Chapter 3.8 Common Network Environments, Connectivity and Security Issues

Size: px
Start display at page:

Download "Chapter 3.8 Common Network Environments, Connectivity and Security Issues"

Transcription

1 Chapter 3.8 Common Network Environments, Connectivity and Security Issues 3.8 (a) Different media for transmitting data and their carrying capabilities. Most of this is covered in Chapter 1.5 in the AS text. Remember that questions may be asked on any part of the A Level Computing syllabus in the exam for module 3. In computer networking and computer science, bandwidth is a measure of available or consumed data communication resources expressed in bits/second or multiples of it (kilobits/s, megabits/s etc.) or simply saying bandwidth is the amount of data that can be transmitted in a fixed amount of time. Bandwidth is a fundamental measure of performance within any communication network, whether it is an analogue system such as radio or a digital system such as a network. Nowadays we are getting used to with video conferencing services like Skype, we want to watch movies over Internet at YouTube and download bigger files and for that we opt and pay more to get higher bandwidth at home and office for Internet connectivity. Supposedly the fastest link is within the telecom network itself; however, the slowest link is the low bandwidth link between the local ISP and the home router/modem. Sometimes it is limited by your choice of the opted bandwidth and sometimes by the type of transmission media between your computer and the provider. This chapter will take you through the most important points you need to know about and the kind of network media (wired and wireless) used in modern digital networks and make you able to compare their performances. Page 1 of 14

2 Physical media; wires: One of the key elements that determine bandwidth is the physical nature of the cable being used. A signal becomes weaker and dies down eventually the longer it travels along a cable. Therefore the length of cable determines the bandwidth of the link. For instance the bandwidth of a broadband DSL connection to the home is determined by the length of copper cable between the house and the nearest telephone exchange. Coaxial cable consists of a solid copper core surrounded by insulation which is then surrounded by a copper shielding and finally covered with a plastic sheath. Coaxial cable is widely used for television wiring as it has enough bandwidth to handle a television signal over a typical run from antenna to television. Computer networks also use coaxial cable with a bandwidth of 10Mbps. But for high speed networks (100 Mbps and above) coax cable is no longer sufficient. Copper screen Central conductor Plastic insulators Coaxial Cable Twisted pair cabling is a type of wiring in which two conductors (wires) are twisted together for the purposes of cancelling out electromagnetic interference from external sources or other twisted pairs. It was invented by Alexander Graham Bell. Twisted pair is used to gain enough bandwidth higher than coax cable. Unshielded twisted pair (UTP) cable Unshielded twisted pair or UTP cables are found in many local area networks and telephone systems. A typical subset of these colours (white/blue, blue/white, white/orange, orange/white) shows up in most UTP cables as shown above. UTP cable is the most common cable used in computer networking and is often used in LAN because of its relatively lower costs compared to optical fibre and coaxial cable. UTP is also finding increasing use in video applications, primarily in security cameras. Page 2 of 14

3 Shielded twisted pair (STP) cables are often copper shielded in an attempt to prevent electromagnetic interference and so allow bandwidth to be higher for any given length. This shielding can be applied to individual pairs, to the collection of pairs or both. Shielded twis ted pair or STP Copper cable is adequate for network cable runs for up to 100 meters, but above that the signal becomes too weak, therefore an alternative technology is needed. Fibre optics is a technology that uses glass (or plastic) threads (fibres) to transmit data. A fibre optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. Fibre optic cable. Fibre optics has several advantages over traditional metal communications lines: Fiber optic cables have a much greater bandwidth than metal cables. This means that they can carry more data. Fiber optic cables are less susceptible than metal cables to interference. Fiber optic cables are much thinner and lighter than metal wires. Data can be transmitted digitally (the natural form for computer data) rather than analogically. The main disadvantage of fibre optics is that the cables are expensive to install. In addition, they are more fragile than wire and are difficult to splice. Fibre optics is a particularly popular technology for local-area networks. In addition, telephone companies are steadily replacing traditional telephone lines with fibre optic cables. In the future, almost all communications will employ fibre optics. Page 3 of 14

4 Wireless networks: Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves. Wireless Network If you've been in an airport, coffee shop, library or hotel recently, chances are you've been right in the middle of a wireless network. Many people also use wireless networking, also called WiFi or networking, to connect their computers at home, and some cities are trying to use the technology to provide free or low-cost Internet access to residents. In the near future, wireless networking may become so widespread that you can access the Internet just about anywhere at any time, without using wires. WiFi has a lot of advantages. Wireless networks are easy to set up and inexpensive. They're also unobtrusive -- unless you're on the lookout for a place to use your laptop, you may not even notice when you're in a WiFi hotspot. Page 4 of 14

5 Choosing the appropriate network medium is a must knowledge for answering questions for the given scenario in CIE exams. Following points must be considered: Speed (Bandwidth): Speed or bandwidth is especially important when transmitting large files. Industrial standards specify the performance/bandwidth of the medium. Fiber Optic up to 2.5 Gbps Twisted pair Cat 6 up to 1000 Mbps UTP Coaxial cable 1000 Mbps g up to 54Mbps n Greater than 100Mbps Bluetooth 700 kbps - 1 Mbps Distance: The further that data travels the signal becomes attenuated (become weaker). Distances may be affected by the environment and the amount of network noise (interference). Twisted pair Cat 5e/6 distances of up to 100m Fiber Optic 2 Kilometers Coaxial cable 500 m WiFi n Up to 100m Bluetooth 10 m Infrared IrDa 1 m Environment: Interference (static) that destroys the integrity of signals on a medium line. Noise can come from a variety of sources, including radio waves, nearby electrical wires, lightning, and bad connections. One of the major advantages of fibre optic cables over metal cables, light and radio waves is that they are much less susceptible to noise. Security: The less susceptible to electromagnetic interference (EMI) the less prone to eavesdropping. Fibre Optic Cables are not susceptible to EMI. Twisted Pair Less Susceptible UTP Very Susceptible STP Good resistance Coaxial Good resistance WiFi Very Susceptible Cost: You pay for speed, distance and security. The most expensive and difficult cable to install is Fibre Optic. The cheapest and easiest cable to install is twisted pair. Wireless networking is relatively inexpensive and very easy to install but there is a greater need for router encryption. Page 5 of 14

6 What is attenuation? Attenuation is the data loss experienced in a transmission media as a function of length. Attenuation increases as the distance a signal increases. Attenuation will eventually prevent a signal reaching its intended destination. Page 6 of 14

7 3.8 (b) Network Components A possible use of modem and switch/router in a home or office. Switches use the same type of wiring as hubs. However, each connector has full network speed. A typical layout is shown in Fig. 3.8 (b)1. Here, each station has full speed access to the server. However, if any of these stations wish to access the main network, they would have to share the connection to the main network. Stations S W I T C H To main network Server Page 7 of 14 Fig. 3.8 (b)1 If the number of stations is increased and they all want to access the main network, the increased local speed would be less useful because of sharing access to the main

8 network. In a case like this, it may be necessary to upgrade the link to the main network. A router is used to connect different types of network together. A router can alter packets of data so that two connected networks (LANs or WANs) need not be the same. Routers use network addresses and addresses of other routers to create a route between two networks. This means that routers must keep tables of addresses. These tables are often copied between routers using routing information protocol (RIP). Routers enable public networks to act as connections between private networks as shown in Fig. 3.8 (b)2. LAN Router Public network Router LAN Fig. 3.8 (b)2 In order to route data round a network, a router takes the following steps. 1. Router receives a network level packet. 2. Network destination address is checked. 3. Packet is sent to the appropriate network. Note that, in the case of the Internet, the destination address is the IP address. Basically, a router determines the fastest way possible, which is also usually the shortest way possible, in a particular network. It has the capability to route the packets through the most effective determined route. Routers have the ability to allow hosts that aren t practically on the same logical network, to be able to communicate with each other. Every router can receive chunks of data, which are called packets, on an interface. It will then forward the data packets to the intended location in the most efficient manner. The directing, or routing, of packets is based on the routing table, by allowing routers to know where a particular network is found. Aside from being a device, a router can be software in a computer. Routers should be, at least, connected to two networks. It is sort of a gateway to another network. Functionally, it is capable of generating traffic between logically separated networks. The third layer, which is the network layer of the OSI model, is where routers operate. Understanding the OSI model is the key to figuring out differences between routers, Page 8 of 14

9 gateways and bridges. The network layer is responsible for moving packets from a particular port to another. A bridge, or network bridge, is a device that can also connect networks, but unlike a router, its operation does not include the network layer of the OSI model. Only the one and two layers are included in a bridge s operation the physical layer and the data link layer respectively. It can only connect existing networks that you can access. It is basically not concerned with, and is unable to distinguish networks, unlike a router. They can only be used when you intend to connect networks of same type. In bridging mode, the process does not bother to understand network communications protocol, such as IP addresses. It only recognizes and considers the physical means, like the Media Access Control (MAC) address, which is usually an Ethernet. Thus, traffic will only exist in a bridged network if the networks concerned are logically the same. In terms of practicality, routers are more favoured, because routing is more efficient and offers easier call management. Bridging is required for cases where you cannot subnet an IP network and for cases where you need to utilize non-routable protocols. A router, or routing, is considered more intelligent than a bridge, or bridging, because they make smarter decisions. It only sends a packet to its intended destination, eliminating unnecessary traffic. With regards to routers, there is improved call management, while for bridging, call management and performance is sacrificed, as packets are automatically broadcasted to all the computers on a network. Summary: 1. Routers are more intelligent than bridges. 2. Routers allow hosts that aren t practically on the same logical network to be able to communicate with each other, while bridges can only connect networks that are logically the same. 3. Routers operate at the layer 3 (network layer) of the OSI model, while bridges are only at the layer 2 (Data link layer). 4. Routers understand and consider IP and IPX addresses, while bridges do not, and instead they recognize MAC addresses. 5. Routing is more efficient, and has better call management, than bridging. Modems are needed to convert analogue data to digital data and vice versa. A modem combines the data with a carrier to provide an analogue signal. This means that ordinary telephone lines can be used to carry data from one computer to another. Page 9 of 14

10 3.8 (c) Common Network Environments Probably the largest network in use is the Internet. The internet provides facilities to link computers world-wide, usually using telecommunications systems. It allows fast communications between people, the transfer of data between computers and the distribution of information. Messages are passed from the source computer, through other computers, to the destination computer. The Internet provides the World Wide Web, electronic mail, file transfer. In order for this system to work, there are Internet Service Providers (ISP) who connect a subscriber to the backbone of the Internet. These providers then pass data between them and onto their respective clients. Fig. 3.8 (c)1 shows how data, including electronic mail, are passed from one computer to another. Fig. 3.8 (c)1 An intranet is a network offering the same facilities as the Internet but solely within a particular company or organisation. An intranet has to have very good security for confidential information. Sometimes the organisation allows the public to access certain parts of its intranet, allowing it to advertise. This Internet access to an intranet is called an extranet. Suitable software is required to make these systems work. Browsers allow a user to locate information using a universal resource locator (URL). This is the address for data on the Internet. The URL includes the transfer protocol to be used, for example http, the domain name where the data is stored and other information such as an individual filename. Page 10 of 14

11 e.g. will load the British Computer Society's home page. Domain names are held in an hierarchical structure. Each name is for a location on the Internet. Each location has a unique name. The names in the various levels of the hierarchy are assigned by the bodies that have control over that area. Consider the domain name PC195-staff.acadnet.wlv.ac.uk The domain is uk and the ac would be assigned to a particular authority. (In this case UKERNA). This authority would then assign the next part, i.e. wlv. As this is Wolverhampton University, it is responsible for all the parts prior to wlv. Those in charge of acadnet are responsible for PC195-staff. Each computer linked to the Internet has a physical address, a number called its IP (Internet protocol) address. This numeric address uniquely identifies the physical computer linked to the Internet. The domain name server converts the domain name into its corresponding IP address. Page 11 of 14

12 3.8 (d) Confidentiality of Data Once an organisation opens some of its network facilities up, there is a problem of confidentiality of data. An organisation may well wish that potential customers have access to their product database. However, they will not want them to have access to employee files. A first step is to encrypt the confidential data and this is addressed in the next Section. Another solution is to install firewalls. These sit between WANs and LANs. The firewall uses names, Internet Protocol addresses, applications, and so on that are in the incoming message to authenticate the attempt to connect to the LAN. There are two methods of doing this. These are proxies and stateful inspection. Proxies stop the packets of data at the firewall and inspect them before they pass to the other side. Once the packets have been checked and found to be satisfactory, they are passed to the other side. The message does not pass through the firewall but is passed to the proxy. This method tends to degrade network performance but offers better security than stateful inspection. Stateful inspection tracks each packet and identifies it. To do this, the method uses tables to identify all packets that should not pass through the firewall. This is not as secure as the proxy method because some data do pass through the firewall. However, the method uses less network resources. Another way of ensuring privacy of data is to use authorisation and authentication techniques. These are explained in the next Section. Page 12 of 14

13 3.8 (e) Encryption, Authorisation and Authentication Encryption is applying a mathematical function, using a key value, to a message so that it is scrambled in some way. There are many techniques for this. The problem is to make it virtually impossible for someone to unscramble the message. Clearly, whatever function is applied to the original message must be reversible. The problem is to make it very difficult for anyone to find the inverse of the original function. It also means that there is a problem of many people needing to decrypt a message. All these people need the key to unlocking the message. This makes it highly likely that an unauthorised person will get hold of this key. One method of overcoming this is to use Public Private Key technology. This involves the sender having a public key to encrypt the message and only the receiver having the private key to decrypt the message. Authentication is used so that both parties to the message can be certain that the other party is who they say they are. This can be done by using digital signatures and digital certificates. Digital signatures require encryption. Basically, a digital signature is code that is attached to a message. In order to understand how public key cryptography works, suppose Alice and Bob wish to send secure mail to each other: First, both Bob and Alice need to create their public/private key pairs. This is usually done with the help of a Certification Authority (CA). Alice and Bob then exchange their public keys. This is done by exchanging certificates. Bob can then use his private key to digitally sign messages, and Alice can check his signature using his public key. Bob can use Alice's public key to encrypt messages, so that only she can decrypt them. Page 13 of 14

14 A primary advantage of public-key cryptography is the application of digital signatures, which help combat repudiation, i.e. denial of involvement in a transaction. Since the owner keeps their private key secret, anything signed using that key can only have been signed by the owner. The predominant public-key algorithm is RSA, which was developed in 1977 by, and named after, Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA algorithm is included as part of Web browsers from Netscape and Microsoft and also forms the basis for many other products. How https works inside the browser using public private keys and certificates Page 14 of 14

(Network Programming) Basic Networking Hardware

(Network Programming) Basic Networking Hardware EEE 448 Computer Networks with (Network Programming) Basic Networking Hardware Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Agenda What is a network device? Network Media

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

3 Chapter Introduction. 3.2 Copper Cable

3 Chapter Introduction. 3.2 Copper Cable 3 Chapter 3 3.1 Introduction The Network Media is the device that physically carries the data from computer to computer. The three major types of network media are: Copper Cable Fiber-Optic Cable Wireless

More information

Chapter 9 Introduction to Networks

Chapter 9 Introduction to Networks Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations

More information

Chapter 4: Communication Technology. Solutions

Chapter 4: Communication Technology. Solutions Chapter 4: Communication Technology Solutions Summative Assessment Multiple-Choice Questions (MCQs) 1. Two examples of network are telephone and. a. Radio b. Transmission c. Globe d. All of the above 2.

More information

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming 2 TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming Network Technologies 3 4 Elements of the Network Sender

More information

Multiplexing (Recap)

Multiplexing (Recap) Multiplexing (Recap) Multiplexing How to transfer data between two sites once there is a digital link between them? Analog to Digital (A2D) conversion Human voice is a continuous signal in the range 0-4

More information

COMPUTER SKILLS COMP101

COMPUTER SKILLS COMP101 COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

The data transmission mode describes the direction of data flow. It is either simplex, half duplex or full duplex.

The data transmission mode describes the direction of data flow. It is either simplex, half duplex or full duplex. Data transmission Data transmission on a network involves serial transmission. It transfers data by sending one bit at a time through a single line. All data on a network is transferred using a data transmission

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Cable types and connectors Fiber A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. Fiber optics

More information

Discovering Computers Chapter 9 Communications and Networks

Discovering Computers Chapter 9 Communications and Networks Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

4.1 Introduction to Media and Devices

4.1 Introduction to Media and Devices Chapter 4 Network Hardware 4.1 Introduction to Media and Devices Many of the issues discussed in this course, such as topology, scalability, and speed, depend on hardware. Unlike many of your computer

More information

Transmission Media :- It can be broadly classified into two types

Transmission Media :- It can be broadly classified into two types Transmission Media :- It can be broadly classified into two types - Guided Transmission Media:- in this type of media, a physical path is established between source and destination. The signal or electrical

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn

More information

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they

More information

Physical Layer V What does the physical layer provide?

Physical Layer V What does the physical layer provide? SEMESTER 1 Chapter 8 Physical Layer V 4.0 90 Points 8.1.1 What does the physical layer provide? What are the four elements of delivering frames across the media? 8.1.2 What are the three basic forms of

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

Networking. Prof. Abdul Hameed

Networking. Prof. Abdul Hameed Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing

More information

Data Network and Telecommunications Systems

Data Network and Telecommunications Systems 1 Department of Computer Science and Information Systems, College of Business and Technology, Morehead State University Lecture 4 CIS 311 Introduction to Management Information Systems (Spring 2017) Data

More information

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Chapter 12 Behind the Scenes: Networking and Security 1 Networking Advantages Networks Increase productivity Enable the sharing of hardware resources Facilitate knowledge sharing Enable

More information

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service

More information

with its cables, connectors, Switches, Hubs and topologies

with its cables, connectors, Switches, Hubs and topologies Introduction to LAN www.mycsvtunotes.in with its cables, connectors, Switches, Hubs and topologies LAN Small interconnected computers or workstations within a building or small area up to 10 Kms. Small

More information

Transmission Media. Criteria for selection of media. Criteria for selection of media 2/17/2016. Chapter 3: Transmission Media.

Transmission Media. Criteria for selection of media. Criteria for selection of media 2/17/2016. Chapter 3: Transmission Media. Chapter 3: Transmission Media Marks- 20 Transmission Media Transmission media carries the information from sender to receiver. Different types of cables or waves to transmit data. Data is transmitted through

More information

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS GAYATRI COMPUTERS Prepared by : VENKAT.G 1 What is Networking? Module 1: NETWORK BASICS Networking: Connecting two or more computers or network devices(routers/print Servers / Firewall Devices..etc) for

More information

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC Technology In Action, Complete, 14e (Evans et al.) Chapter 7 Networking: Connecting Computing Devices 1) A computer is two or more computers connected using software and hardware so that they can communicate

More information

COMMUNICATIONS AND NETWORKS

COMMUNICATIONS AND NETWORKS COMMUNICATIONS AND NETWORKS Data Communications Data communications describes a process in which one computer transfers data, instructions, and information to another computer. The basic model for data

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY UNIT - I DATA COMMUNICATIONS 1.1 Data Communications 1. What is data communication? Explain its components Data communication is a process of transferring data electronically

More information

This PDF document is a sample chapter from the book...

This PDF document is a sample chapter from the book... This PDF document is a sample chapter from the book... To order this book, print the last page of this document. Copyright 2001 Society of Manufacturing Engineers Chapter 37 Manufacturing Networks 37.1

More information

Appendix B Networks, Routing, and Firewall Basics

Appendix B Networks, Routing, and Firewall Basics Appendix B Networks, Routing, and Firewall Basics This appendix provides an overview of IP networks, routing, and firewalls. Related Publications As you read this document, you may be directed to various

More information

NETWORKING 1. Internet 1.2. Standardized addressing

NETWORKING 1. Internet 1.2. Standardized addressing NETWORKING 1. Internet The uses and the actual physical size of the Internet grows day-to-day. It is an area of technology that is immersed in jargon and ignorance. Many people often confuse the World

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Introduction Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and

More information

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 04 Media and Devices College of Information Science and Engineering Ritsumeikan University Network Media and Devices l When you build a network, the network hardware may be used

More information

Cabling Infrastructure

Cabling Infrastructure Introduction Ethernet Banking on Structured Cabling Technology Drivers Classification of Cables Fibre-optic cable Cables in building Cabling Infrastructure Cabling systems address the networking requirements

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS PHYSICAL LAYER Physical (hardware) layer: lowest level layer of the Internet Model. - Contains the actual network hardware cables, antennas, network interfaces

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput

More information

Chapter 1: introduction

Chapter 1: introduction Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,

More information

Network Media and Layer 1 Functionality

Network Media and Layer 1 Functionality Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)

More information

Chapter 9. Ethernet. Part II

Chapter 9. Ethernet. Part II Chapter 9 Ethernet Part II CCNA1-1 Chapter 9-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks must go

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

Computer Networks and Internet

Computer Networks and Internet Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data

More information

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections Computers: Tools for an Information Age Chapter 7 Networking: Computer Connections Objectives Describe the basic components of a network Explain the methods of data transmission, including types of signals,

More information

Networking Jamie Tees

Networking Jamie Tees Ethernet is the main networking technology, UTP (Unshielded Twisted Pair) cabling is the main networking cable types, this cabling uses RJ-45 connectors either end. While UTP is the main type we have STP

More information

IT220 Network Standards & Protocols. Unit 4: Chapter 4 Transmitting Bits

IT220 Network Standards & Protocols. Unit 4: Chapter 4 Transmitting Bits 1 IT220 Network Standards & Protocols Unit 4: Chapter 4 Transmitting Bits Objectives Differentiate among major types of LAN and WAN technologies and specifications and determine how each is used in a data

More information

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model Network basics Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model Topic A Topic A: Network concepts Topic B: Network architectures

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

Networks. Computer Technology

Networks. Computer Technology Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication

More information

Comp277 Assignment 1 Fall 2011 Due 20 th December 2011 at 11:00am

Comp277 Assignment 1 Fall 2011 Due 20 th December 2011 at 11:00am Question 1 1. Which of the following are related to two crucial tasks of a network interface cards? a. Establishes and manages the computer s network connection b. Connect the different parts of a motherboard

More information

Cables and Connectors

Cables and Connectors Module 2 Cables and Connectors Twisted Pair Two wires that carry the data signals (one conductor carries a positive signal; one carries a negative signal). Two wires are twisted to reduce the effects of

More information

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

Computer science..pharmacy college

Computer science..pharmacy college Is the facility to transfer data to remote locations quickly & conveniently, the data is transferred by means of a telecommunication network. Note: Data communication is the transmission of electronic

More information

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1 Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling

More information

(Refer Slide Time: 00:31)

(Refer Slide Time: 00:31) Information Security 3 Sri M J Shankar Raman, Consultant Department of Computer Science and Engineering, Indian Institute of Technology Madras Module 48 Network access & physical media In this module we

More information

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing. Multiplexing: combining information streams from multiple sources for transmission over a shared medium Demultiplexing: separating a combination back into individual information streams CSIS 4222 Ch 11:

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

COMMUNICATION. Exchange of ideas, messages, or information between two communicating parties. SIMPLEX HALF DUPLEX FULL DUPLEX

COMMUNICATION. Exchange of ideas, messages, or information between two communicating parties. SIMPLEX HALF DUPLEX FULL DUPLEX COMMUNICATION Exchange of ideas, messages, or information between two communicating parties. SIMPLEX HALF DUPLEX FULL DUPLEX SIMPLEX In simplex transmission, communication can take place in only one direction.

More information

CSC Introduction to Computers and Their Applications

CSC Introduction to Computers and Their Applications CSC 170 - Introduction to Computers and Their Applications Lecture 6 An Introduction to Networks Communication Systems Networks can be classified in many ways; as a network user, you ll want to keep in

More information

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS) Pengantar Teknologi Informasi dan Teknologi Hijau Suryo Widiantoro, ST, MMSI, M.Com(IS) 1 Topics covered 1. From analog to digital age 2. Networks 3. Wired-communication data 4. Wireless-communication

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

Networking Devices. Punch_down panels

Networking Devices. Punch_down panels Networking Devices Punch_down panels Hubs Switches Bridges Routes Gateways Network Interface Cards (NICs) Wireless access points Modems 1 Punch_down panels Wiring closets Labeling schemes 2 1 Hubs The

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

Rab Nawaz Jadoon. Data Communication and Computer Networks DCS. Assistant Professor COMSATS IIT, Abbottabad. Department of Computer Science

Rab Nawaz Jadoon. Data Communication and Computer Networks DCS. Assistant Professor COMSATS IIT, Abbottabad. Department of Computer Science Data Communication and Computer Networks Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad COMSATS Institute of Information Technology Computer Communication Networks Data communications

More information

The Features and Uses of Computer Networking. Unit 11 Task 1

The Features and Uses of Computer Networking. Unit 11 Task 1 The Features and Uses of Computer Networking Unit 11 Task 1 Features Office Network Peer to peer A peer to peer network is mostly used in homes or small businesses. The network consists of two or more

More information

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn... What You Will Learn... Computers Are Your Future Chapter 3 The definition of bandwidth The bandwidth needs of a typical user How modems change digital signals into analog Transmission media and methods

More information

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Wired and Wireless Communication Copyright 2012

More information

Chapter 4: Network Access

Chapter 4: Network Access 4.0.1.1 Chapter 4: Network Access To support our communication, the OSI model divides the functions of a data network into layers. Each layer works with the layers above and below to transmit data. 4.0.1.2

More information

Objectives. Network Structure. Network Structure

Objectives. Network Structure. Network Structure 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Communicating over the Network Network Fundamentals Chapter 2 Chapter 1 1 Describe the structure of a network, including the devices

More information

Physical Layer Part 3

Physical Layer Part 3 Physical Layer Part 3 Transmission Media Networks: Transmission Media 1 Transmission Media Transmission medium:: the physical path between transmitter and receiver. Repeaters or amplifiers may be used

More information

Computer Networks and the internet. Daniel Graham Ph.D

Computer Networks and the internet. Daniel Graham Ph.D Computer Networks and the internet Daniel Graham Ph.D 1.1 What Is the Internet? The Internet is a computer network that interconnects hundreds of millions of computing devices throughout the world. As

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Cisco Cisco Sales Expert. Practice Test. Version

Cisco Cisco Sales Expert. Practice Test. Version Cisco 646-204 646-204 Cisco Sales Expert Practice Test Version 2.2 QUESTION NO: 1 Cisco 646-204: Practice Exam QUESTION NO: 2 Which two characteristics of optical networks data to be transmitted over extremely

More information

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router

More information

Review For Exam 2. Fundamentals of Data & Signals. Summary Questions. School of Business Eastern Illinois University

Review For Exam 2. Fundamentals of Data & Signals. Summary Questions. School of Business Eastern Illinois University School of Business Eastern Illinois University Review For Exam 2 March 9, 2010 Abdou Illia, Spring 2010 School of Business Eastern Illinois University Fundamentals of Data & Signals Summary Questions 3

More information

Introduction to Networking

Introduction to Networking Networking BASICS Introduction to Networking... 2 Network Media... 4 Network Design... 5 Network Architectures... 7 Protocols and Network Software... 9 1 Introduction to Networking A computer network is

More information

Sample. Overview of WAN Connections. Objectives. Module 1

Sample. Overview of WAN Connections. Objectives. Module 1 Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this module, you should be able

More information

NETWORK SECURITY ITEC 435

NETWORK SECURITY ITEC 435 NETWORK SECURITY ITEC 435 Agenda Chapter 2: Introduction to Networking Introduction to Networking Networking Fundamentals Reasons to Network Getting the Message Across Analog Information on an Analog Medium

More information

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless TRANSMISSION MEDIA LOCAL AREA NETWORK (LAN) TECHNOLOGY 10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless page - 2 LAN TECHNOLOGY Protocol What is a Protocol? A protocol is

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.1 Chapter 1 Introduction Text Book for this course Computer Networking:

More information

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved. Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction

06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction Local & Metropolitan Area Networks ACOE322 Lecture 1 Introduction 1 1. INTRODUCTION In this section we will cover : 1. Overview of data communications and networking 2. Definition and overview of LANs,

More information

networks List various types of networks and their

networks List various types of networks and their Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices Technology in Action Chapter 7 Networking: Connecting Computing Devices 1 2 Chapter Topics Networking fundamentals Network architecture Network components Peer-to-peer networks Ethernet networks Power-line

More information

Networking Fundamentals. An Introduction to Networks. tel: +44 (0) fax: +44 (0) web:

Networking Fundamentals. An Introduction to Networks. tel: +44 (0) fax: +44 (0) web: Networking Fundamentals An Introduction to Networks Official UK distribution partner tel: +44 (0)1457 874 999 fax: +44 (0)1457 829 201 email: sales@cop-eu.com web: www.cop-eu.com Course Content The following

More information

Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs Fourth Edition Visible Networks Chapter 5

Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs Fourth Edition Visible Networks Chapter 5 Visible Networks Chapter 5 Overview In this chapter, you will learn how to Describe the basic functions of a network, including identifying common devices and connectors Discuss the differences between

More information

COMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network.

COMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network. Q.1 Explain IP address. IP address is unique number of network device in network. Two IP address could not be same. Using this network we can connect the devices with each other. It is separated by dot(.).

More information

Lecture 4. Data Transmission Modes and Switching. Data Transmission & Switching 1-1

Lecture 4. Data Transmission Modes and Switching. Data Transmission & Switching 1-1 Lecture 4 Data Transmission Modes and Switching Data Transmission & Switching 1-1 Agenda Introduction to Data Transmission Modes Parallel and Serial Transmission Transmission Media Guided and unguided

More information

1. What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable 2.

1. What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable 2. 1. What type of network cable is used between a terminal and a console port? cross-over straight-through rollover patch cable 2. Refer to the exhibit. A network administrator has decided to use packet

More information

An electronic transmission of information that has been encoded digitally for storage and processing by computers.

An electronic transmission of information that has been encoded digitally for storage and processing by computers. An electronic transmission of information that has been encoded digitally for storage and processing by computers. Transmission of electronic data over some media. The media used to transmit may be guided

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information