Unit A - Connecting to the Network

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Unit A - Connecting to the Network"

Transcription

1 Unit A - Connecting to the Network 1 What is a network? The ability to connect people and equipment no matter where they are in the world. telephone computers television How does your body work as a network? 2

2 Networking and Its Benefits A CONVERGED NETWORK!!! 3 Networking and Its Benefits SOHO Network Small Office/Home Office sharing of resources Internet Printer 4

3 Networking and Its Benefits Schools, Corporations Internet 5 Networking and Its Benefits Define the components of an Information network Hosts PCs send and receive information across the network connected to a network device Peripherals not directly connected to the network, but connected to hosts Network devices hub, switch, router Network media used to connect hosts/devices 6

4 Networking and Its Benefits Clients and servers software installed determines the role of a client or a server Server software enables the server to provide information to other hosts Client software enables the client to request and display information from the server Example: Internet Explorer 7 Networking and Its Benefits Build computer peer-to-peer network and verify The ability to act as both a client and server 8

5 Network Topologies Physical topology created to record where each host is on the network shows how each host is connected (media, devices, etc) 9 Network Topologies Logical topology how the host uses the network host names, addresses, groups, applications 10

6 Communication Protocols Primary purpose of a network to communicate Elements of communication Sender (source) has a need to communicate Receiver (destination) receives message and interprets it Channel pathway for information to travel 11 Successful delivery of the message Rules (protocols) must be followed: Identification of the sender and/or receiver Channel in which to communicate (face-to-face) Mode of communication (written or spoken) Language Grammar Speed or timing 12

7 Communication Protocols Encoding vs. Decoding Encoding Humans converting thoughts into language, symbols, or sounds Computers Decoding messages converted into bits by the sending host each bit encoded into sound, light, or electrical impulses destination host then decodes the signal reverse of encoding 13 Communication Protocols Message formatting and encapsulation Message needs a specific format Compare to parts of a letter Identifier (recipient) Salutation Message Closing Identifier (sender) Encapsulation placing the letter into the envelope De encapsulation letter removed from the envelope 14

8 Communication Protocols Messages have size restrictions depending on the channel used If the message is broken into smaller pieces, it is easier to understand If the message is too long or too short, will be considered undeliverable. 15 Communication Protocols Timing when to speak; how fast or how slow how long to wait for a response Access Method determines when someone is able to send a message can speak when no one else is talking, otherwise a COLLISON occurs Flow Control timing for negotiations sender might transmit messages faster than the user can handle Response Timeout how long should you wait for a response and what action to take Acknowledgment may be required to ensure message was delivered 16

9 Communication Protocols Message Patterns Unicast single destination Multicast same message to a group Broadcast all hosts need to receive the message 17 Communication Protocols PROTOCOLS = RULES TO FOLLOW 18

10 Communication Across a Local Ethernet Network Computers must speak the same language in order to communicate!! 19 Standards in technology Standards rules by which equipment from different vendors operate Benefits of standards: Facilitate design Simplify product development Promote competition Provide consistency Facilitate training More vendor choices for customers 20

11 Communication Across a Local Ethernet Network IEEE (Institute of Electrical and Electronic Engineers) maintains networking standards Ethernet standard A breakdown of terminology 100 Base-T 100 = Speed in Mbps Base = Baseband transmission T = Twisted Pair 21 Communication Across a Local Ethernet Network Physical addressing MAC address (Media Access Control) Ethernet communication each interface has a MAC address each device may look at the data that has been transmitted, but only the interface that matches the destination MAC will respond 22

12 MAC Addresses by another Name Other names for a MAC address include: physical address hardware address Ethernet address burned-in address data-link layer address (7-layer model) Layer 2 address (of 7-layer model) 23 The Ethernet Frame Preamble beginning of the timing SFD (Start Frame Delimiter) marks the end of the timing, but beginning of the frame Destination MAC Source MAC Length/Type Length tells which protocol receives the data Type number of bytes of data Encapsulation packet of information FCS (Frame Check Sequence) used to check for damaged frames

13 Example Ethernet Type Values EtherType value of 0x0800 signals that the frame contains an IPv4 frame. EtherType of 0x0806 indicates an ARP frame EtherType of 0x8100 indicates an IEEE 802.1Q frame -Used with Virtual Lans (vlans) EtherType of 0x86DD indicates an IPv6 frame. 25 Cisco 3-layer Networking Model Cisco has defined a hierarchical model known as the hierarchical internetworking model. This model simplifies the task of building a reliable, scalable, and less expensive hierarchical internetwork because rather than focusing on packet construction, it focuses on the three functional areas, or layers, of your network: Access Distribution Core 26

14 3-layer Networking Model Core layer: This layer is considered the backbone of the network and includes the high-end switches and high-speed cables such as fiber cables. This layer of the network does not route traffic at the LAN. In addition, no packet manipulation is done by devices in this layer. Rather, this layer is concerned with speed and ensures reliable delivery of packets. Distribution layer: This layer includes LAN-based routers and layer 3 switches. This layer ensures that packets are properly routed between subnets and VLANs in your enterprise. This layer is also called the Workgroup layer. Access layer: This layer includes hubs and switches. This layer is also called the desktop layer because it focuses on connecting client nodes, such as workstations to the network. This layer ensures that packets are delivered to end user computers. 27 The Hierarchical Design Structure (3-layer model) Smaller, more manageable groups allow traffic to remain local on the networks Divided into three layers Access Layer connection to the hosts Distribution Layer interconnects smaller networks Core Layer high speed connection between distribution devices (high-speed backbone > internet) 28

15 29 Logical Addressing MAC vs. IP IP Address (Logical Address) assigned based on where the host is located assigned by the administrator Parts of an IP address (Network and Host parts) Network same for all hosts connected to the LAN Host unique to each host on the network 30

16 Access Layer Devices Most basic level Made up of: host devices first line of networking devices hub, switch, workstations Hub or switch 31 Access Layer Device A HUB Accepts data signal from one port and sends it (regenerates) out all other ports multiport repeater Collisions results in message being garbled and unreadable occur when two or more hosts send a message at the same time (undesirable in a network) NOT VERY SMART a hub will not recognize there is a collision and sends it to all ports 32

17 Hubs And Collision Domains Collision domain area where the collision has occurred. More collision domains = better performance How many collision domains exist in the graphic shown? 33 Access Layer Device A SWITCH SMARTER THAN A HUB dedicated bandwidth out each port no need to share with other ports (unlike a hub) Can forward messages to a specific host by looking in its MAC table If destination MAC is not in its MAC table, floods the network out all ports looking for a response Only the host with the correct MAC address will respond 34

18 More Stuff on Switches How does the MAC table get built? keeps track of frames being sent between hosts records the information when there is a response -records the source MAC address of frames received Collision Domains each port on a switch is its own collision domain 8 port switch = 8 collision domains 35 Broadcasts If there is only one destination MAC in a message, how can you contact everyone else? send a broadcast MAC hexidecimal digits FFFF.FFFF.FFFF (FF:FF:FF:FF:FF:FF) Useful when hosts need to send information but doesn't know what hosts are to receive it Switches and hubs send the broadcast out to everyone on their network. (Broadcast Domain) 36

19 ARP Request Sent when the sending host knows the destination IP, but not the MAC Will discover the MAC address of any local host on the network 37 Distribution Layer Devices and Communication Methods Responsible for making sure local traffic stays local on the network Traffic destined for other networks will be passed on. 38

20 Distribution Layer Devices The Router Routers directs traffic based on the destination IP address Routers build routing tables; switches build MAC tables Routers decode packets; switches decode frames Routers look at only the network portion of the IP address finds the best path to take to get to the destination Routers do not forward broadcasts!!! 39 Default Gateway Used when a host wants to send data to a host on a different network. Must be set on the workstation connected to the routing device the router interface connected to the PC 40

21 Routing Tables and ARP tables Used by routers to store information The diagram to the right shows two networks connected together via a router. The router maintains an ARP table and ROUTING table with information similar to the tables shown above. 41 Types of Routing Dynamic information is obtained from neighboring routers Static manually entered by the network administrator What happens to a message that contains an IP destination address that does not exist in the routing table? It is dropped unless... A default route is set last resort type of router will send it to the router it thinks may have the destination IP 42

22 Distribution Layer Devices and Communication Methods LAN Local Area Network Under the same administrative control 43 Plan, Implement and Verify a Local Network Consider the following before beginning: Number and type of hosts Applications to be run on the network Data and devices to be shared Speed requirements (bandwidth) Level of security Reliability of the network Connectivity requirements 44

23 Building the Network Physical environment temperature control availability/placement of outlets Physical configuration location of devices how are devices connected location/length of cable runs hardware configurations (hosts, servers) Logical configuration size of broadcast & collision domains IP addressing scheme Naming Permissions Sharing 45 Multifunction Devices Integrated routers Linksys wireless router problem = single point of failure Cisco Integrated Services Router (ISR) performs services of three different devices router switch wireless access point 46

24 Implement and Document the Network Develop a prototype tests network design 47 Sharing Resources Main reason for networking sharing resources File sharing Print sharing Consider this before sharing: security issues permissions granted Windows XP and Windows 7 users use Simple File Sharing (default) 48

25 Simple file sharing in Windows 7 It is pretty easy and common It is to be used to share file/folder with other users that use Windows XP, Vista or 7 in the same workgroup. Other users are allowed to access the shared file/folder without doing authentication with username and password, and so we call it simple file sharing. However, please don t enable this simple file sharing when your computer is connected to public network (at library, airport, restaurant, etc), because the other public users can also access the shared file/folder without authentication after you have enabled it. It s not safe! 49 Summary Information networks carry data using hosts as clients, servers, or both. All computer communication involves a source, destination, and channel. Rules called protocols govern computer communications. Larger networks are divided into smaller, more manageable ones using a layered hierarchical design. Each network host needs both a physical MAC address and a logical IP address. Good network design requires a network plan. 50

Connecting to the Network

Connecting to the Network Connecting to the Network Networking for Home and Small Businesses Chapter 3 1 Objectives Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols.

More information

Full file at

Full file at Guide to Networking Essentials, Sixth Edition 2-1 Chapter 2 Network Hardware Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives Tips Quick Quizzes Class Discussion Topics

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide CCNET v6 1 Chapter 3: Network Protocols and Communications CCENT Routing

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview Internetwork Expert s CCNP Bootcamp Hierarchical Campus Network Design Overview http:// Hierarchical Campus Network Design Overview Per Cisco, a three layer hierarchical model to design a modular topology

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Lab Using Wireshark to Examine Ethernet Frames

Lab Using Wireshark to Examine Ethernet Frames Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Linux System Administration

Linux System Administration IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Chapter 2. Switch Concepts and Configuration. Part I

Chapter 2. Switch Concepts and Configuration. Part I Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Network Security Fundamentals

Network Security Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

LOCAL AREA NETWORKS Q&A Topic 4: VLAN

LOCAL AREA NETWORKS Q&A Topic 4: VLAN A. Indicate whether the sentence or statement is true or false: 1. VLANs are more flexible in handling moves and additions of ports than routers 2. VLANs logically segment the physical LAN infrastructure

More information

Chapter 3: Network Protocols and Communications. Introduction to Networks v5.1

Chapter 3: Network Protocols and Communications. Introduction to Networks v5.1 Chapter 3: Network Protocols and Communications Introduction to Networks v5.1 3.0 Introduction 3.1 Rules of Communication 3.2 Network Protocols and Standards 3.3 Data Transfer in the Network 3.4 Summary

More information

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask 1 2 3 4 5 6 7 8 9 10 Unit C - Network Addressing Objectives Describe the purpose of an IP address and Subnet Mask and how they are used on the Internet. Describe the types of IP Addresses available. Describe

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

Hands-On Network Security: Practical Tools & Methods

Hands-On Network Security: Practical Tools & Methods Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed. LAN interconnecting devices INTRODUCTION LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed. Connecting devices

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router

More information

Extending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10

Extending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10 Extending the LAN Info 341 Networking and Distributed Applications Context Building up the network Media NIC Application How to hook things together Transport Internetwork Network Access Physical Internet

More information

Fundamentals of Networking Network Terminologies

Fundamentals of Networking Network Terminologies Fundamentals of Networking Network Terminologies Kuldeep Sonar 1 Performance Measurements Kuldeep Sonar 2 Latency Refers to the amount of time (usually measured in milliseconds) it takes for data to travel

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1 Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following

More information

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

CCNA 1 Chapter 5 v5.0 Exam Answers 2013 CCNA 1 Chapter 5 v5.0 Exam Answers 2013 1 2 A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Introduction to OSPF

Introduction to OSPF Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license

More information

Switching & ARP Week 3

Switching & ARP Week 3 Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly

More information

2. What is a characteristic of a contention-based access method?

2. What is a characteristic of a contention-based access method? CCNA 1 Chapter 5 v5.0 Exam Answers 2015 (100%) 1. Which statement is true about MAC addresses? MAC addresses are implemented by software. A NIC only needs a MAC address if connected to a WAN. The first

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

The Internet software layers

The Internet software layers 1 2 The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF Ethernet, Wireless LAN, Token Ring Twisted pair, coaxial, microwave, optical fiber 3 4 Ethernet 1973 Xerox s researcher

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

VLANs Level 3 Unit 9 Computer Networks

VLANs Level 3 Unit 9 Computer Networks VLANs Some Requirements of LANs Need to split up broadcast domains to make good use of bandwidth People in different departments may need to be grouped together for access to servers Security: restrict

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

Homework 3 Discussion

Homework 3 Discussion Homework 3 Discussion Address Resolution Protocol (ARP) Data Link Layer Network Layer Data Link Layer Network Layer Protocol Data Unit(PDU) Frames Packets Typical Device Switch/Bridge Router Range Local

More information

Chapter 3. The Basics of Networking

Chapter 3. The Basics of Networking Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles

More information

Ethernet 101 Siemens Industry Inc All rights reserved. usa.siemens.com/industry

Ethernet 101 Siemens Industry Inc All rights reserved. usa.siemens.com/industry Connected Manufacturing Ethernet 101 usa.siemens.com/industry Why Ethernet Ethernet is Everywhere! Page 2 Ethernet is everywhere Ethernet is the most common computer networking medium Standardization on

More information

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols 1 Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

CCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks

CCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks CCNA Exploration Network Fundamentals Chapter 10 Planning and Cabling Networks Updated: 15/07/2008 1 10.0.1 Introduction 2 10.0.1 Introduction The following have been covered in previous chapters: considered

More information

MODEL ANSWER PAPER SUBJECT: COMPUTER ORGANIZATION & OPERATING SYSTEM (THEORY)

MODEL ANSWER PAPER SUBJECT: COMPUTER ORGANIZATION & OPERATING SYSTEM (THEORY) MODEL ANSWER PAPER SUBJECT: COMPUTER ORGANIZATION & OPERATING SYSTEM (THEORY) STD: XII Max Marks: 50 Course: Computer Technique Time: 2 hrs Q1A.) Fill in the blanks by choosing the appropriate words from

More information

The Features and Uses of Computer Networking. Unit 11 Task 1

The Features and Uses of Computer Networking. Unit 11 Task 1 The Features and Uses of Computer Networking Unit 11 Task 1 Features Office Network Peer to peer A peer to peer network is mostly used in homes or small businesses. The network consists of two or more

More information

Chapter 9 Ethernet Part 1

Chapter 9 Ethernet Part 1 Chapter 9 Ethernet Part 1 Introduction to Ethernet Ethernet Local Area Networks (LANs) LAN (Local Area Network) - A computer network connected through a wired or wireless medium by networking devices (s,

More information

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Hubs. twisted pair. hub. 5: DataLink Layer 5-1 Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management

More information

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

CCNA 1 Final Exam Answers UPDATE 2012 eg.1 CCNA 1 Final Exam Answers UPDATE 2012 eg.1 January 12th, 2012AdminLeave a commentgo to comments Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255

More information

Different network topologies

Different network topologies Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 100-101 EXAM QUESTIONS & ANSWERS Number: 100-101 Passing Score: 800 Time Limit: 120 min File Version: 35.5 http://www.gratisexam.com/ CISCO 100-101 EXAM QUESTIONS & ANSWERS Exam Name: CCNA Interconnecting

More information

Although the CCNA certification exams test you on some difficult and in-depth networking

Although the CCNA certification exams test you on some difficult and in-depth networking Chapter 1 Networking Devices, Technologies, and Models Although the CCNA certification exams test you on some difficult and in-depth networking issues, the ICND1 exam also tests you on basic networking

More information

Chapter 5: Ethernet. Introduction to Networks - R&S 6.0. Cisco Networking Academy. Mind Wide Open

Chapter 5: Ethernet. Introduction to Networks - R&S 6.0. Cisco Networking Academy. Mind Wide Open Chapter 5: Ethernet Introduction to Networks - R&S 6.0 Cisco Networking Academy Mind Wide Open Chapter 5 - Sections 5.1 Ethernet Protocol Describe the Ethernet MAC address and frame fields 5.2 LAN Switches

More information

Internetwork Basic. Possible causes of LAN traffic congestion are

Internetwork Basic. Possible causes of LAN traffic congestion are Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) March 19 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks Reliable

More information

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1 Ethernet Network Fundamentals Chapter 9 1 Objectives Identify the basic characteristics of network media used in Ethernet. Describe the physical and data link features of Ethernet. Describe the function

More information

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1 Ethernet Network Fundamentals Chapter 9 1 Objectives Identify the basic characteristics of network media used in Ethernet. Describe the physical and data link features of Ethernet. Describe the function

More information

CCNA. Course Catalog

CCNA. Course Catalog CCNA Course Catalog 2012-2013 This course is intended for the following audience: Network Administrator Network Engineer Systems Engineer CCNA Exam Candidates Cisco Certified Network Associate (CCNA 640-802)

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub Ethernet -- Topology: Ethernet MAC: Hub Single collision domain Hub Hub Relay Collision! After a collision, stop for a random time wait for a random time, then try again. (Walrand/Varaiya slides) - computers

More information

Configuring your VLAN. Presented by Gregory Laffoon

Configuring your VLAN. Presented by Gregory Laffoon Configuring your VLAN Presented by Gregory Laffoon 1 Overview of Networking Terms Networking Terms Overview OSI Model Defines a networking framework for implementing protocols in seven layers Control is

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3 The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

Chapter 5 Reading Organizer After completion of this chapter, you should be able to: Chapter 5 Reading Organizer After completion of this chapter, you should be able to: Describe the operation of the Ethernet sublayers. Identify the major fields of the Ethernet frame. Describe the purpose

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

7010INT Data Communications Lecture 7 The Network Layer

7010INT Data Communications Lecture 7 The Network Layer Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies 1. Explain different network devices in detail. Or Explain NIC (Network Interface Card) in detail. Network interface cards are add on cards as hardware cards on the motherboard. This is additional hardware

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁 I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network

More information

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand Jan May 2018 Computer Networks รศ.ดร.อน นต ผลเพ ม Assoc. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand

More information

Networking Devices. Punch_down panels

Networking Devices. Punch_down panels Networking Devices Punch_down panels Hubs Switches Bridges Routes Gateways Network Interface Cards (NICs) Wireless access points Modems 1 Punch_down panels Wiring closets Labeling schemes 2 1 Hubs The

More information

Routing Between VLANs Overview

Routing Between VLANs Overview Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Chapter 9. Ethernet. Part II

Chapter 9. Ethernet. Part II Chapter 9 Ethernet Part II CCNA1-1 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks must go

More information

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D.

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Nov 2012 Mar 2013 Computer Networks รศ.ดร.อน นต ผลเพ ม Assoc. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

Chapter 6. The Protocol TCP/IP. Introduction to Protocols Chapter 6 The Protocol TCP/IP 1 Introduction to Protocols A protocol is a set of rules that governs the communications between computers on a network. These rules include guidelines that regulate the following

More information