Lesson 2-2: Data Transmission

Size: px
Start display at page:

Download "Lesson 2-2: Data Transmission"

Transcription

1 Unit 2: LAN Configurations Lesson 2-2: Data Transmission At a Glance In this lesson, the process of transmitting data is examined. Computers encode and transmit data, voice, and video over networks via various transmission media. Encoding is the process of transforming information into digital and analog signals. This lesson covers the basics of how data is encoded, decoded, and transmitted. Data packet structure and its relationship to the OSI layers is also covered. What You Will learn After completing this lesson, you will be able to: Define technical terms associated with data signaling and transmission. Describe the characteristics of digital and analog signaling. Explain how packets and frames are structured, and describe their relationship to the OSI model. Convert binary and hexadecimal digits to decimal digits. Use Sniffer Basic software to capture and analyze packets. ST A 143

2 Lesson 2-2: Data Transmission Tech Talk Amplitude Characteristic of a wave measuring wave height from the base to the peak of a waveform. Indicates the strength of the signal. Analog Signal Analog signals change continuously as opposed to digital signals, which are discretely valued. For example, sound is an analog signal; it is continuous and varies in strength. ASCII Code American Standard Code for Information Interchange. A 7-bit coding scheme that assigns unique numeric values to letters, numbers, punctuation, and control characters. Baudot Code A 5-bit coding scheme used for transmitting data. Binary Numbers A number system based on two states, 0 and 1. Computers use combinations of binary numbers to represent and encode all kinds of data including words, sounds, colors, and pictures. Connection-Oriented Communication A form of network communication, where the transmitting device must establish a connection with the receiving device before data can be transmitted, (for example, telephone). In connection-oriented communication, the receiving device acknowledges receipt of the data. Connectionless Communication A form of communication over networks where the transmitting device can send a message without establishing a connection with the receiving device (for example, radio). Signals are sent, but there is no mechanism for acknowledging receipt. Digital Signal Data transmitted in discrete states, for example, on and off. These discrete states can be represented by binary numbers, and vice versa. Full-Duplex Two-way, simultaneous data transmission. Each device has a separate communication channel. EBCDIC Code Extended Binary Coded Decimal Interchange Code. An 8-bit coding scheme used by IBM for data representation in mainframe environments. Logical Address An OSI model Layer 3 address. Frame Basic unit of data transfer at OSI Layer 2. Half- Duplex Two-way data transmission that is not simultaneous. Only one device can communicate at a time. Packet Basic unit of data transfer at OSI Layer 3. Physical Address A OSI model Layer 2 address. 144 ST A Internetworking Fundamentals

3 Unit 2: LAN Configurations Data Transmission Data is transmitted over networks using signals, which are transformed, or encoded, by computers into the voice, video, graphics, and/or the print we see on our computer screens. The signals used by computers to transmit data are either digital or analog. Analog signals are continuous signals that vary in strength. Sound is an example of an analog signal. Sound is actually a wave and is quite similar, or analogous, to electromagnetic waves, hence the name analog. Telephones have transmitters that encode sound waves into electromagnetic waves, which then travel over wires toward their destination. The receiving telephone decodes the electromagnetic waves back into sound waves. Our brains then decode the sound waves into the words we hear. Computer modems use the same principle. Analog signals can be represented digitally. For instance, a high electromagnetic voltage could be interpreted as 1 and low voltage as 0. Telephone Encoding/Decoding Source Encode Cable Decode Destination Digital signals are discrete rather than continuous. Either there is a signal or there isn't a signal. Telegraphs transmit data with discrete signals. You either hear a tap or you do not hear a tap. Discrete signals can be represented by on and off pulses. The duration of a discrete signal can be varied, as with dots and dashes in Morse Code. Telegraph Encoding/Decoding Source Encode Cable Decode Destination ST A 145

4 Lesson 2-2: Data Transmission Discrete signals can also be represented digitally. The presence of a signal could be coded as a 1 and the absence of a signal coded as a 0. The digits 0 and 1 are used because computer circuitry is based on binary digital data. Codes are used to group a set number of bits together and have a group of bits represent a letter, number, or other character. The computer s brain, the central processing unit (CPU), transforms these codes of 0s and 1s into the voice, video and data we see. One coding scheme, ASCII, codes an a as the binary number Digital data is based on two states, on or off. The binary numbering system uses only two digits, 0 and 1, so it makes sense to use the binary numbering system. One digit, 0 represents off, the other digit represents on. A single 0 or 1 is called a bit. One byte is equal to eight bits (also called an octet when discussing TCP/IP). In ASCII code, one octet is the equivalent of one alphabetic or numeric character. In order to appreciate how computers communicate over networks, it is necessary to be aware of how they encode information. Connection-Oriented and Connectionless Transmissions Data transmission may be: Connection-oriented Connectionless The main difference between the two is that with a connection-oriented transmission, the destination device acknowledges receipt. Whereas, with connectionless, there is no acknolwedgement. In connection-oriented transmissions, the sending (source) device establishes a connection with the receiving (destination) device. The connection is continued until all data packets have been transmitted and the source device receives notification that the data was received by the destination device and has been checked for errors. A telephone conversation is an example of a connection-oriented transmission. When a call is made, data is transmitted across phone lines, the receiving party picks up the phone, and a conversation takes place. The individual making the call knows that it arrived at the correct destination and that it was understood. In a connectionless transmission, the source device transmits data but the connection is not maintained. The source device does not wait for notification that the destination device actually received the information accurately. This method is faster than connection-oriented, however less reliable since there is no notification of whether the data is received or not. It is more common to find connectionless transmissions on LANs. To understand a connectionless transmission, think of a radio broadcast: A radio disc jockey tells his/her friends to be sure to listen to her/his program 146 ST A Internetworking Fundamentals

5 Unit 2: LAN Configurations at 9:00 p.m. At that time the disk jockey broadcasts a message to them. Did they receive the message? Although it is quite likely, the disk jockey cannot be sure that they turned the radio on, listened, or understood the message. Synchronous and Asynchronous Transmission Computers need to know when to expect data and where a character begins and ends. When receiving data, timing on both computer devices must be coordinated if they are to work together efficiently. This coordination is called clocking, timing, or framing. There are two protocols for the timing or coordination of data signals: Synchronous Asynchronous When transferring data, both the transmitting and receiving nodes need to agree when the signal begins and ends so the signals can be correctly measured and interpreted. This timing process is called bit synchronization, framing, or clocking. Imaginehowdifficultitwouldbetoreadifyoudidnotknowwhenawordstartedan dwhenawordendediftherewerenopunctuationandnospacesyoucandoitbecaus ethereareseveraldifferentcharactersanditisnotincodewhatifthiswerecodedas zerosandonesthenyouwouldhaverealproblems. As you can see, synchronization of data is very important. Clocking is somewhat like timing in music. There are a specific number of beats expected per bar. When computer devices are synchronized, a specific number of signals or beats are expected within a set amount of time. Timing is important because it helps you be prepared. In many schools, every 50 minutes, a new class period starts. Students watch the clock and expect a signal. Usually, they are already prepared to leave the classroom. That is because they expected the signal. Synchronous transmission requires the communicating devices to maintain synchronous clocks during the entire connection. The sending device transmits on a specific schedule and the receiving device accepts the data on that same fixed schedule. The receiving device knows the timing of the sending device because the timing information is embedded within the preamble of the frame. Synchronous transmissions are common in internal computer communications and usually are sent as entire frames. Synchronous transmission is common when large blocks of data are transferred, since it is efficient and has a low overhead (number of bytes of data/control + data bytes). Asynchronous data transmission does not involve synchronizing the clocks of the sending and receiving devices. Instead, start and stop bits are used for synchronization of data signals. The start and stop bits tell the ST A 147

6 Lesson 2-2: Data Transmission receiving device how to interpret the data. Asynchronous sends one character at a time. Data transmission may be half-duplex; meaning data is transferred in only one direction at a time. An example of half-duplex is a CB radio where only one person can talk at a time. Or, transmission may be full duplex, transmitted in two directions simultaneously. A telephone conversation illustrates full-duplex communication. Check Your Understanding Why do the variations in data transmission signals need to be synchronized? Explain how the two binary numbers, 0s and 1s, are used to interpret data. Distinguish between connectionless and connection-oriented data transmissions. Give an example of when you think a connectionoriented transmission might be useful. Analog Signals Analog signals, which are electromagnetic waves, are continuous and look like a copy of the original sound wave. Transmission of data is accomplished by varying one or more the waves properties. Analog Signal Analog All waves have three characteristics, amplitude (strength), frequency, and phase. Variations, called modulations, in wave characteristics are used to encode analog signals to digital signals. Amplitude-Shift Keying (variations in strength) and Frequency-Shift Keying are two examples. 148 ST A Internetworking Fundamentals

7 Unit 2: LAN Configurations Amplitude-Shift Keying uses a change of the voltages for interpretation. When there is a voltage change from high to low, the binary digit represented changes. If high voltage were 1 then low voltage would be 0. Amplitude-Shift Keying ASK Frequency-Shift Keying uses the frequency of the waves for interpretation. When there is a frequency change from high to low, the binary digit changes. If high frequency were 1 then low frequency would be 0. ST A 149

8 Lesson 2-2: Data Transmission Frequency-Shift Keying FSK Digital Signals With digital signaling, either there is or there isn t a signal. There are various encoding schemes that use the on off signal to represent data Digital Depending upon the type of network, different digital encoding schemes are used. For example, Ethernet and Token Ring LANs do not use the same encoding scheme. For computer devices to interpret the data correctly, both the transmitter and receiver must agree on the encoding scheme in order to determine data elements and their values. When new technologies are invented, new encoding protocols often need to be established. Check Your Understanding What are the three characteristics of waves that are used when transmitting data? Why will new technologies need new encoding schemes? 150 ST A Internetworking Fundamentals

9 Unit 2: LAN Configurations Data Transmission and the OSI Model When transmitting data over networks, conforming to the OSI model is important. As discussed in the previous lesson, data travels vertically through the seven OSI layers. Data is encapsulated at each layer of the transmitting device from top to bottom and stripped at the receiving device in the reverse direction. The protocols of the OSI model are used to organize the data into packets, with headers and trailers. OSI Model Original Data with Headers and Trailers Data Application Layer H p Data Presentation Layer H s Data Session Layer Ht Data Transport Layer Hn Data Network Layer Hd Data T Data Link Layer Data T Physical Layer OSI communication is as follows: Each layer communicates with layers both immediately above and below it. Each layer from the sending (source) station also communicates with its peer layer at the receiving (destination) computer. Data starts at the application layer of the source device and descends through the remaining layers before being transmitted to the destination device. As each layer receives the data from the layer above, it adds, in the form of headers, its data. This data contains various protocols that enable communication. The original data, with the new header and the headers from the previous layers, is then sent to the next layer down. When the data reaches the Physical Layer, it is transmitted across various media to the destination device. ST A 151

10 Lesson 2-2: Data Transmission The destination device receives the entire frame and sends it up through the layers, one after the other in sequence. Each layer strips the header added by its peer layer at the source device. Ethernet packets can contain approximately 1,000 bytes. If the data being transmitted is larger than 1,000 bytes then the computer breaks it down into packets. Each packet is transmitted and received separately. Packets are sequentially numbered. This allows the receiving computer to recreate the data in the correct order. Depending upon the protocols used, packet size can change. Transmission of Data through the OSI Layers Data transfer begins at the application layer of the source device and each OSI layer adds header and/or trailer information to help ensure efficient, error free transfer of data. The destination device receives the data and the data is transferred up through the layers. Each strips the information added by its peer layer and moves the remaining data to the next layer. Eventually, the data is returned to its original form at the application layer. Application Layer Data The application layer serves as an interface between user applications and network services, such as electronic mail. Data input by the user is then sent to the next layer, the presentation layer. Presentation Layer H p Data Header information is added by presentation layer protocols. This layer is responsible for translation, encryption, and compression of data. If necessary, it is this layer that translates local data, such as ASCII and EBCDIC. 152 ST A Internetworking Fundamentals

11 Unit 2: LAN Configurations Session Layer H s H p Data At the session layer, checkpoints are built in to ensure successful data transmission. If transmissions are proceeding smoothly, they continue. If not, retransmission of data takes place. This layer provides the user interface, in the form of passwords and logins, which allow network access. Transport Layer H t H s H p Data The transport layer provides for message segmentation and ensures errorfree delivery, without loss or duplication. Network Layer H n H t H s H p Data At the network layer, header information identifies the logical source and destination addresses of the network. The logical network differs from the physical MAC address. The logical address assists with the routing of data from network to network. Factors affecting routing decisions include cost, speed, network conditions, and priorities. Data Link Layer H d H n H t H s H p Data T Frames are built at the data link layer. The headers and trailers added at this layer control error handling and synchronization over the local segment. This is where the physical address of the destination and the source address of the sender are added. ST A 153

12 Lesson 2-2: Data Transmission Physical Layer The physical layer of the OSI controls the electrical aspects of data transfer, such as voltage levels, signal timing, and encoding. Physical Layer Frame with Preamble, Headers, and Trailers Data Link Header Transport Header Presentation Header H d H n H t H s H p Data T Physical Preamble Header Network Header Session Header Trailer Although real network applications don t always incorporate protocols from every layer, or sometimes combine the functions of two layers, it is important to understand how the OSI model is used as a framework for the protocols used when transmitting data. Transmission of data packets occurs in both directions. Peer layers communicate back and forth when a data packet is being sent. What is actually taking place is a checking sequence. For example, does the address match, is there any congestion, which is the best route, are the destination and source devices synchronized, is it time to terminate the connection? All of this takes place in a fraction of a second. 154 ST A Internetworking Fundamentals

13 Unit 2: LAN Configurations Check Your Understanding What is the difference between half-duplex and full duplex transmission? How is sending a registered letter through the mail similar to sending data over a network? ST A 155

14 Lesson 2-2: Data Transmission Try It Out Converting Binary and Hexadecimal to Decimal Numerals Computers are electrical devices. Electrical pulses can be turned on or off. Binary digits 0 and 1 can be used to represent on and off pulses. Computers use these 0s and 1s to represent data, which they then interpret using various codes. In computer language, each 0 or 1 is considered a bit and eight bits are equal to an octet (byte). One octet generally represents one character of data. We use and understand a base-10 numbering system in everyday life. Base-10 uses the digits 0-9. In order to understand how computers transmit data, it is necessary to understand two additional numbering systems, base-2 and base-16. Two digits, 0 and 1, are used for base-2 numbering and 10 digits plus 6 characters from our alphabet are used for base-16 numbering. ASCII code uses the base-2, or binary, numbering system and hexadecimal code, uses the base-16, or hex, numbering system. In hexadecimal numbering, there are 16 symbols for the decimal numbers The numbers 0 to 9 represent the decimal numerals 0 to 9. The decimal numbers 10 to 15 are represented by the alphabetic characters A to F, e.g., A=10, B=11, C=12, D=13, E=14, F=15. Hexadecimal numbers can be used to represent 8 bits as two hexadecimal digits. MAC addresses, which you will learn about later in this course, use hex numbers for address identification. Materials Needed None In this activity, you will attempt to convert decimal, binary, and hexadecimal numbers. Use the data from the following tables to help with conversions. 156 ST A Internetworking Fundamentals

15 Unit 2: LAN Configurations Number Equivalents Decimal Binary Hexadecimal A B C D E F When numbering, we give each digit column a name or positional value. We do this for convenience when reading numbers. The column value is determined by raising the base (decimal, binary, or hexadecimal) to a power as shown in the charts below. ST A 157

16 Lesson 2-2: Data Transmission When using a base-10 number such as 34,752, each of the numbers has a decimal positional value based on the powers of is in the 1s position, 5 in the 10s position, 7 in the 100s position, 4 in the 1,000 position, and 3 in the 10,000 position. Decimal (Base 10) Positional (Column) Values 10 0 = 1s column/position 10 1 = 10s column/position 10 2 = 100s column/position 10 3 = 1,000s column/position 10 4 = 10,000s column/position Or: 3 4, Ones position Tens position Hundreds position Thousands position Binary (Base 2) Positional (Column) Values Ten thousands position When you use a base-2 number such as , each of the numbers has a decimal positional value based on the powers of 2. Starting from the right, 1 is in the 1s position, 0 in the 2s position, 0 in the 4s position, 1 in the 8s position, and 1 in the 16s position, 0 in the 32s position, 1 in the 64s position, and 1 in the 128s position. 2 0 = 1s column 2 1 = 2s column 2 2 = 4s column 2 3 = 8s column 2 4 = 16s column 2 8 = 32s column 2 16 = 64s column = 128s column 158 ST A Internetworking Fundamentals

17 Unit 2: LAN Configurations Or, s 2s 4s 8s 16s 32s 64s 128s Hexadecimal (Base 16) Positional (Column) Values When you use a base-16 number such as B620A each of the numbers has a decimal positional value based on the powers of 16. Starting from the right, A is in the 1s position, 0 in the 16s position, 2 in the 256s position, 6 in the 4,096 position, and B in the 65,536s position = 1s column/position 16 1 = 16s column/position 16 2 = 256s column/position 16 3 = 4,096s column/position 16 4 = 65,536s column/position Or, B A Ones position Sixteens position Two hundred fifty-sixes position Four thousand ninety-sixes position Sixty-five thousands, five hundred thirty-sixes position ST A 159

18 Lesson 2-2: Data Transmission Converting a Binary Number to a Decimal Number Example: Convert the Binary number to a decimal number. 1. To change from a binary number to a decimal number you must first determine the binary digit s positional value, see chart on previous page. Start at the right: 0=1, 0=2, 1=4, 1=8, 0=16, and 1=32. Binary Digit Value Positional Value Multiply the binary digit value and the positional value for each digit. 0x1=0, 0x2=0, 1x4=4, 1x8=8, 1x32=32. Binary Digit Value Positional Value Product of Binary Digit and Positional Values Add the products together: = The sum of the products of the binary digit and positional values is equal to the decimal number. Binary number is equal to a decimal value of ST A Internetworking Fundamentals

19 Unit 2: LAN Configurations Convert the following binary numbers to decimals. Follow the steps above. Show your work. a b c d e Converting a Hexadecimal Number to a Decimal Number Example: Convert the hex number 5B6A to a decimal number. 1. To change from a hexadecimal number to a decimal number you must first change the hex value to a decimal value. Look on the number equivalents chart and change the hex digits to decimal digits. 5 = 5; B= 11; 6 = 6; A = 10. Hexadecimal Value Decimal Value 5 5 B A 10 ST A 161

20 Lesson 2-2: Data Transmission 2. Determine the positional value for each hex digit (see Positional Value Tables): 5 is in the fourth position so the positional value is 4,096. B is in the third position so the positional value is 256; 6 is in the second position so the positional value is 16; and A is in the first position so the positional value is 1. Hexadecimal Value Decimal Value Hex Positional Value 5 5 4,096 B A Multiply the decimal value and the positional value for each hexadecimal. 5 x 4,096 = 20,480; 11 x 256 = 2,816; 6 x 16 = 96; 10 x 1 = 10. Hexadecimal Value Decimal Value Hex Positional Value Product of Decimal and Hex Positional Values 5 5 4,096 20,480 B , A Step 4: Add the products together. 20, , = 23,402. Hexadecimal Value Decimal Value Hex Positional Value Product of Decimal and Hex Positional Values 5 5 4,096 20,480 B , A Step 5: The sum of the products of the decimal and hex positional values is equal to the decimal number. Hexadecimal number 5B6A = decimal number 23, ST A Internetworking Fundamentals

21 Unit 2: LAN Configurations Try the following hexadecimal numbers to decimal numbers. Follow the steps listed above. Show your work. a. 237AF b. 57 c. 392 d. FFF e. BB41A Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Accurate conversions 40 All work shown 60 TOTAL 100 ST A 163

22 Lesson 2-2: Data Transmission Stretch Yourself: Launching Sniffer Basic Capturing Packets Sniffer Basic is software used by information services technicians to help analyze networks and locate problems. In this activity, data packets will be captured and stored. If Sniffer Basic is not installed on your computer, see your instructor. Be sure you are connected to a network when completing this activity. Materials Needed Basic Sniffer Software (NetXRay) Network Connection Internet Connection (optional) 1. Double-click the Sniffer Basic desktop icon, or select it from the Start menu/programs list. If you have more than one NIC adapter, a screen similar to the one below will be displayed and you will be prompted to choose an adapter to monitor. 164 ST A Internetworking Fundamentals

23 Unit 2: LAN Configurations 2. From the toolbar, select Help Topics. A screen similar to the following will appear. Should you have any problems when you use Sniffer Basic, the help menu is very useful. ST A 165

24 Lesson 2-2: Data Transmission 3. Close the Help window. 4. On the Capture menu, click Start. In the Profile box, select default and click to start capture. 5. You should see a screen similar to the following: Is the packet capture gauge incrementing? 6. Spend some time exploring this software. You will be using it throughout the course. 7. In the Capture Panel window, click to stop capture. Then click. 8. In the View window, you will notice three separate windows: The top window lists the packets that were captured. The middle window lists all packet specific information in a verbal description. The bottom window displays the actual packet data in hexadecimal. 9. Print each of these screens and save. 166 ST A Internetworking Fundamentals

25 Unit 2: LAN Configurations Generating Traffic 1. Keep Sniffer Basic in capture mode. You are going to generate some traffic over your network. 2. From your desktop, double-click the Network Neighborhood icon: You will recognize a list of the computers in your network (if not, notify your instructor). 3. Double-click one of the names. What workstation s node name did you choose? 4. Copy a file from your local PC to the computer you chose in step Now verify the file copy was successful. How did you do this? Viewing Captured Data Return to the Sniffer Basic application. 10. In the Capture Panel window, click to stop capture. Then click. 11. In the View window, you will notice three separate windows: The top window lists the packets that were captured. The middle window lists all packet specific information in verbal description. The bottom window displays the actual packet data in hexadecimal. 12. Print each of these screens and save. 13. In the top window, select a row that has NetBIOS in the Layer column. 14. Scroll down through the information in the middle window and look for workstation node names. Find the one that you copied your file to. ST A 167

26 Lesson 2-2: Data Transmission 15. Scroll to the top of the middle window to the address field. There are two MAC addresses, the one on the left is the source address, and the one on the right is the destination address. What is the node name in the packet you are viewing? What are the source and destination MAC addresses? What do you think the source and destination addresses are for? What data link protocol is being used? Protocol Distribution 1. Close the packet capture window and do not save the data. 2. From the toolbar, click Tools, then Protocol Distribution button. 3. After a few seconds, you should see several different protocols being displayed. Which protocol do you see? Which protocol generated the most traffic? 4. Go back and copy that file back from the computer you copied it to. Notice how the chart changes. 5. If you are connected to the Internet, use your browser and hit several web sites. Again notice the changes on the chart. Describe changes you noticed. Why do you think there are so many changes? 168 ST A Internetworking Fundamentals

27 Unit 2: LAN Configurations Host Table 7. From the toolbar, select Tools then click the Host Table button. This displays, in pie chart fashion, the busiest nodes on the network. 8. From the toolbar on the left of this window, you can change the display to a bar chart, outline, or detail view. How many hardware addresses are listed? Which nodes do they represent? How can you find out which nodes are represented by each hardware address? The data represented by the Host Table is from which layer of the OSI model? Summary In this lab, you launched Sniffer Basic and captured network traffic to view packets, determine the type of protocols used, and the amount of traffic generated in your network. Save the printed data from the three windows and place them in your portfolio. How do you think a network administrator uses this information to assist him/her with the job of managing and planning network expansions? Write a short essay on this topic and submit it to your teacher. ST A 169

28 Lesson 2-2: Data Transmission Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Essay on how a network administrator would use information gathered from Sniffer Basic software. 40 Directions followed, data recorded as specified, and questions answered completely and accurately. Printed materials placed in portfolio 10 Participation and active engagement 15 TOTAL ST A Internetworking Fundamentals

29 Unit 2: LAN Configurations Network Wizards Code Research Select one of the following topics to research. Materials Needed Internet Connection ASCII code from another source 1. Search the Internet for the code for interpreting ASCII. 2. Using ASCII code, write the following sentence: Hello, how are you? Look at the length of the code. Search the Internet to determine how much time it takes for a byte of information to be sent over a network. How long would it take to send this message? Calculate how many bytes are in your name. How long would it take for your name to be sent over the network? Can you see why computers need to break data into packets? Explain why this is the case. Prepare a one-page summary of your findings. Present your findings to the class. Create a visual display for your presentation. 3. Baudot, ASCII, and EBCDIC are three codes used for the transmission of data. Research these codes and their history. Prepare a one-page summary of your findings. Present your findings to the class. Create a visual display for your presentation. Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score On time delivery of assignment 10 Content and quality of one-page summary 25 Content and quality of class presentation 25 Creativity, originality, and quality of visual aid 25 Organization, spelling, and grammar 15 TOTAL 100 ST A 171

30 Lesson 2-2: Data Transmission Summary In this lesson, you learned the following: Technical definitions associated with data signaling and transmission. The characteristics of digital signaling, analog signaling. What packets and frames are, how they are structured, and their relationship to the OSI model. How to convert binary and hexadecimal digits to decimal digits. How to use Sniffer Basic software to capture and analyze packets. Review Questions Name Lesson 2-2: Data Transmission Part A 1. Describe analog signals. How are they used to transmit data? 2. Describe digital signals. 3. Describe synchronous data transmission. 4. Describe asynchronous data transmission. 5. What is the difference between half-duplex and full duplex transmissions? 172 ST A Internetworking Fundamentals

31 Unit 2: LAN Configurations 6. There is a timing process that signals the beginning and ending of data so it can be correctly measured. This process is called what? a. Digital signaling b. Analog signaling c. Bit synchronization d. Asynchronous e. Synchronous 7. Which type of signaling scheme represents data sent as discrete signals? a. Digital signaling b. Analog signaling c. Asynchronous d. Synchronous 8. Which type of signaling scheme represents continuously changing data? a. Digital signaling b. Analog signaling c. Asynchronous d. Synchronous 9. Which type of bit synchronization transmission requires both a start bit and a stop bit for clocking purposes? a. Digital signaling b. Analog signaling c. Asynchronous d. Synchronous ST A 173

32 Lesson 2-2: Data Transmission 10. Group of bits, including data and control signals, arranged in a specific format and transmitted as a whole, are called what? a. Clocking b. Sequencing c. Synchronization d. Packets Part B 1. Describe the difference between analog and digital signaling waves/pulses. 2. What is binary notation and how is it used to transfer data signals over network media? 3. List three characteristics of waves that are used to encode data. Part C 1. Use the OSI model as your reference and explain how data packets are structured. Give several examples of information that may be contained within headers. Draw a diagram showing packet addition at each layer. 174 ST A Internetworking Fundamentals

33 Unit 2: LAN Configurations Scoring Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Part A: Technical definitions associated with data signaling and transmission. 30 Part B: Describe the characteristics of digital signaling, analog signaling. Part C: What packets and frames are, how they are structured, and their relationship to the OSI model. TOTAL 100 Try It Out: How to convert binary and hexadecimal digits to decimal digits. Stretch Yourself: How to use Sniffer Basic software to capture and analyze packets Network Wizards 100 FINAL TOTAL 400 Resources Aschermann, Robert (1998). MCSE Networking Essentials for Dummies. IDG Books Worldwide, Inc. Forest City, California. Baker, R. (1996). Data Communications Home Page. Available: [1999, May 13]. Bert Glen (1998). MCSE Networking Essentials: Next Generation Training Second Edition. New Riders Publishing. Indianapolis Indiana. Chellis, James; Perkins, Charles; & Strebe Matthew (1997). MCSE Networking Essentials Study Guide. Sybex Inc. Alameda California CMP Media, Inc. (1999). FDDI fundamentals. In Data Communications Tech Tutorials [Online]. Available: [1999, April 20]. Computer and Information Science, Ohio State University (No date). Data Communications Cabling FAQ. [Online].Available: [1999, May 13]. ST A 175

34 Lesson 2-2: Data Transmission Derfler, Jr., Frank J., & Freed, L. (1998). How Networks Work, Fourth Edition. Macmillan Computer Publishing/Que Corporation. Indianapolis, Indiana. Hayden, Matt. (1998). Sam's Teach Yourself Networking in 24 Hours. Sam's Publishing, Indianapolis, Indiana. Microsoft Corporation (1998). Dictionary of Computer Terms, Microsoft Press, Redmond, Washington. Nortel Networks (1998). Internetworking Fundamentals: Student Guide. Bay Networks Inc. Billerica, Massachusetts. Palmer, Michael J. (1998) Hands-On Networking Essentials with Projects, Course Technology, Inc. Cambridge, Massachusetts. 176 ST A Internetworking Fundamentals

Lesson 2-3: Ethernet Basics

Lesson 2-3: Ethernet Basics Unit 2: LAN Configurations Lesson 2-3: Ethernet Basics At a Glance Ethernet LAN topology is currently the most common network architecture. Ethernet topologies are generally bus and/or bus-star topologies.

More information

This unit contains the following four lessons:

This unit contains the following four lessons: Unit 1 Internetworking Overview Overview Description This unit contains four lessons. The first lesson covers the types of basic networks, including LANs, WANs, MANs, Backbone, and Enterprise networks.

More information

Lesson 5-2: Network Maintenance and Management

Lesson 5-2: Network Maintenance and Management Unit 5: Network Operating Systems Lesson 5-2: Network Maintenance and Management At a Glance This lesson presents an overview of network planning and management tasks. It also discusses hardware and software

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

This unit contains the following two lessons:

This unit contains the following two lessons: Unit 5 Networking Operating Systems Overview Description This unit contains two lessons. The first lesson describes the characteristics of the four major Internetworking Systems, including Windows NT Server,

More information

The OSI Model and the TCP/IP Protocol Suite

The OSI Model and the TCP/IP Protocol Suite The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer

More information

Lesson 1-4: Structured Cabling Systems

Lesson 1-4: Structured Cabling Systems Unit 1: Internetworking Overview Lesson 1-4: Structured Cabling Systems At a Glance This lesson describes both physical and logical organization of networks. Topologies described include bus, ring, star,

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,

More information

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons: Unit 6 Router Management Overview Description With today s networks growing exponentially, management is a key to quality of network performance. People depend on their networks and performance issues

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

DATA COMMUNICATION (Basics of data communication, OSI layers.)

DATA COMMUNICATION (Basics of data communication, OSI layers.) DATA COMMUNICATION (Basics of data communication, OSI layers.) K.K.DHUPAR SDE (NP-II) ALTTC ALTTC/NP/KKD/Data Communication 1 Data Communications History 1838: Samuel Morse & Alfred Veil Invent Morse Code

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents Unit 4 Introduction to TCP/IP Overview Description This unit contains one lesson: This lesson will introduce protocols in general. You will look at how a protocol functions, the differences between a routable

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

This unit contains the following two lessons: Lessons Pages Length Lesson 3-1: Network Layer Addressing 98-136 5 hours

This unit contains the following two lessons: Lessons Pages Length Lesson 3-1: Network Layer Addressing 98-136 5 hours Unit 3 Let s Route Overview Description This unit contains two lessons: The first lesson introduces the format for addressing data that travels across the Internet. The lesson focuses on the underlying

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

5 Data Communication and Networking

5 Data Communication and Networking 5 Data Communication and Networking 5.1 Introduction Today computer is available in many offices and homes and therefore there is a need to share data and programs among various computers. With the advancement

More information

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively

More information

Module 1: Reviewing the Suite of TCP/IP Protocols

Module 1: Reviewing the Suite of TCP/IP Protocols Module 1: Reviewing the Suite of TCP/IP Protocols Contents Overview 1 Lesson: Overview of the OSI Model 2 Lesson: Overview of the TCP/IP Protocol Suite 7 Lesson: Viewing Frames Using Network Monitor 14

More information

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program. Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP

More information

Lab 7.1.9b Introduction to Fluke Protocol Inspector

Lab 7.1.9b Introduction to Fluke Protocol Inspector Lab 7.1.9b Introduction to Fluke Protocol Inspector DCE SanJose1 S0/0 S0/0 SanJose2 #1 #2 Objective This lab is a tutorial demonstrating how to use the Fluke Networks Protocol Inspector to analyze network

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Configuration. Windows 98 and Me Configuration

Configuration. Windows 98 and Me Configuration Configuration Windows 98 and Me Configuration Installing the TCP/IP Protocol Windows 2000 Configuration Windows XP Configuration Wireless Configuration 128-Bit Encryption Wireless Security in Windows XP

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

File Sharing. Peter Lo. CP582 Peter Lo 2003 1

File Sharing. Peter Lo. CP582 Peter Lo 2003 1 File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring

More information

A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual

A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual 802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

Chapter 1. Introduction and Historical Background of Computer Networks. 1.1 Scope of Computer Networks

Chapter 1. Introduction and Historical Background of Computer Networks. 1.1 Scope of Computer Networks Chapter 1 Introduction and Historical Background of Computer Networks 1.1 Scope of Computer Networks Perhaps the most significant change in computer science over the past twenty years has been the enormous

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

524 Computer Networks

524 Computer Networks 524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

ProSAFE 8-Port and 16-Port Gigabit Click Switch

ProSAFE 8-Port and 16-Port Gigabit Click Switch ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

LAN Performance Measurements Lab

LAN Performance Measurements Lab LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for

More information

VPN Access to the NTEN Network

VPN Access to the NTEN Network VPN Access to the NTEN Network 2004 Networking and Telecommunications Engineering By: Leif Thordarson Virtual Private Network Documentation Page ii TABLE OF CONTENTS List of Illustrations and Tables...

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.

More information

The Journey Inside SM : The Internet Background Information, Part 1

The Journey Inside SM : The Internet Background Information, Part 1 SM : The Internet Background Information, Part 1 Growth of the Internet It is almost impossible to make it through a day without hearing a reference to the Internet. The Internet began in 1969 as the ARPANET

More information

Data Communication Networks

Data Communication Networks Data Communication Networks Data communication networks typically do not send real time data As a result, packet switching is often used OPTI 500, Spring 2011, Lecture 6, Data Networks 1 Packet Switching

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate? Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM

More information

Preparing the Computers for TCP/IP Networking

Preparing the Computers for TCP/IP Networking Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or

More information

Computer Networks III

Computer Networks III Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router

More information

Avaya Wireless AP Device Manager User Guide

Avaya Wireless AP Device Manager User Guide Avaya Wireless AP Device Manager User Guide February 2003 Avaya Wireless AP Device Manager User Guide Copyright Avaya Inc. 2003 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

CCNA Tutorial Series SUBNETTING

CCNA Tutorial Series SUBNETTING CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations : SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Computer Network and Communication

Computer Network and Communication 2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Chapter 2 Wireless Settings and Security

Chapter 2 Wireless Settings and Security Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless

More information

Network Security: Workshop

Network Security: Workshop Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

Modern snoop lab lite version

Modern snoop lab lite version Modern snoop lab lite version Lab assignment in Computer Networking OpenIPLab Department of Information Technology, Uppsala University Overview This is a lab constructed as part of the OpenIPLab project.

More information

Configuring Your Network s Security

Configuring Your Network s Security Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT

More information

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Workstation ARP. Objective. Background / Preparation

Workstation ARP. Objective. Background / Preparation Workstation ARP Objective Introduce Address Resolution Protocol (ARP) and the arp a workstation command. Explore the arp command help feature using the -? option. Background / Preparation ARP is used as

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Level 1 Technical. Networking and Technology Basics. Contents

Level 1 Technical. Networking and Technology Basics. Contents Level 1 Technical Networking and Technology Basics Contents 1 Glossary... 2 2 IP Networking Basics... 4 Fundamentals... 4 IP Addresses... 4 Subnet Masks... 5 Network Communication... 6 Transport Protocols...

More information

Digital Voice Services User Guide

Digital Voice Services User Guide Digital Voice Services User Guide * Feature Access Codes *72 Call Forwarding Always Activation *73 Call Forwarding Always Deactivation *90 Call Forwarding Busy Activation *91 Call Forwarding Busy Deactivation

More information

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp

Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should

More information

10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING

10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING 10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING PROJECTS Project 10.1 Project 10.2 Project 10.3 Project 10.4 Project 10.5 Project 10.6 Understanding Key Concepts Understanding Wireless Technologies Setting

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

plc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums

plc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums plc numbers - 3. Topics: Number bases; binary, octal, decimal, hexadecimal Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;

More information