping to check for connectivity. Troubleshoot an Ethernet problem scenario. ST A 197
22 Lesson 2-3: Ethernet Basics Review Questions Name Lesson 2-3: Ethernet Basics Part A 1. Which type of transmission do all devices on the shared network hear and accept? a. Unicast b. Multicast c. Broadcast d. Baseband 2. Which type of signaling uses the entire bandwidth of a cable for a single transmission and allows only one signal at a time? a. Unicast b. Multicast c. Broadcast d. Baseband 3. When all devices have equal access to the network and no one device has priority over another device, what is this called? a. Carrier Sense b. Multiple Access c. Collision Detection d. Collision Domain 4. What is the term used to describe the ability of a device to sense simultaneous transmission attempts and wait a random amount of time before retransmitting data? a. Carrier Sense b. Multiple Access c. Collision Detection d. Collision Domain 198 ST A Internetworking Fundamentals
23 Unit 2: LAN Configurations 5. What is the ability to listen for a jam signal before transmitting data called? a. Carrier Sense b. Multiple Access c. Collision Detection d. Collision Domain 6. Ethernet standards include specifications for which of the following? a. Cabling b. Frame format c. Network access conventions d. All of the above 7. What are the two IEEE Ethernet standards called? 8. What is the name for the Ethernet standards developed by Xerox, Intel, and Digital Equipment Corporation? 9. What type of topology configuration(s) does Ethernet employ? 10. List five reasons for the popularity of Ethernet LAN topology. ST A 199
24 Lesson 2-3: Ethernet Basics Part B Matching: Match the part of the frame with its definition. 1. Preamble A One byte code in the LLC field used to identify the protocol that will encapsulate the data field 2. Start of Frame B Hardware address of the destination device 3. Destination Address C Actual information being transmitted 4. Source Address D Specifies the protocol used for sending the frame 5. Type Field E Specifies the length of the data within the frame 6. Length Field F Type of frame check that detects errors that occur in the frame during transmission 7. Pad G Added to the data field of IEEE when the data is less than Data H Establishes synchronization and transceiver conditions 9. DSAP I Field with sequence separate 10. CRC J Hardware address of the sending device 200 ST A Internetworking Fundamentals
25 Unit 2: LAN Configurations Part C Name the two data link sublayers. Which sublayer of the OSI do the IEEE standards control? Which sublayer of the OSI do the IEEE standards control? What do the MAC sublayer protocols specify? Explain how the data link and physical layers are involved in the creation and transmission of frames. Scoring Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Part A: Describe Ethernet topology. Explain how CSMA/CD is used within an Ethernet topology Part B: Compare and contrast two Ethernet frame types Part C: Describe the relationship between Ethernet standards and the OSI model TOTAL 100 Try It Out: Set up an Ethernet LAN and ping to check for connectivity. Stretch Yourself: Troubleshoot Ethernet LANs Network Wizards: Troubleshoot possible Ethernet problems FINAL TOTAL 400 ST A 201
26 Lesson 2-3: Ethernet Basics Resources Aschermann, Robert (1998). MCSE Networking Essentials for Dummies. IDG Books Worldwide, Inc. Forest City, California. Baker, R. (1996). Data Communications Home Page. Available: [1999, May 13]. Bert Glen (1998). MCSE Networking Essentials: Next Generation Training Second Edition. New Riders Publishing. Indianapolis Indiana. Chellis, James; Perkins, Charles; & Strebe Matthew (1997). MCSE Networking Essentials Study Guide. Sybex Inc. Alameda California CMP Media, Inc. (1999). FDDI fundamentals. In Data Communications Tech Tutorials [Online]. Available: [1999, April 20]. Computer and Information Science, Ohio State University (No date). Data Communications Cabling FAQ. [Online].Available: [1999, May 13]. Derfler, Jr., Frank J., & Freed, L. (1998). How Networks Work, Fourth Edition. Macmillan Computer Publishing/Que Corporation. Indianapolis, Indiana. Hayden, Matt. (1998). Sam's Teach Yourself Networking in 24 Hours. Sam's Publishing, Indianapolis, Indiana. Microsoft Corporation (1998). Dictionary of Computer Terms, Microsoft Press, Redmond, Washington. Nortel Networks (1998). Internetworking Fundamentals: Student Guide Bay Networks Inc. Billerica, Massachusetts. Palmer, Michael J. (1998) Hands-On Networking Essentials with Projects, Course Technology, Inc. Cambridge, Massachusetts. Spurgeon, Charles E. (1997). Practical Networking With Ethernet. International Thomson Computer Press, Boston, Massachusetts. 202 ST A Internetworking Fundamentals
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Lesson 1-4: Structured Cabling Systems
Unit 1: Internetworking Overview Lesson 1-4: Structured Cabling Systems At a Glance This lesson describes both physical and logical organization of networks. Topologies described include bus, ring, star,
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
Lesson 5-2: Network Maintenance and Management
Unit 5: Network Operating Systems Lesson 5-2: Network Maintenance and Management At a Glance This lesson presents an overview of network planning and management tasks. It also discusses hardware and software
Introduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
LAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1
Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos [email protected] 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos [email protected] 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
RTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:
Unit 6 Router Management Overview Description With today s networks growing exponentially, management is a key to quality of network performance. People depend on their networks and performance issues
Data Link Layer. Page 1. Ethernet
Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few
- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet
Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
The OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
Level 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
This unit contains the following two lessons:
Unit 5 Networking Operating Systems Overview Description This unit contains two lessons. The first lesson describes the characteristics of the four major Internetworking Systems, including Windows NT Server,
Fiber Distributed Data Interface
CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI
Mathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
Data Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Chapter 2 TCP/IP Networking Basics
Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)
Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access
Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few
Candidates should attempt FOUR questions. All questions carry 25 marks.
UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
ethernet connection For more information about the printer's ethernet feature, click the topic below: ethernet lights network configuration page
ethernet table of contents ethernet connection The printer's built-in ethernet feature allows you to connect the printer directly to an ethernet network without the need for an external print server. For
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Cabling LANs and WANs
Cabling LANs and WANs CCNA 1 v3 Module 5 10/11/2005 NESCOT CATC 1 Cabling the LAN Each media has advantages and disadvantages: Cable length Cost Ease of installation Susceptibility to interference The
Network Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
Appendix B Network, Routing, Firewall, and Basics
Appendix B Network, Routing, Firewall, and Basics This chapter provides an overview of IP networks, routing, and networking. Related Publications As you read this document, you may be directed to various
Troubleshooting and Auto-Negotiation Features for IMC Networks Media Conversion Products
Troubleshooting and Auto-Negotiation Features for IMC Networks Media Conversion Products Table of Contents Introduction...................................................................... 1 About Link
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
RFC 2544 Testing of Ethernet Services in Telecom Networks
RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
LANs and VLANs A Simplified Tutorial
Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
Network Topologies. Network Topologies
Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical
TCP/IP SUPPLEMENT SCALE NETWORKING
TCP/IP SUPPLEMENT SCALE NETWORKING 701 S. RIDGE AVENUE TROY, OHIO 45374-0001 FORM 34001 (5-98) Table of Contents Understanding TCP/IP Communications Protocol...3 Understanding the IP Address... 3 Setting
Lab - Using IOS CLI with Switch MAC Address Tables
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Introduction To Computer Networks
Introduction To Computer Networks 1. LAN s and WAN s 2. Some network and internetwork components 3. The communication process 4. Communication media 5. Topologies 6. Communication models and Standards
Tutorial. www.ccontrols.com
Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services
Performance Analysis of Switches in High Speed LAN
Performance Analysis of Switches in High Speed LAN Muhammad Imran, Asif Shaikh, Syed S. Rizvi, Khaled M. Elleithy Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT {mimran,
Data Communication Networks
Data Communication Networks Data communication networks typically do not send real time data As a result, packet switching is often used OPTI 500, Spring 2011, Lecture 6, Data Networks 1 Packet Switching
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
TCP/IP Networking Basics. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA
TCP/IP Networking Basics NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA September 2005 2005 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and Auto Uplink are trademarks or
How To Understand The Network Protocol Of A Network (Netware) 2.5 (Networchestra) 2 (Netwire) 2) (Netrocessor) 2-Way (Networking) 2,5 (Network)
PAGE 1 OF 16 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2013 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
Chapter 4 Connecting to the Internet through an ISP
Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No
DATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1
Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer
Cisco Network Performance Evaluation Using Packet Tracer
Cisco Network Performance Evaluation Using Packet Tracer doi: 10.17932/ IAU.IJEMME.m.21460604.2015.5/1.905-911 Muhammet Emin KAMİLOĞLU 1 Abstract In this study, a wide area network designed and simulated.
Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet
Fast Ethernet and Gigabit Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer Data Link Layer Physical
Network Categories. Network Types for the Local Range. Ethernet
Sicherungsebene Network Categories Chapter 2: Computer Networks 2.1: Physical Layer: representation of digital signals 2.2: Data Link Layer: error protection and access control 2.3: Network infrastructure
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)
reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed
Packet Tracer 3 Lab VLSM 2 Solution
Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the
Cisco - Ethernet 100BaseTX and 10BaseT Cables: Guidelines and Specifications
Page 1 of 8 Ethernet 100BaseTX and 10BaseT Cables: Guidelines and Specifications Contents Introduction Prerequisites Requirements Components Used Conventions Which Cable Do I Need? Ethernet Cabling Guidelines
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
Ethernet/IEEE 802.3 evolution
Ethernet/IEEE 802.3 evolution Pietro Nicoletti www.studioreti.it 8023-Evolution-Engl - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties.
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks
Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;
FSW-0505TX/0805TX 5/8 Port SOHO 10/100Mbps NWay Switch FSW-0505TX FSW-0805TX. 5/8 Port SOHO 10/100Mbps NWay Switch. User s Manual. (Revision 1.
FSW-0505TX FSW-0805TX 5/8 Port SOHO 10/100Mbps NWay Switch User s Manual (Revision 1.0) FCC Class A Appliance This equipment generates and uses radio frequency energy. If it is not installed and used
Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Local Area Network LANs connect computers and peripheral
Ring Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
Exhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
Industrial Networks & Databases. Protocols and Networks - Device Bus - - Field Bus -
Industrial Networks & Databases - Device Bus - - Field Bus - - Data Bus - Recall MODBUS protocol is a messaging structure used to set up master/client type communications with slaves/servers between intelligent
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
Controlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu [email protected] Communications Laboratory 09.03.2004 Content of Presentation
AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP
AN ANALYTICAL STUDY OF INTERNET AND INTRANET CONNECTIONS AND CONFIGURATIONS IN ISP Mst. Najnin Sultana, Abu Jafar Md. Masud Karim Daffodil International University, Dhaka, Bangladesh E-mail: [email protected]
CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
Local Area Network. OSI Seven Layer Model. Whole Building Network
(MECH3023) 2 Local Area Network Networking for BAS Centralized & Decentralized networks LAN topologies LAN standards & examples Transmission hardware OSI Seven Layer Model Importance of interoperability
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Connecting to the network
5 Connecting to the network This chapter discusses the basic stages of connecting the printer to the network, provides an overview of network requirements and protocol diagrams, and describes how to physically
Network Troubleshooting with the LinkView Classic Network Analyzer
November 2, 1999 www.wwgsolutions.com Network Troubleshooting with the LinkView Classic Network Analyzer Network Troubleshooting Today The goal of successful network troubleshooting is to eliminate network
