Lesson 2-2: Data Transmission
|
|
- Winifred Farmer
- 7 years ago
- Views:
Transcription
1 Unit 2: LAN Configurations Lesson 2-2: Data Transmission At a Glance In this lesson, the process of transmitting data is examined. Computers encode and transmit data, voice, and video over networks via various transmission media. Encoding is the process of transforming information into digital and analog signals. This lesson covers the basics of how data is encoded, decoded, and transmitted. Data packet structure and its relationship to the OSI layers is also covered. What You Will learn After completing this lesson, you will be able to: Define technical terms associated with data signaling and transmission. Describe the characteristics of digital and analog signaling. Explain how packets and frames are structured, and describe their relationship to the OSI model. Convert binary and hexadecimal digits to decimal digits. Use Sniffer Basic software to capture and analyze packets. ST A 143
2 Lesson 2-2: Data Transmission Tech Talk Amplitude Characteristic of a wave measuring wave height from the base to the peak of a waveform. Indicates the strength of the signal. Analog Signal Analog signals change continuously as opposed to digital signals, which are discretely valued. For example, sound is an analog signal; it is continuous and varies in strength. ASCII Code American Standard Code for Information Interchange. A 7-bit coding scheme that assigns unique numeric values to letters, numbers, punctuation, and control characters. Baudot Code A 5-bit coding scheme used for transmitting data. Binary Numbers A number system based on two states, 0 and 1. Computers use combinations of binary numbers to represent and encode all kinds of data including words, sounds, colors, and pictures. Connection-Oriented Communication A form of network communication, where the transmitting device must establish a connection with the receiving device before data can be transmitted, (for example, telephone). In connection-oriented communication, the receiving device acknowledges receipt of the data. Connectionless Communication A form of communication over networks where the transmitting device can send a message without establishing a connection with the receiving device (for example, radio). Signals are sent, but there is no mechanism for acknowledging receipt. Digital Signal Data transmitted in discrete states, for example, on and off. These discrete states can be represented by binary numbers, and vice versa. Full-Duplex Two-way, simultaneous data transmission. Each device has a separate communication channel. EBCDIC Code Extended Binary Coded Decimal Interchange Code. An 8-bit coding scheme used by IBM for data representation in mainframe environments. Logical Address An OSI model Layer 3 address. Frame Basic unit of data transfer at OSI Layer 2. Half- Duplex Two-way data transmission that is not simultaneous. Only one device can communicate at a time. Packet Basic unit of data transfer at OSI Layer 3. Physical Address A OSI model Layer 2 address. 144 ST A Internetworking Fundamentals
3 Unit 2: LAN Configurations Data Transmission Data is transmitted over networks using signals, which are transformed, or encoded, by computers into the voice, video, graphics, and/or the print we see on our computer screens. The signals used by computers to transmit data are either digital or analog. Analog signals are continuous signals that vary in strength. Sound is an example of an analog signal. Sound is actually a wave and is quite similar, or analogous, to electromagnetic waves, hence the name analog. Telephones have transmitters that encode sound waves into electromagnetic waves, which then travel over wires toward their destination. The receiving telephone decodes the electromagnetic waves back into sound waves. Our brains then decode the sound waves into the words we hear. Computer modems use the same principle. Analog signals can be represented digitally. For instance, a high electromagnetic voltage could be interpreted as 1 and low voltage as 0. Telephone Encoding/Decoding Source Encode Cable Decode Destination Digital signals are discrete rather than continuous. Either there is a signal or there isn't a signal. Telegraphs transmit data with discrete signals. You either hear a tap or you do not hear a tap. Discrete signals can be represented by on and off pulses. The duration of a discrete signal can be varied, as with dots and dashes in Morse Code. Telegraph Encoding/Decoding Source Encode Cable Decode Destination ST A 145
4 Lesson 2-2: Data Transmission Discrete signals can also be represented digitally. The presence of a signal could be coded as a 1 and the absence of a signal coded as a 0. The digits 0 and 1 are used because computer circuitry is based on binary digital data. Codes are used to group a set number of bits together and have a group of bits represent a letter, number, or other character. The computer s brain, the central processing unit (CPU), transforms these codes of 0s and 1s into the voice, video and data we see. One coding scheme, ASCII, codes an a as the binary number Digital data is based on two states, on or off. The binary numbering system uses only two digits, 0 and 1, so it makes sense to use the binary numbering system. One digit, 0 represents off, the other digit represents on. A single 0 or 1 is called a bit. One byte is equal to eight bits (also called an octet when discussing TCP/IP). In ASCII code, one octet is the equivalent of one alphabetic or numeric character. In order to appreciate how computers communicate over networks, it is necessary to be aware of how they encode information. Connection-Oriented and Connectionless Transmissions Data transmission may be: Connection-oriented Connectionless The main difference between the two is that with a connection-oriented transmission, the destination device acknowledges receipt. Whereas, with connectionless, there is no acknolwedgement. In connection-oriented transmissions, the sending (source) device establishes a connection with the receiving (destination) device. The connection is continued until all data packets have been transmitted and the source device receives notification that the data was received by the destination device and has been checked for errors. A telephone conversation is an example of a connection-oriented transmission. When a call is made, data is transmitted across phone lines, the receiving party picks up the phone, and a conversation takes place. The individual making the call knows that it arrived at the correct destination and that it was understood. In a connectionless transmission, the source device transmits data but the connection is not maintained. The source device does not wait for notification that the destination device actually received the information accurately. This method is faster than connection-oriented, however less reliable since there is no notification of whether the data is received or not. It is more common to find connectionless transmissions on LANs. To understand a connectionless transmission, think of a radio broadcast: A radio disc jockey tells his/her friends to be sure to listen to her/his program 146 ST A Internetworking Fundamentals
5 Unit 2: LAN Configurations at 9:00 p.m. At that time the disk jockey broadcasts a message to them. Did they receive the message? Although it is quite likely, the disk jockey cannot be sure that they turned the radio on, listened, or understood the message. Synchronous and Asynchronous Transmission Computers need to know when to expect data and where a character begins and ends. When receiving data, timing on both computer devices must be coordinated if they are to work together efficiently. This coordination is called clocking, timing, or framing. There are two protocols for the timing or coordination of data signals: Synchronous Asynchronous When transferring data, both the transmitting and receiving nodes need to agree when the signal begins and ends so the signals can be correctly measured and interpreted. This timing process is called bit synchronization, framing, or clocking. Imaginehowdifficultitwouldbetoreadifyoudidnotknowwhenawordstartedan dwhenawordendediftherewerenopunctuationandnospacesyoucandoitbecaus ethereareseveraldifferentcharactersanditisnotincodewhatifthiswerecodedas zerosandonesthenyouwouldhaverealproblems. As you can see, synchronization of data is very important. Clocking is somewhat like timing in music. There are a specific number of beats expected per bar. When computer devices are synchronized, a specific number of signals or beats are expected within a set amount of time. Timing is important because it helps you be prepared. In many schools, every 50 minutes, a new class period starts. Students watch the clock and expect a signal. Usually, they are already prepared to leave the classroom. That is because they expected the signal. Synchronous transmission requires the communicating devices to maintain synchronous clocks during the entire connection. The sending device transmits on a specific schedule and the receiving device accepts the data on that same fixed schedule. The receiving device knows the timing of the sending device because the timing information is embedded within the preamble of the frame. Synchronous transmissions are common in internal computer communications and usually are sent as entire frames. Synchronous transmission is common when large blocks of data are transferred, since it is efficient and has a low overhead (number of bytes of data/control + data bytes). Asynchronous data transmission does not involve synchronizing the clocks of the sending and receiving devices. Instead, start and stop bits are used for synchronization of data signals. The start and stop bits tell the ST A 147
6 Lesson 2-2: Data Transmission receiving device how to interpret the data. Asynchronous sends one character at a time. Data transmission may be half-duplex; meaning data is transferred in only one direction at a time. An example of half-duplex is a CB radio where only one person can talk at a time. Or, transmission may be full duplex, transmitted in two directions simultaneously. A telephone conversation illustrates full-duplex communication. Check Your Understanding Why do the variations in data transmission signals need to be synchronized? Explain how the two binary numbers, 0s and 1s, are used to interpret data. Distinguish between connectionless and connection-oriented data transmissions. Give an example of when you think a connectionoriented transmission might be useful. Analog Signals Analog signals, which are electromagnetic waves, are continuous and look like a copy of the original sound wave. Transmission of data is accomplished by varying one or more the waves properties. Analog Signal Analog All waves have three characteristics, amplitude (strength), frequency, and phase. Variations, called modulations, in wave characteristics are used to encode analog signals to digital signals. Amplitude-Shift Keying (variations in strength) and Frequency-Shift Keying are two examples. 148 ST A Internetworking Fundamentals
7 Unit 2: LAN Configurations Amplitude-Shift Keying uses a change of the voltages for interpretation. When there is a voltage change from high to low, the binary digit represented changes. If high voltage were 1 then low voltage would be 0. Amplitude-Shift Keying ASK Frequency-Shift Keying uses the frequency of the waves for interpretation. When there is a frequency change from high to low, the binary digit changes. If high frequency were 1 then low frequency would be 0. ST A 149
8 Lesson 2-2: Data Transmission Frequency-Shift Keying FSK Digital Signals With digital signaling, either there is or there isn t a signal. There are various encoding schemes that use the on off signal to represent data Digital Depending upon the type of network, different digital encoding schemes are used. For example, Ethernet and Token Ring LANs do not use the same encoding scheme. For computer devices to interpret the data correctly, both the transmitter and receiver must agree on the encoding scheme in order to determine data elements and their values. When new technologies are invented, new encoding protocols often need to be established. Check Your Understanding What are the three characteristics of waves that are used when transmitting data? Why will new technologies need new encoding schemes? 150 ST A Internetworking Fundamentals
9 Unit 2: LAN Configurations Data Transmission and the OSI Model When transmitting data over networks, conforming to the OSI model is important. As discussed in the previous lesson, data travels vertically through the seven OSI layers. Data is encapsulated at each layer of the transmitting device from top to bottom and stripped at the receiving device in the reverse direction. The protocols of the OSI model are used to organize the data into packets, with headers and trailers. OSI Model Original Data with Headers and Trailers Data Application Layer H p Data Presentation Layer H s Data Session Layer Ht Data Transport Layer Hn Data Network Layer Hd Data T Data Link Layer Data T Physical Layer OSI communication is as follows: Each layer communicates with layers both immediately above and below it. Each layer from the sending (source) station also communicates with its peer layer at the receiving (destination) computer. Data starts at the application layer of the source device and descends through the remaining layers before being transmitted to the destination device. As each layer receives the data from the layer above, it adds, in the form of headers, its data. This data contains various protocols that enable communication. The original data, with the new header and the headers from the previous layers, is then sent to the next layer down. When the data reaches the Physical Layer, it is transmitted across various media to the destination device. ST A 151
10 Lesson 2-2: Data Transmission The destination device receives the entire frame and sends it up through the layers, one after the other in sequence. Each layer strips the header added by its peer layer at the source device. Ethernet packets can contain approximately 1,000 bytes. If the data being transmitted is larger than 1,000 bytes then the computer breaks it down into packets. Each packet is transmitted and received separately. Packets are sequentially numbered. This allows the receiving computer to recreate the data in the correct order. Depending upon the protocols used, packet size can change. Transmission of Data through the OSI Layers Data transfer begins at the application layer of the source device and each OSI layer adds header and/or trailer information to help ensure efficient, error free transfer of data. The destination device receives the data and the data is transferred up through the layers. Each strips the information added by its peer layer and moves the remaining data to the next layer. Eventually, the data is returned to its original form at the application layer. Application Layer Data The application layer serves as an interface between user applications and network services, such as electronic mail. Data input by the user is then sent to the next layer, the presentation layer. Presentation Layer H p Data Header information is added by presentation layer protocols. This layer is responsible for translation, encryption, and compression of data. If necessary, it is this layer that translates local data, such as ASCII and EBCDIC. 152 ST A Internetworking Fundamentals
11 Unit 2: LAN Configurations Session Layer H s H p Data At the session layer, checkpoints are built in to ensure successful data transmission. If transmissions are proceeding smoothly, they continue. If not, retransmission of data takes place. This layer provides the user interface, in the form of passwords and logins, which allow network access. Transport Layer H t H s H p Data The transport layer provides for message segmentation and ensures errorfree delivery, without loss or duplication. Network Layer H n H t H s H p Data At the network layer, header information identifies the logical source and destination addresses of the network. The logical network differs from the physical MAC address. The logical address assists with the routing of data from network to network. Factors affecting routing decisions include cost, speed, network conditions, and priorities. Data Link Layer H d H n H t H s H p Data T Frames are built at the data link layer. The headers and trailers added at this layer control error handling and synchronization over the local segment. This is where the physical address of the destination and the source address of the sender are added. ST A 153
12 Lesson 2-2: Data Transmission Physical Layer The physical layer of the OSI controls the electrical aspects of data transfer, such as voltage levels, signal timing, and encoding. Physical Layer Frame with Preamble, Headers, and Trailers Data Link Header Transport Header Presentation Header H d H n H t H s H p Data T Physical Preamble Header Network Header Session Header Trailer Although real network applications don t always incorporate protocols from every layer, or sometimes combine the functions of two layers, it is important to understand how the OSI model is used as a framework for the protocols used when transmitting data. Transmission of data packets occurs in both directions. Peer layers communicate back and forth when a data packet is being sent. What is actually taking place is a checking sequence. For example, does the address match, is there any congestion, which is the best route, are the destination and source devices synchronized, is it time to terminate the connection? All of this takes place in a fraction of a second. 154 ST A Internetworking Fundamentals
13 Unit 2: LAN Configurations Check Your Understanding What is the difference between half-duplex and full duplex transmission? How is sending a registered letter through the mail similar to sending data over a network? ST A 155
14 Lesson 2-2: Data Transmission Try It Out Converting Binary and Hexadecimal to Decimal Numerals Computers are electrical devices. Electrical pulses can be turned on or off. Binary digits 0 and 1 can be used to represent on and off pulses. Computers use these 0s and 1s to represent data, which they then interpret using various codes. In computer language, each 0 or 1 is considered a bit and eight bits are equal to an octet (byte). One octet generally represents one character of data. We use and understand a base-10 numbering system in everyday life. Base-10 uses the digits 0-9. In order to understand how computers transmit data, it is necessary to understand two additional numbering systems, base-2 and base-16. Two digits, 0 and 1, are used for base-2 numbering and 10 digits plus 6 characters from our alphabet are used for base-16 numbering. ASCII code uses the base-2, or binary, numbering system and hexadecimal code, uses the base-16, or hex, numbering system. In hexadecimal numbering, there are 16 symbols for the decimal numbers The numbers 0 to 9 represent the decimal numerals 0 to 9. The decimal numbers 10 to 15 are represented by the alphabetic characters A to F, e.g., A=10, B=11, C=12, D=13, E=14, F=15. Hexadecimal numbers can be used to represent 8 bits as two hexadecimal digits. MAC addresses, which you will learn about later in this course, use hex numbers for address identification. Materials Needed None In this activity, you will attempt to convert decimal, binary, and hexadecimal numbers. Use the data from the following tables to help with conversions. 156 ST A Internetworking Fundamentals
15 Unit 2: LAN Configurations Number Equivalents Decimal Binary Hexadecimal A B C D E F When numbering, we give each digit column a name or positional value. We do this for convenience when reading numbers. The column value is determined by raising the base (decimal, binary, or hexadecimal) to a power as shown in the charts below. ST A 157
16 Lesson 2-2: Data Transmission When using a base-10 number such as 34,752, each of the numbers has a decimal positional value based on the powers of is in the 1s position, 5 in the 10s position, 7 in the 100s position, 4 in the 1,000 position, and 3 in the 10,000 position. Decimal (Base 10) Positional (Column) Values 10 0 = 1s column/position 10 1 = 10s column/position 10 2 = 100s column/position 10 3 = 1,000s column/position 10 4 = 10,000s column/position Or: 3 4, Ones position Tens position Hundreds position Thousands position Binary (Base 2) Positional (Column) Values Ten thousands position When you use a base-2 number such as , each of the numbers has a decimal positional value based on the powers of 2. Starting from the right, 1 is in the 1s position, 0 in the 2s position, 0 in the 4s position, 1 in the 8s position, and 1 in the 16s position, 0 in the 32s position, 1 in the 64s position, and 1 in the 128s position. 2 0 = 1s column 2 1 = 2s column 2 2 = 4s column 2 3 = 8s column 2 4 = 16s column 2 8 = 32s column 2 16 = 64s column = 128s column 158 ST A Internetworking Fundamentals
17 Unit 2: LAN Configurations Or, s 2s 4s 8s 16s 32s 64s 128s Hexadecimal (Base 16) Positional (Column) Values When you use a base-16 number such as B620A each of the numbers has a decimal positional value based on the powers of 16. Starting from the right, A is in the 1s position, 0 in the 16s position, 2 in the 256s position, 6 in the 4,096 position, and B in the 65,536s position = 1s column/position 16 1 = 16s column/position 16 2 = 256s column/position 16 3 = 4,096s column/position 16 4 = 65,536s column/position Or, B A Ones position Sixteens position Two hundred fifty-sixes position Four thousand ninety-sixes position Sixty-five thousands, five hundred thirty-sixes position ST A 159
18 Lesson 2-2: Data Transmission Converting a Binary Number to a Decimal Number Example: Convert the Binary number to a decimal number. 1. To change from a binary number to a decimal number you must first determine the binary digit s positional value, see chart on previous page. Start at the right: 0=1, 0=2, 1=4, 1=8, 0=16, and 1=32. Binary Digit Value Positional Value Multiply the binary digit value and the positional value for each digit. 0x1=0, 0x2=0, 1x4=4, 1x8=8, 1x32=32. Binary Digit Value Positional Value Product of Binary Digit and Positional Values Add the products together: = The sum of the products of the binary digit and positional values is equal to the decimal number. Binary number is equal to a decimal value of ST A Internetworking Fundamentals
19 Unit 2: LAN Configurations Convert the following binary numbers to decimals. Follow the steps above. Show your work. a b c d e Converting a Hexadecimal Number to a Decimal Number Example: Convert the hex number 5B6A to a decimal number. 1. To change from a hexadecimal number to a decimal number you must first change the hex value to a decimal value. Look on the number equivalents chart and change the hex digits to decimal digits. 5 = 5; B= 11; 6 = 6; A = 10. Hexadecimal Value Decimal Value 5 5 B A 10 ST A 161
20 Lesson 2-2: Data Transmission 2. Determine the positional value for each hex digit (see Positional Value Tables): 5 is in the fourth position so the positional value is 4,096. B is in the third position so the positional value is 256; 6 is in the second position so the positional value is 16; and A is in the first position so the positional value is 1. Hexadecimal Value Decimal Value Hex Positional Value 5 5 4,096 B A Multiply the decimal value and the positional value for each hexadecimal. 5 x 4,096 = 20,480; 11 x 256 = 2,816; 6 x 16 = 96; 10 x 1 = 10. Hexadecimal Value Decimal Value Hex Positional Value Product of Decimal and Hex Positional Values 5 5 4,096 20,480 B , A Step 4: Add the products together. 20, , = 23,402. Hexadecimal Value Decimal Value Hex Positional Value Product of Decimal and Hex Positional Values 5 5 4,096 20,480 B , A Step 5: The sum of the products of the decimal and hex positional values is equal to the decimal number. Hexadecimal number 5B6A = decimal number 23, ST A Internetworking Fundamentals
21 Unit 2: LAN Configurations Try the following hexadecimal numbers to decimal numbers. Follow the steps listed above. Show your work. a. 237AF b. 57 c. 392 d. FFF e. BB41A Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Accurate conversions 40 All work shown 60 TOTAL 100 ST A 163
22 Lesson 2-2: Data Transmission Stretch Yourself: Launching Sniffer Basic Capturing Packets Sniffer Basic is software used by information services technicians to help analyze networks and locate problems. In this activity, data packets will be captured and stored. If Sniffer Basic is not installed on your computer, see your instructor. Be sure you are connected to a network when completing this activity. Materials Needed Basic Sniffer Software (NetXRay) Network Connection Internet Connection (optional) 1. Double-click the Sniffer Basic desktop icon, or select it from the Start menu/programs list. If you have more than one NIC adapter, a screen similar to the one below will be displayed and you will be prompted to choose an adapter to monitor. 164 ST A Internetworking Fundamentals
23 Unit 2: LAN Configurations 2. From the toolbar, select Help Topics. A screen similar to the following will appear. Should you have any problems when you use Sniffer Basic, the help menu is very useful. ST A 165
24 Lesson 2-2: Data Transmission 3. Close the Help window. 4. On the Capture menu, click Start. In the Profile box, select default and click to start capture. 5. You should see a screen similar to the following: Is the packet capture gauge incrementing? 6. Spend some time exploring this software. You will be using it throughout the course. 7. In the Capture Panel window, click to stop capture. Then click. 8. In the View window, you will notice three separate windows: The top window lists the packets that were captured. The middle window lists all packet specific information in a verbal description. The bottom window displays the actual packet data in hexadecimal. 9. Print each of these screens and save. 166 ST A Internetworking Fundamentals
25 Unit 2: LAN Configurations Generating Traffic 1. Keep Sniffer Basic in capture mode. You are going to generate some traffic over your network. 2. From your desktop, double-click the Network Neighborhood icon: You will recognize a list of the computers in your network (if not, notify your instructor). 3. Double-click one of the names. What workstation s node name did you choose? 4. Copy a file from your local PC to the computer you chose in step Now verify the file copy was successful. How did you do this? Viewing Captured Data Return to the Sniffer Basic application. 10. In the Capture Panel window, click to stop capture. Then click. 11. In the View window, you will notice three separate windows: The top window lists the packets that were captured. The middle window lists all packet specific information in verbal description. The bottom window displays the actual packet data in hexadecimal. 12. Print each of these screens and save. 13. In the top window, select a row that has NetBIOS in the Layer column. 14. Scroll down through the information in the middle window and look for workstation node names. Find the one that you copied your file to. ST A 167
26 Lesson 2-2: Data Transmission 15. Scroll to the top of the middle window to the address field. There are two MAC addresses, the one on the left is the source address, and the one on the right is the destination address. What is the node name in the packet you are viewing? What are the source and destination MAC addresses? What do you think the source and destination addresses are for? What data link protocol is being used? Protocol Distribution 1. Close the packet capture window and do not save the data. 2. From the toolbar, click Tools, then Protocol Distribution button. 3. After a few seconds, you should see several different protocols being displayed. Which protocol do you see? Which protocol generated the most traffic? 4. Go back and copy that file back from the computer you copied it to. Notice how the chart changes. 5. If you are connected to the Internet, use your browser and hit several web sites. Again notice the changes on the chart. Describe changes you noticed. Why do you think there are so many changes? 168 ST A Internetworking Fundamentals
27 Unit 2: LAN Configurations Host Table 7. From the toolbar, select Tools then click the Host Table button. This displays, in pie chart fashion, the busiest nodes on the network. 8. From the toolbar on the left of this window, you can change the display to a bar chart, outline, or detail view. How many hardware addresses are listed? Which nodes do they represent? How can you find out which nodes are represented by each hardware address? The data represented by the Host Table is from which layer of the OSI model? Summary In this lab, you launched Sniffer Basic and captured network traffic to view packets, determine the type of protocols used, and the amount of traffic generated in your network. Save the printed data from the three windows and place them in your portfolio. How do you think a network administrator uses this information to assist him/her with the job of managing and planning network expansions? Write a short essay on this topic and submit it to your teacher. ST A 169
28 Lesson 2-2: Data Transmission Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Essay on how a network administrator would use information gathered from Sniffer Basic software. 40 Directions followed, data recorded as specified, and questions answered completely and accurately. Printed materials placed in portfolio 10 Participation and active engagement 15 TOTAL ST A Internetworking Fundamentals
29 Unit 2: LAN Configurations Network Wizards Code Research Select one of the following topics to research. Materials Needed Internet Connection ASCII code from another source 1. Search the Internet for the code for interpreting ASCII. 2. Using ASCII code, write the following sentence: Hello, how are you? Look at the length of the code. Search the Internet to determine how much time it takes for a byte of information to be sent over a network. How long would it take to send this message? Calculate how many bytes are in your name. How long would it take for your name to be sent over the network? Can you see why computers need to break data into packets? Explain why this is the case. Prepare a one-page summary of your findings. Present your findings to the class. Create a visual display for your presentation. 3. Baudot, ASCII, and EBCDIC are three codes used for the transmission of data. Research these codes and their history. Prepare a one-page summary of your findings. Present your findings to the class. Create a visual display for your presentation. Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score On time delivery of assignment 10 Content and quality of one-page summary 25 Content and quality of class presentation 25 Creativity, originality, and quality of visual aid 25 Organization, spelling, and grammar 15 TOTAL 100 ST A 171
30 Lesson 2-2: Data Transmission Summary In this lesson, you learned the following: Technical definitions associated with data signaling and transmission. The characteristics of digital signaling, analog signaling. What packets and frames are, how they are structured, and their relationship to the OSI model. How to convert binary and hexadecimal digits to decimal digits. How to use Sniffer Basic software to capture and analyze packets. Review Questions Name Lesson 2-2: Data Transmission Part A 1. Describe analog signals. How are they used to transmit data? 2. Describe digital signals. 3. Describe synchronous data transmission. 4. Describe asynchronous data transmission. 5. What is the difference between half-duplex and full duplex transmissions? 172 ST A Internetworking Fundamentals
31 Unit 2: LAN Configurations 6. There is a timing process that signals the beginning and ending of data so it can be correctly measured. This process is called what? a. Digital signaling b. Analog signaling c. Bit synchronization d. Asynchronous e. Synchronous 7. Which type of signaling scheme represents data sent as discrete signals? a. Digital signaling b. Analog signaling c. Asynchronous d. Synchronous 8. Which type of signaling scheme represents continuously changing data? a. Digital signaling b. Analog signaling c. Asynchronous d. Synchronous 9. Which type of bit synchronization transmission requires both a start bit and a stop bit for clocking purposes? a. Digital signaling b. Analog signaling c. Asynchronous d. Synchronous ST A 173
32 Lesson 2-2: Data Transmission 10. Group of bits, including data and control signals, arranged in a specific format and transmitted as a whole, are called what? a. Clocking b. Sequencing c. Synchronization d. Packets Part B 1. Describe the difference between analog and digital signaling waves/pulses. 2. What is binary notation and how is it used to transfer data signals over network media? 3. List three characteristics of waves that are used to encode data. Part C 1. Use the OSI model as your reference and explain how data packets are structured. Give several examples of information that may be contained within headers. Draw a diagram showing packet addition at each layer. 174 ST A Internetworking Fundamentals
33 Unit 2: LAN Configurations Scoring Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Part A: Technical definitions associated with data signaling and transmission. 30 Part B: Describe the characteristics of digital signaling, analog signaling. Part C: What packets and frames are, how they are structured, and their relationship to the OSI model. TOTAL 100 Try It Out: How to convert binary and hexadecimal digits to decimal digits. Stretch Yourself: How to use Sniffer Basic software to capture and analyze packets Network Wizards 100 FINAL TOTAL 400 Resources Aschermann, Robert (1998). MCSE Networking Essentials for Dummies. IDG Books Worldwide, Inc. Forest City, California. Baker, R. (1996). Data Communications Home Page. Available: [1999, May 13]. Bert Glen (1998). MCSE Networking Essentials: Next Generation Training Second Edition. New Riders Publishing. Indianapolis Indiana. Chellis, James; Perkins, Charles; & Strebe Matthew (1997). MCSE Networking Essentials Study Guide. Sybex Inc. Alameda California CMP Media, Inc. (1999). FDDI fundamentals. In Data Communications Tech Tutorials [Online]. Available: [1999, April 20]. Computer and Information Science, Ohio State University (No date). Data Communications Cabling FAQ. [Online].Available: [1999, May 13]. ST A 175
34 Lesson 2-2: Data Transmission Derfler, Jr., Frank J., & Freed, L. (1998). How Networks Work, Fourth Edition. Macmillan Computer Publishing/Que Corporation. Indianapolis, Indiana. Hayden, Matt. (1998). Sam's Teach Yourself Networking in 24 Hours. Sam's Publishing, Indianapolis, Indiana. Microsoft Corporation (1998). Dictionary of Computer Terms, Microsoft Press, Redmond, Washington. Nortel Networks (1998). Internetworking Fundamentals: Student Guide. Bay Networks Inc. Billerica, Massachusetts. Palmer, Michael J. (1998) Hands-On Networking Essentials with Projects, Course Technology, Inc. Cambridge, Massachusetts. 176 ST A Internetworking Fundamentals
Lesson 2-3: Ethernet Basics
Unit 2: LAN Configurations Lesson 2-3: Ethernet Basics At a Glance Ethernet LAN topology is currently the most common network architecture. Ethernet topologies are generally bus and/or bus-star topologies.
More informationThis unit contains the following four lessons:
Unit 1 Internetworking Overview Overview Description This unit contains four lessons. The first lesson covers the types of basic networks, including LANs, WANs, MANs, Backbone, and Enterprise networks.
More informationLesson 5-2: Network Maintenance and Management
Unit 5: Network Operating Systems Lesson 5-2: Network Maintenance and Management At a Glance This lesson presents an overview of network planning and management tasks. It also discusses hardware and software
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationThis unit contains the following two lessons:
Unit 5 Networking Operating Systems Overview Description This unit contains two lessons. The first lesson describes the characteristics of the four major Internetworking Systems, including Windows NT Server,
More informationThe OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
More informationLesson 1-4: Structured Cabling Systems
Unit 1: Internetworking Overview Lesson 1-4: Structured Cabling Systems At a Glance This lesson describes both physical and logical organization of networks. Topologies described include bus, ring, star,
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationLab - Using Wireshark to View Network Traffic
Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP
More informationZarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
More informationKnow the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:
Unit 6 Router Management Overview Description With today s networks growing exponentially, management is a key to quality of network performance. People depend on their networks and performance issues
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationDATA COMMUNICATION (Basics of data communication, OSI layers.)
DATA COMMUNICATION (Basics of data communication, OSI layers.) K.K.DHUPAR SDE (NP-II) ALTTC ALTTC/NP/KKD/Data Communication 1 Data Communications History 1838: Samuel Morse & Alfred Veil Invent Morse Code
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationUnit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents
Unit 4 Introduction to TCP/IP Overview Description This unit contains one lesson: This lesson will introduce protocols in general. You will look at how a protocol functions, the differences between a routable
More informationCS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
More informationThis unit contains the following two lessons: Lessons Pages Length Lesson 3-1: Network Layer Addressing 98-136 5 hours
Unit 3 Let s Route Overview Description This unit contains two lessons: The first lesson introduces the format for addressing data that travels across the Internet. The lesson focuses on the underlying
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationcnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
More information5 Data Communication and Networking
5 Data Communication and Networking 5.1 Introduction Today computer is available in many offices and homes and therefore there is a need to share data and programs among various computers. With the advancement
More informationThe OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
More informationModule 1: Reviewing the Suite of TCP/IP Protocols
Module 1: Reviewing the Suite of TCP/IP Protocols Contents Overview 1 Lesson: Overview of the OSI Model 2 Lesson: Overview of the TCP/IP Protocol Suite 7 Lesson: Viewing Frames Using Network Monitor 14
More informationThe following sections describe the Gateway configuration pages in the SBG1000 Setup Program.
Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP
More informationLab 7.1.9b Introduction to Fluke Protocol Inspector
Lab 7.1.9b Introduction to Fluke Protocol Inspector DCE SanJose1 S0/0 S0/0 SanJose2 #1 #2 Objective This lab is a tutorial demonstrating how to use the Fluke Networks Protocol Inspector to analyze network
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationWritten examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
More informationProcess Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
More informationYou can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
More informationCCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationConfiguration. Windows 98 and Me Configuration
Configuration Windows 98 and Me Configuration Installing the TCP/IP Protocol Windows 2000 Configuration Windows XP Configuration Wireless Configuration 128-Bit Encryption Wireless Security in Windows XP
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the
More informationLab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
More informationBCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
More informationFile Sharing. Peter Lo. CP582 Peter Lo 2003 1
File Sharing Peter Lo CP582 Peter Lo 2003 1 File Sharing What is it? How is it different from File Transfer How it it done? CP582 Peter Lo 2003 2 This lecture we move away from the topic of transferring
More informationA6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual
802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the
More informationPART IV. Network Layer
PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must
More informationChapter 1. Introduction and Historical Background of Computer Networks. 1.1 Scope of Computer Networks
Chapter 1 Introduction and Historical Background of Computer Networks 1.1 Scope of Computer Networks Perhaps the most significant change in computer science over the past twenty years has been the enormous
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More information524 Computer Networks
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationIP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
More informationProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
More informationLAN Performance Measurements Lab
LAN Performance Measurements Lab Token Ring and Ethernet Name: Date Experiment Performed: Group Members: Lan Performance Lab Ver 1.4, February 2004. - 1 - Introduction: The goal of this laboratory is for
More informationVPN Access to the NTEN Network
VPN Access to the NTEN Network 2004 Networking and Telecommunications Engineering By: Leif Thordarson Virtual Private Network Documentation Page ii TABLE OF CONTENTS List of Illustrations and Tables...
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationLab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
More informationThe Journey Inside SM : The Internet Background Information, Part 1
SM : The Internet Background Information, Part 1 Growth of the Internet It is almost impossible to make it through a day without hearing a reference to the Internet. The Internet began in 1969 as the ARPANET
More informationData Communication Networks
Data Communication Networks Data communication networks typically do not send real time data As a result, packet switching is often used OPTI 500, Spring 2011, Lecture 6, Data Networks 1 Packet Switching
More informationComputer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
More informationObjectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM
More informationPreparing the Computers for TCP/IP Networking
Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or
More informationComputer Networks III
Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router
More informationAvaya Wireless AP Device Manager User Guide
Avaya Wireless AP Device Manager User Guide February 2003 Avaya Wireless AP Device Manager User Guide Copyright Avaya Inc. 2003 ALL RIGHTS RESERVED The products, specifications, and other technical information
More informationCCNA Tutorial Series SUBNETTING
CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By
More informationPART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
More informationThe Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :
SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationIntroduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationComputer Network and Communication
2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and
More informationC20.0001 Information Systems for Managers Fall 1999
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
More informationWAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationChapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
More informationNetwork Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More informationComputer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
More informationModern snoop lab lite version
Modern snoop lab lite version Lab assignment in Computer Networking OpenIPLab Department of Information Technology, Uppsala University Overview This is a lab constructed as part of the OpenIPLab project.
More informationConfiguring Your Network s Security
Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible
More informationFLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT
More informationLecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage
Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More informationTopics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationWorkstation ARP. Objective. Background / Preparation
Workstation ARP Objective Introduce Address Resolution Protocol (ARP) and the arp a workstation command. Explore the arp command help feature using the -? option. Background / Preparation ARP is used as
More informationWireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
More informationLevel 1 Technical. Networking and Technology Basics. Contents
Level 1 Technical Networking and Technology Basics Contents 1 Glossary... 2 2 IP Networking Basics... 4 Fundamentals... 4 IP Addresses... 4 Subnet Masks... 5 Network Communication... 6 Transport Protocols...
More informationDigital Voice Services User Guide
Digital Voice Services User Guide * Feature Access Codes *72 Call Forwarding Always Activation *73 Call Forwarding Always Deactivation *90 Call Forwarding Busy Activation *91 Call Forwarding Busy Deactivation
More informationHands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationEINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should
More information10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING
10 WIRELESS, REMOTE, AND WIDE AREA NETWORKING PROJECTS Project 10.1 Project 10.2 Project 10.3 Project 10.4 Project 10.5 Project 10.6 Understanding Key Concepts Understanding Wireless Technologies Setting
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationplc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums
plc numbers - 3. Topics: Number bases; binary, octal, decimal, hexadecimal Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;
More information