EC 301 COMPUTER NETWORKING FUNDAMENTALS
|
|
- Clarence Lucas Goodwin
- 8 years ago
- Views:
Transcription
1 EC 301 COMPUTER NETWORKING FUNDAMENTALS
2 CHAPTER 1: INTRODUCTION TO NETWORKING Prepared By: Sheila/JKE/PKB
3 CHAPTER 1 DURATION 6 HOURS (3 weeks) Lecture CLO 1 Explain the hardware and network devices to built LAN for a specific implementation (C2)
4
5 COMPUTER HARDWARE??
6 COMPUTER HARDWARE?? Processing Device Input Device HARDWARE Output Device Storage Device
7 COMPUTER SYSTEM? HARDWARE? SOFTWARE The instructions given to the computer in the form of a program which are used for different purposes.
8 COMPUTER SYSTEM?? under the control set of instructions processes Input raw data from the user an advanced electronic device gives the result Output saves In the storage space
9 COMPUTER NETWORK?? Network comprise 2 or MORE computers that have been connected A group of device, known as a node connected to media transmission.
10 COMPUTER NETWORK?? The computers can be geographically located anywhere. Enable them to communicate with each other and share resources and files.
11 BRIDGE ATM TELEKOM MALAYSIA REPEATERS SERVER ROUTER HUB HUB HUB HUB HUB BRIDGE HUB HUB WORKSTATION
12 Computer networks can be used for several purposes: Facilitating communications. Sharing hardware. Sharing files, data, and information. Sharing software. people can communicate each computer efficiently on a network and easily may via : access user may and access use hardware data and resources , Users instant connected messaging, information the to network, a network chat which such rooms, may stored as printing on other a Telephone, run application video document computers telephone programs on a on calls shared the and network. network video remote conferencing. computers. printer.
13 STAND-ALONE COMPUTER NETWORK COMPUTER
14 STAND-ALONE COMPUTER Connected to Printer / scanner individually Stored on Workstations / Pendrive / CD Connected to internet Security software installed On each computer. User keeps security software updated. Physical security typically poor Connecting teams through phone
15 STAND-ALONE COMPUTER NETWORK COMPUTER A single stand-alone computer can be very useful BUT it is when connected to other computers that it becomes possible to do some of the most powerful things.
16 Share Printer / scanner Stored on server. All files can be shared Shared internet connection Security software installed on server. Client for security software installed on workstations. Server auto updates workstations. Physical security for servers good Connecting teams through / NETWORK COMPUTER
17 2 TYPES of NETWORK P2P NETWORK CLIENT/SERVER NETWORK
18 P2P NETWORK are more commonly implemented where less then ten computers are involved and where strict security is not necessary.
19 P2P NETWORK each computer in the network act as both client or server for the other computers in the network allowing shared access to files/ with every other computer on the network and peripherals without the need for a central server
20 P2P NETWORK all computers in the network to use the same or a compatible program to connect to each other and access files and other resources found on the other computer.
21 CLIENT/SERVER NETWORK Suitable for larger network A computer network in which one centralized Powerful computer is a hub to which many less powerful personal computers or workstations are connected Clients run programs and access data that are stored on the server
22 P2P vs C/S Easy to setup. PEER-TO-PEER NETWORK Less expensive. Can be implemented on a wide range of operating systems. CLIENT/SERVER NETWORK More difficult to set up. More expensive to install. A variety of operating systems can be supported on the client computers, but the server needs to run an operating system that supports networking. More time consuming to maintain the software being used (as computers must be managed individually). Less time consuming to maintain the software being used (as most of the maintenance is managed from the server).
23 P2P vs C/S PEER-TO-PEER NETWORK Very low levels of security supported or none at all. These can be very cumbersome to set up, depending on the operating system being used. Ideal for networks with less than 10 computers. Does not require a server. Demands a moderate level of skill to administer the network. CLIENT/SERVER NETWORK High levels of security are supported, all of which are controlled from the server. Such measures prevent the deletion of essential system files or the changing of settings. No limit to the number of computers that can be supported by the network. Requires a server running a server operating system. Demands that the network administrator has a high level of IT skills with a good working knowledge of a server operating system.
24 CLIENT/SERVER NETWORK ELEMENT 11. Transmission Media 10. Topology 9. Segment 8 Backbone 6. Node 5 Network Operating System 7. Connectivity Device 1. Server 2. Client 3. Workstation 4. Network Interface Card
25 CLIENT/SERVER NETWORK ELEMENT 1. Client A computer on the network that requests resources or services from another computer on a network client could also act as a server. The term client may also refer to the human user of a client workstation or to client software installed on the workstation.
26 CLIENT/SERVER NETWORK ELEMENT 2. Server A computer on the network that manages shared resources usually have more processing power, memory, and hard disk space than clients. run network operating software that can manage not only data, but also users, groups, security, and applications on the network
27 CLIENT/SERVER NETWORK ELEMENT 3. Workstations All of the user computers connected to a network are called workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables.
28 CLIENT/SERVER NETWORK ELEMENT 3. Workstations Workstations do not necessarily need floppy disk drives because files can be saved on the file server. Almost any computer can serve as a network workstation
29 CLIENT/SERVER NETWORK ELEMENT 4. Network Interface Card (NIC) NIC provides the physical connection between the network and the computer workstation. Most NICs are internal, with the card fitting into an expansion slot inside the computer.
30 CLIENT/SERVER NETWORK ELEMENT 4. Network Interface Card (NIC) NICs are a major factor in determining the speed and performance of a network. The three most common network interface connections are Ethernet cards, LocalTalk connectors, and Token Ring cards.
31 CLIENT/SERVER NETWORK ELEMENT 5. Network Operating System (NOS) is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.
32 CLIENT/SERVER NETWORK ELEMENT 5. Network Operating System (NOS) The network operating system is designed to allow shared file and printer access among multiple computers in a network, typically a local area network (LAN), a private network or to other networks.
33 CLIENT/SERVER NETWORK ELEMENT 5. Network Operating System (NOS) The most popular network operating systems are : Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, and Novell NetWare.
34 CLIENT/SERVER NETWORK ELEMENT 6. Node A client, server, or other device that can communicate over a network and that is identified by a unique number, known as its network addressers.
35 CLIENT/SERVER NETWORK ELEMENT 7. Connectivity device A specialized device that allows multiple networks or multiple parts of one network to connect and exchange data. A client/server network can operate without connectivity devices. However, medium- and large-sized LANs use them to extend the network and to connect with WANs.
36 CLIENT/SERVER NETWORK ELEMENT 8. Segment A network segment is a part of a computer network. The nature and extent of a segment depends on the nature of the network and the device or devices used to interconnect end stations. Device including routers, switches, hubs, bridges, or multi-homed gateways
37 CLIENT/SERVER NETWORK ELEMENT 9. Backbone The part of a network to which segments and significant shared devices such as routers, switches, and servers. A backbone is sometimes referred to as "a network of networks," because of its role in interconnecting smaller parts of a LAN or WAN.
38 CLIENT/SERVER NETWORK ELEMENT 10. Topology The physical layout of a computer network. Topologies vary according to the needs of the organization and available hardware and expertise. Networks can be arranged in a ring, bus, or star formation, and the star formation is the most common.
39 CLIENT/SERVER NETWORK ELEMENT 11. Transmission media The means through which data is transmitted and received. Transmission media may be physical, such as wire or cable, or atmospheric (wireless), such as radio waves.
40 CATEGORIES OF NETWORK
41 WIDE AREA NETWORK a A larger the group largest network of computers network than LAN that share a common connection high speed connects in a small computer area or even users in in the a particular same geographic building area or region. very expensive to setup METROPOLITAN AREA NETWORK an office or home network smaller than a WAN. connected by Ethernet cables LOCAL AREA NETWORK have high Speed connections.
42 LOCAL AREA NETWORK (LAN) Connect devices in a building
43 LOCAL AREA NETWORK (LAN) the computers are relatively close together. can be constructed only with two computers and one printer only, or can be extended in one building to include audio and video peripherals. LAN size is limited to a distance of several kilometers LANs would be within the same office, a single building, or several buildings close together. Common LAN topologies are bus, star and ring. LAN has a data rate of 4 Mbps to 100 Mbps.
44 METROPOLITAN AREA NETWORK (MAN) Connecting device between several buildings or area (city).
45 METROPOLITAN AREA NETWORK (MAN) is a network that interconnects users with computer resources in a geographic area or region LARGER than that covered by even a large LAN but SMALLER than the area covered by a WAN
46 WIDE AREA NETWORK (WAN) Can send data, audio and video at long distances around the world.
47 WIDE AREA NETWORK (WAN) A computer network that spans a relatively large geographical area. Computers connected to a WAN are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.
48 INTERNET is a global network that links computer networks around the world Internet is from Internetworking word, that meaning of communication between networks. a network of network.
49 INTRANET A contained collection of computers and networks within an organizations connecting the organization's members and/or employees to a range of computer services, resources, and information. firewall is used to separate the Intranet from the Internet and to get permission to access the source.
50 INTERNET VS INTRANET
51 NETWORK TOPOLOGY Defines the way in which computers, printers, and other devices are connected. the layout of the wire and devices as well as the paths used by data transmissions.
52 BUS TOPOLOGY Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable.
53 BUS TOPOLOGY Bus is a passive network. messages are usually broadcasted to every computer Computers in a network bus lines just listen in to find out whether there is data that is sent. This computer does not respond to send data to the computer next to it. If the computer fails, it does not give effect to the entire network.
54 BUS TOPOLOGY Advantages Quick, reliable in building a small network, easy to use and understand cable to connect your computer does not need much, so prices are cheap Easy to expand the bus. Two cables can be connected to become longer with BNC barrel Disadvantages make a lot of network traffic is extremely slow bus. Because any computer can send signals at any time, these interfere with each other Each barrel connector will weaken the signal, if too many connections can result in signal is not received correctly difficult to be recovered
55 STAR TOPOLOGY The star topology is the most commonly used architecture in Ethernet LANs. It connecting all the cables from the computer to a central location, where everything will be connected to a device known as a hub
56 STAR TOPOLOGY Each computer in a star topology communicate with the central hub that sends the message to the all computers (in a star network broadcast) or only to a certain destination computer
57 STAR TOPOLOGY Advantages Easier to update and add computers in the stars without disrupting network disadvantages If the central hub fails, the network fails Repairs of the network easily done in the center of the stars A damaged computer does not necessarily affect the network Requires device in the center of stars for rebroadcast, or convert (switch) network traffic higher price because of all the cables must be pulled from the center Can use several types of cables within the same network, with a hub that can accept different types of cables
58 RING TOPOLOGY circuit arrangement in which each network device is attached along the same signal path to other devices, forming a path in the shape of a ring. Each device in the network (node) handles every message that flows through the ring.
59 RING TOPOLOGY Each node in the ring has a unique address. Since in a ring topology there is only one pathway between any two nodes, ring networks are generally disrupted by the failure of a single link. Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise.
60 RING TOPOLOGY The redundant topologies are used to eliminate network downtime caused by a single point of failure. It is used to produce highperformance network: the network require special bandwidth for the features such as video and audio, or high performance is required when many users access the network
61 RING TOPOLOGY Each computer receives the signal from the computer next to it and send these signals to the next computer Since each computer send the signal it receives, then the ring topology is an active network. No terminator is required because there is no end in this topology
62 RING TOPOLOGY Since the data is transferred as a sequence of the same route the possibility of the occurrence of data collisions do not occur Maintenance work for this system is somewhat similar to the star topology.
63 RING TOPOLOGY Each node can be connected to the network and can also be removed at any time without affecting the whole system directly. But one problem is if a node fails, the whole network system is likely to be affected.
64 RING TOPOLOGY Advantages As each computer is given the same to achieve the token, not a single computer can be a monopoly network disadvantages The failure of a computer will cause a network failure not easy to repair if damaged Increase or decrease the computer will disrupt the network
65 MESH/HYBRID TOPOLOGY there is only one possible path from one node to another node. If any cable in that path is broken, the nodes cannot communicate.
66 MESH/HYBRID TOPOLOGY Advantages As each computer is given the same to achieve the token, not a single computer can be a monopoly network disadvantages Durable, eg failure media is not disrupt the network when compared with other topologies It is easy to be recovered
67 NETWORK STANDARD There are several organizations in the United States and Europe that produces standards for data communications and computer networks. The role of these organizations are only suggested standards.
68 NETWORK STANDARD The organizations are: a. American National Standards Institute(ANSI) b. Electronic Industries Alliance (EIA) and Telecommunications Industry Association (TIA) c. Institute of Electrical and Electronic Engineers (IEEE) d. International Organization for Standardization (ISO) e. International Telecommunication Union (ITU) f. Internet Society (ISOC) g. Internet Assigned Numbers Authority (IANA) and Internet Corporation for Assigned Names and Numbers (ICANN)
69 NETWORK STANDARD a. American National Standard Institute (ANSI) is a private organization that coordinates all standards organizations in the United States. ANSI standards are among the organizations involved in COMPUTER AND DATA COMMUNICATIONS
70 NETWORK STANDARD b. Electronics Industries Association (EIA) is an organization representing many of expenditures in the ELECTRONICS INDUSTRY. Duties and responsibilities of EIA is more focused on ELECTRICAL STANDARD includingeia-232-d and EIA-499: important interface in the delivery / receipt of information
71 NETWORK STANDARD c. Institute of Electrical and Electronic Engineers (IEEE) is a professional organization will issue a standard in their respective fields and this standard will be adopted by consumers. In the computer world, better known in the developing IEEE standard Local Area Network (LAN) which is designated as IEEE 802.
72 NETWORK STANDARD d. Internatinal Standards Organization (ISO) is a voluntary organization with membership from several countries. ISO to work with other organizations such as CCITT and ANSI standards to create some standards such as HDLC (High-level data link control)
73 NETWORK STANDARD e. Internatinal Telecommunication Union (ITU) an intergovernmental organization through which public and private organizations develop telecommunications. The ITU was founded in 1865 and became a United Nations agency in 1947.
74 NETWORK STANDARD e. Internatinal Telecommunication Union (ITU) It is responsible for adopting international treaties, regulations and standards governing telecommunications. The standardization functions were formerly performed by a group within the ITU called CCITT, but after a 1992 reorganization the CCITT no longer exists as a separate entity.
75 PRINCIPLES OF COMMUNICATION NETWORKING SOURCE CHANNEL DESTINATIONS
76 PRINCIPLES OF COMMUNICATION NETWORKING SOURCE CHANNEL DESTINATIONS
77 PRINCIPLES OF COMMUNICATION NETWORKING SOURCE CHANNEL Message sources are people or electronic devices, that need to send a message to other individuals or devices. the media that provides the pathway over which the message can travel from source to destination. DESTINATIONS The receiver of the message
78 PRINCIPLES OF COMMUNICATION NETWORKING Most networks has one feature in common: Transmitting information by breaking the original information into a set of message (packets) Transmitting packets sequentially Reassembling packet back into original information
79 PRINCIPLES OF COMMUNICATION NETWORKING In order to make sure the original message get transmitted correctly, computer networks used a set of rules: Establish a link Issue a command and command qualifier Acknowledgement of command Dissection message Error detection and correction Termination of transmission
80 PRINCIPLES OF COMMUNICATION NETWORKING Establish a Link
81 PRINCIPLES OF COMMUNICATION NETWORKING Establish a Link
82 PRINCIPLES OF COMMUNICATION NETWORKING Establish a Link Each packet is a string of bits and have to travel along way over a bunch of different network Typically lots of computer sending and receiving information over the same network The information getting sent can often get altered during transmission
83 PRINCIPLES OF COMMUNICATION NETWORKING Issues a command and Command Qualifier The SET NETWORK command allows to control information about network services on an Open system. Each structure defines a particular network service and contains the following information: Product name Manufacturer Type of network Node name Address(es) Interface(s) (OpenVMS device driver)
84 PRINCIPLES OF COMMUNICATION NETWORKING Issues a command and Command Qualifier Vendor-specific data Status Connections Counters Start command Stop command Path to the Point-to-Point Protocol utility (PPPD) shareable image
85 PRINCIPLES OF COMMUNICATION NETWORKING Acknowledgement of Command Router receiving packets from DTE A destined for DTE B Without acknowledgment the router forwards packets to the X.25 network and then forwards acknowledgments from the network back to DTE A. With acknowledgment the router can acknowledge packets received from DTE A before it has received acknowledgments from the network for the forwarded packets.
86 PRINCIPLES OF COMMUNICATION NETWORKING Acknowledgement of Command Acknowledgment is transmitted between local hops much faster and more efficiently than between end-to-end hops.
87 PRINCIPLES OF COMMUNICATION NETWORKING Dissection Message Proxies are good firewalls because the entire packet is dissected and each section can be examined for invalid data at each layer of the OSI model.
88 PRINCIPLES OF COMMUNICATION NETWORKING Dissection Message a proxy can examine a packet for information contained in everything from the packet header to the contents of the message. Attachments can also be checked for viruses. Messages can be searched for keywords that might indicate the source of a packet.
89 PRINCIPLES OF COMMUNICATION NETWORKING Error Detection and Correction Data can be corrupted during transmission. ERROR = Data Send Data Received
90 PRINCIPLES OF COMMUNICATION NETWORKING Error Detection and Correction 2 types of ERROR Single bit Error In a single-bit error, only 1 bit in the data unit has changed. Burst Error A burst error means that 2 or more bits in the data unit have changed.
91 PRINCIPLES OF COMMUNICATION NETWORKING Error Detection and Correction
92 PARITY CHECK - ODD PARITY Parity bit will be in charge to make sure Total bit 1 for bits words must be ODD EVEN PARITY Bit = = 3 LSB MSB ODD 8 bits words
93 PARITY CHECK - EVEN PARITY Parity bit will be in charge to make sure Total bit 1 for bits words must be EVEN EVEN PARITY Bit = = 2 LSB MSB EVEN 8 bits words
94 CYCLIC REDUNDANCY CHECK Method used to detect and correct error Need to send extra bits with data Redundancy bits are added by sender and removed by the receiver Allows the receiver to detect or correct corrupted bits
95 CYCLIC REDUNDANCY CHECK Sender Receiver
96 CHECKSUM Sender Receiver Bin Dec Dec Bin ,11,12,0,6,9 9 Sum 36 Sum 45 Wrapped Sum 6 Wrapped Sum 15 Checksum 9 Checksum
97 PRINCIPLES OF COMMUNICATION NETWORKING Error Detection VS Error Correction Detecting Error Looking only to see if any error occurred. Correcting Error More difficult because need to know the exact number of bits are corrupted and more importantly the location of the message Number of error and size of message are also important factors
98 PRINCIPLES OF COMMUNICATION NETWORKING Termination of Transmission each side of the connection terminating independently. When an endpoint wishes to stop its half of the connection, it transmits a FIN packet, which the other end acknowledges with an ACK. Therefore, a typical tear-down requires a pair of FIN and ACK segments from each TCP endpoint.
99 PRINCIPLES OF COMMUNICATION NETWORKING Termination of Transmission After both FIN/ACK exchanges are concluded, the terminating side waits for a timeout before finally closing the connection, during which time the local port is unavailable for new connections; this prevents confusion due to delayed packets being delivered during subsequent connections.
100 TERMINOLOGIES IN COMMUNICATION NETWORKING
101 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Encoding The destination host receives and decodes the signals in order to interpret the message. Messages sent across the network are first converted into bits by the sending host. Each bit is encoded into a pattern of light waves or electrical impulses depending on the network media over which the bits are transmitted.
102 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Encapsulation Messages are encapsulated before being sent to the appropriate location
103 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Formatting On a network messages are formatted into frames
104 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Formatting
105 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Size Messages have size restrictions depending on the channel used Messages must be of a particular size Ethernet message sizes are limited to bytes
106 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Timing the amount of time from the beginning until the end of a message transmission.
107 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Timing Tx Msg End of Msg Rx ready to listen for ACK Time wait to Tx ACK Start Tx Msg Start listening Rx Msg Min time to wait Rx Msg Rx Msg Start ACK
108 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Timing Access method Determines when a message can be sent to avoid collisions Flow control Determines how much information can be sent at any given time Response timeout Determines what action to take if there is no response in a reasonable time period
109 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Timing
110 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Timing The packet transmission time in seconds can be obtained from the packet size in bit and the bit rate in bit/s as: Packet transmission time = Packet size Bit rate
111 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Timing Example: Assuming 100 Mbit/s Ethernet and the maximum packet size of 1526 bytes. Calculate the results in Maximum packet transmission time?
112 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Timing Example: Max packet transmission = Packet size Bit rate = 1526*8 bit (1 Mbit/s) 122 μs
113 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Patterns a network-oriented architectural pattern describes how two different parts of a message passing system connect and communicate with each other.
114 TERMINOLOGIES IN COMMUNICATION NETWORKING Message Patterns
115 TERMINOLOGIES IN COMMUNICATION NETWORKING My friend at Putrajaya want to send me a files using my PKB . After sending the she identify that the files that she has attached cannot get through the PKB server. In a given scenario, identify which terminologies can be relate to this communication problem in networking.
116 FUNCTION OF NETWORING HARDWARE Networking equipment typically refers to devices facilitating the use of a computer network. includes gateways, routers, bridges, switches, hubs, and repeaters.
117 FUNCTION OF NETWORING HARDWARE A network interface controller /network interface card is a computer hardware component that connects a computer to a computer network.
118 FUNCTION OF NETWORING HARDWARE NIC NIC provides the hardware interface between a computer and a network. A NIC technically is network adapter hardware in the form factor of an add-in card
119 FUNCTION OF NETWORING HARDWARE Various types of NIC PCI NIC PCI Express NIC PCMCIA On Board NIC Wireless NIC
120 FUNCTION OF NETWORING HARDWARE PCI NIC Peripheral Component Interconnect is an industry specification for connecting hardware devices to a computer's central processor. Both Ethernet and Wi-Fi network adapters for desktop and notebook computers commonly utilize PCI.
121 FUNCTION OF NETWORING HARDWARE PCI NIC PCI defines the electrical characteristics and signal protocol used for two devices to communicate over a computer's central bus. PCI network adapters and other devices exist in several different shapes and sizes
122 FUNCTION OF NETWORING HARDWARE PCI Express NIC It is used to connect Fast Ethernet Networks together and it is connected to a PCI Slot located on your computer's Motherboard
123 FUNCTION OF NETWORING HARDWARE PCMCIA/PC card Personal Computer Memory Card International Association is an industry organization best know for developing a standard network adapter using the PC Card form factor. PC Card form factor was designed for thinness, and PCMCIA is therefore especially used mostly in removable peripherals that connect to a laptop.
124 FUNCTION OF NETWORING HARDWARE On Board NIC A LAN connection or network connection In a desktop, NIC's, video cards, sound cards and such can be inserted into physical slots on the motherboard but in a laptop there is no room for such a configuration. All of these things are built right in to the motherboard. Some desktops integrate these things as well but still maintain the slots as described above. So, an "onboard" or integrated NIC card would not be plugged into one of these slots.
125 FUNCTION OF NETWORING HARDWARE Wireless NIC WNIC is a network interface controller which connects to a radio-based computer network rather than a wire-based network A WNIC is an essential component for wireless desktop computer. this card uses an antenna to communicate through microwaves.
126 FUNCTION OF NETWORING HARDWARE HUB/SWITCH A HUB is a device that provides a central connection point for cables from workstations, servers and peripherals.
127 FUNCTION OF NETWORING HARDWARE HUB/SWITCH multi slot concentrators which can plugged a number of multi-port cards to provide additional access as the network grows in size.
128 FUNCTION OF NETWORING HARDWARE HUB/SWITCH 2 Types of HUB 1. PASSIVE concentrators/hub No voltage supply allow the signal to pass from one computer to another without amplify the signal. 2. ACTIVE concentrators/hub Need voltage supply to electrically amplify the signal as it moves from one device to another Act like repeaters that can extend the length of a network.
129 FUNCTION OF NETWORING HARDWARE REPEATERS an electronic device that receives a signal, cleans it of unnecessary noise, regenerates and retransmits it can be separate devices or they can be incorporated into a concentrator/hub.
130 FUNCTION OF NETWORING HARDWARE REPEATERS it is necessary to regenerates the signal a signal loses strength as it passes along a long distance cable The repeater electrically amplifies the signal it receives and rebroadcasts it at a higher power level the signal can cover longer distances without degradation signal Long Distance Cable signal
131 FUNCTION OF NETWORING HARDWARE BRIDGE a device to allows segment of a large network into two smaller to reduce the amount of traffic on a networks and make the traffic more efficient. 2 nd Network 1 st Network BRIDGE
132 FUNCTION OF NETWORING HARDWARE BRIDGE BRIDGE also can filters data traffic at a network boundary. 1 st Network 2 nd Network
133 FUNCTION OF NETWORING HARDWARE BRIDGE can connect the 2 network. adding new wiring scheme into an older wiring scheme or To up-date the network BRIDGE Network New Network
134 FUNCTION OF NETWORING HARDWARE BRIDGE MONITORS the information traffic on both sides of the network so that it can pass packets of information to the correct location. 1 st Network 2 nd Network
135 FUNCTION OF NETWORING HARDWARE BRIDGE LISTEN" to the network and automatically figure out the address of each computer on both sides of the bridge. 1 st Network 2 nd Network
136 FUNCTION OF NETWORING HARDWARE BRIDGE INSPECT each message and broadcast it on the other side of the network. 1 st Network 2 nd Network
137 FUNCTION OF NETWORING HARDWARE BRIDGE MANAGE the traffic to maintain optimum performance on both sides of the network (like a traffic cop at a busy intersection during rush hour. 1 st Network 2 nd Network
138 FUNCTION OF NETWORING HARDWARE ROUTER A ROUTER translates information from one network to another it is similar to a super intelligent bridge. A ROUTER select the best path to route a message, based on the destination address and origin.
139 FUNCTION OF NETWORING HARDWARE ROUTER The ROUTER can direct traffic to prevent head-on collisions or traffic It is smart enough to know when to direct traffic along back roads and shortcuts.
140 FUNCTION OF NETWORING HARDWARE GATEWAY is a network point that acts as an entrance to another network. an internetworking system capable of joining together two networks that use different base protocols.
141 FUNCTION OF NETWORING HARDWARE GATEWAY The computers that control traffic within a company's network or at a local Internet service provider (ISP) are gateway nodes.
142 FUNCTION OF NETWORING HARDWARE GATEWAY In PKB s, a computer server acting as a gateway node and it also acting as a proxy server and a firewall server. A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.
143 REFLECTION Tell the class, what is the function of computer network hardware? Name 2 out of 5 of the computer network hardware that u remember. Identify which computer network hardware can select the best path to bring a message, based on the destination address and origin.
144 ACTIVITIES Sketch a simple peer to peer computer network at your house to show connection between 4 individual user playing and sharing web game.
145 ACTIVITIES Construct a diagram of the local area network in JKE s Multimedia Computer Lab which include 40 connected PCs and 1 shared printer. The lab have 10 Ethernet jack. Add any network hardware to apply to the connection.
146 ACTIVITIES The network in JKE s Office includes 44 connected PCs, 2 shared printers and 4 telephones with their own Ethernet jack. If there are 2 more PCs and 1 wireless router need to be add in the office but with no more Ethernet jack available. Design the connection to show the new JKE s office network. Add any network hardware to apply to the connection.
147 NEXT : TOPIC 2 THE OPEN SYSTEM INTERCONNECTION (OSI) MODEL AND NETWORK PROTOCOL
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationLocal-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationCOMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency
More informationWireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
More informationComputer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More informationNETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
More informationNetworks. The two main network types are: Peer networks
Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among
More informationDiscovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
More informationMANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
More informationComputer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu
ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationChapter 9 Communications and Networks
Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications
More informationCabling LANs and WANs
Cabling LANs and WANs CCNA 1 v3 Module 5 10/11/2005 NESCOT CATC 1 Cabling the LAN Each media has advantages and disadvantages: Cable length Cost Ease of installation Susceptibility to interference The
More informationNetwork Topologies. Network Topologies
Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical
More informationNetwork Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationIntroduction to Computer
PDHonline Course E175 (8 PDH) Introduction to Computer Instructor: Dale W. Callahan, Ph.D., P.E. and Lea B. Callahan, P.E. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658 Phone
More informationChapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
More informationFuture Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help
Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.
More informationChapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationLocal Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral
More informationTelecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationA network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and
NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More informationLecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN
Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan
More informationTopics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationC20.0001 Information Systems for Managers Fall 1999
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
More informationADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationThe WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationData Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
More informationOverview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
More informationNetworking Basics. Uses of a network
Networking Basics Data communications the electronic transfer of information between computers. This has become a major focus of the computer industry especially since the rapid growth of the internet.
More informationComputer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
More information524 Computer Networks
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationELEC3030 Computer Networks
ELEC3030 Computer Networks Professor Sheng Chen: Building 86, Room 1021 E-mail: sqc@ecs.soton.ac.uk Download lecture slides from: http://www.ecs.soton.ac.uk/ sqc/el336/ or get them from Course Office (ECS
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationChapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
More informationCORPORATE NETWORKING
CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Typical example of Ethernet local networks Mostly based
More informationRegion 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationHigh Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF
High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationCHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two
More informationCN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK
CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK DEFINTION & APPLICATIONS DEFINTION: A computer network is defined as the interconnection of two or more computers. It is done
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationGigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet
Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for
More informationCommunication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
More informationNetworking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationNetwork Structure or Topology
Volume 1, Issue 2, July 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Network Structure or Topology Kartik
More informationLocal Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
More informationCSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the
More informationTelecommunications, the Internet, and Wireless Technology
Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks
More informationPage 1 of 7. Computer Networking
Page 1 of 7 Computer Networking 7.1 What Is Computer Networking? A computer network consists of several computers that are connected to one another using devices that allow them to communicate. Computer
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationComputer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationProcess Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationNetwork Monitoring White Paper
Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com info@imagestream.com Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationNotes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c
EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationComputer Network and Communication
2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and
More informationIntroduction to Networks
www.eazynotes.com Maninder Kaur [Page No. 1] Introduction to Networks Short Answer Type Questions Q-1. Which Technologies of this age had led to the emergence of computer network? Ans: The technologies
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationChapter 5 Busses, Ports and Connecting Peripherals
Chapter 5 Busses, Ports and Connecting Peripherals 1 The Bus bus - groups of wires on a circuit board that carry information (bits - on s and off s) between computer components on a circuit board or within
More information3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
More informationIntroduction To Computer Networks
Introduction To Computer Networks 1. LAN s and WAN s 2. Some network and internetwork components 3. The communication process 4. Communication media 5. Topologies 6. Communication models and Standards
More informationGlossary of Terms and Acronyms for Videoconferencing
Glossary of Terms and Acronyms for Videoconferencing Compiled by Irene L. Ferro, CSA III Education Technology Services Conferencing Services Algorithm an algorithm is a specified, usually mathematical
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
More informationWAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
More information