FAQ: Network Topologies and Architecture
|
|
- Abraham Bond
- 5 years ago
- Views:
Transcription
1 Question 1: In a wide area network (WAN) environment, what topologies are used, and how are they structured? Answer 1: A local area network (LAN) structure is configured inside a campus or facility to provide local connectivity using bus, ring, star, mesh, or hierarchal topology. Similar layouts are used within a wide area network (WAN) topology. The difference is the technology used to connect them and the sites themselves. Inside each site, the typical topology is maintained; the site connections are based on the technology applied. The WAN bus can use leased or subscribed media to send data. When an organization has only a few sites, this topology usually is adequate. In city-to-city connection (pointto-point), T-carriers usually provide access from a local telephone exchange; for intercity connection (metropolitan area network or MAN), sites are supported by digital subscriber lines (DSL). Wide area network ring topology is similar to simple ring topology except that it connects sites in a physical ring instead of nodes in a logical ring. Again, it uses common carriers (telephone companies) to provide the distance connection (Davis & Rajkumar, 2004). For example, imagine the sites 1, 2, 3, and 4. Site 1 connects with dedicated T1 (Full) to Site 2; Site 2 connects to Site 3 with T-1 lines 3 to 4 with a DSL, and Site 4 to Site 1 with T1, creating a true ring. Modifying the ring would be difficult, and the cost involved would be high, so this WAN usually has a limited number of sites (normally not more than four or five) (Dean, 2006). 1
2 Wide area network star topology uses a central site as a distribution center (like a hub) connecting through dedicated lines to each subordinate site. This does create a single point of failure from the hubbed site stopping all communication within the WAN; however, if a subordinate site fails, the remaining site will still maintain connectivity. Extending the WAN star is relatively easy. It simply connects to the central site with the dedicated connection. This is why it is used by most organizations in a WAN environment (Dean, 2006). Wide area network mesh topology is just like the LAN mesh topology. All sites are directly connected through dedicated lines to all other sites. These are the most fault-tolerant WAN layouts because they provide multiple paths to send and receive data. If a route goes down, data can bypass that route and still reach their destination. There is a configuration within the mesh topology that permits separate branch connections from a primary site to a connected site 2
3 that is not in direct connection with all sites. This configuration is called a partial mesh WAN (Dean, 2006). Question 2: What is meant by a high-speed Ethernet network? Answer 2: A high-speed network usually refers to a network where the throughput exceeds 100 Mbps and the network connects to outside communication system configuring for a MAN or WAN environment (Dean, 2006). The standard throughput in local area networks (LANs) is between 10 Mbps and 100 Mbps; although, in some cases, depending on the topology and media, higher speeds are achieved. High-speed Ethernet, IEEE standard 802.3z, achieves transfer in the gigabit range. There are several types of gigabit Ethernet standards used today in networking (Dean, 2006): The standard 1000BASE-T can use twisted-pair CAT 5 or higher media with a range of 100 meters. The standard 1000BASE-CX, the standard uses twinaxial (dual core coaxial) with a range of 25 meters. The standard 1000BASE-LX relies on multimode fiber-optic cable (MMF) with a range of up to 550 meters; if single-mode fiber-optic (SMF) cable is used, the range is 5000 meters. 3
4 The standard 1000BASE-SX uses MMF and has a range of up to 500 meters (Dean, 2006). Additionally, there is media that supports 10 Gbps throughput: The standard 10GBASE-SR uses MMF and has a range of 300 meters. The standard 10GBASE-LR uses SMF and has a range of 10,000 meters. The standard 10GBASE-ER uses SMF and has a range of 40,000 meters. In all cases, the topology is star configuration (Dean, 2006). By definition, the term high-speed is based on network throughput. Extending the definition to systems outside the LAN (MAN/WAN), the standards available are 1000BASE-LX with SMF, 10GBASE-LR, and 10GBASE-ER. The maximum is only about 25 miles. The use of fiber-optic repeaters (concentrators) can extend the range creating a solely corporate owned high-speed network. These fiber-optic systems are expensive and require additional connectivity components. More often than not, corporations use leased services to extend their network using the telecommunication providers to outside the MAN configuration (Dean, 2006). Question 3: What is the T-carrier service, and how is it used? Answer 3: T-carrier is a leased WAN transmission method that uses digital transmission over high-speed public switched telephone network (PTSN). This service is 4
5 usually contracted through a network service provider (NSP). This high-speed network does not have the same throughput as the high-speed Ethernet fiber-optic network. The T-carrier method uses time division multiplexing (TDM), a system of streaming synchronized compressed data to provide a maximum of 64 Kbps over each channel. T1 contains 24 channels providing a throughput of Mbps. T1 can be dedicated to the full throughput or provide individual channels, called fractionalt1, to the users (Davis & Rajkumar, 2004). Each channel is equivalent to one voice circuit through a normal phone line (Dean, 2006). T1 can provide data packet switching and circuit switching as a transmission format. Similar to the T-carrier, Europe uses an E-carrier system. Europe's E1 provides 30 channels instead of 24 like in the United States. E1 has Mbps throughput. For the purpose of this discussion, the T-series will be addressed. T-carrier common designations are T1 and fractionalt1, both having total throughput of Mbps, and T3, which equates to 672 voice channels 45 Mbps (28 T-1s). T3 also has a fractional designation (Dean, 2006). With the T-carrier, full-dedicated channel allocation can approach high-speed Ethernet levels over wire cable system, but to meet true high-speed networking, users need to access SONET systems, a fiber-optic leased system (Dean, 2006). The following table displays the carrier specifications (Dean, 2006): FractionalT1 service provides a specified number of dedicated channels to the leaser. The contract provides the services based on actual use. It might be just one channel at 64 Kbps or bundled channels each providing 64 Kbps. For example, if a user needed 500 Kbps throughput available, then the lease 5
6 would be for 8 channels (7.8 channels required). If a user only needed access to T1 at night, then the lease would specify that as well. One pays for what one uses. Question 4: What are the various types of DSL, and what are their capabilities? Answer 4: Digital subscriber line (DSL) services are a WAN connection method designed in Bell Labs. DSL has a unique frequency. It works in bandwidths above 3300 Hz. It is limited to the distance from the service provider (telephone company-telco). The range from the source provider is between 1,000 ft and 26,000 ft depending on the technology implemented. Downstream refers to traffic from the Telco switching facility to the subscriber's throughput, and upstream traffic from the subscriber to the Telco throughput is also dependent on the implementation. The technology that offers more throughputs in one direction over the other is described as asymmetrical; balanced throughput is deemed symmetrical. The following DSL categories are available (Dean, 2006): ADSL (asymmetrical DSL) G.Lite (a kind of ADSL) HDSL (High Bit-Rate DSL) SDSL (Symmetric or Single-Line DSL) VDSL (Very High Bit-Rate DSL) SHDSL (Single-Line High Bit-Rate DSL) The following table is a comparison of DSL types (Dean, 2006): 6
7 Digital subscriber line requires unique equipment to establish its connection. It should be noted that the further away from the switching source (Telco), the less throughput that can be achieved. Connection is established using a DSL modem that manages the modulation of the signal. Knowing the difference between upstream and downstream will explain why. When using a DSL modem connected to the Internet at ADSL (full rate) mode, one can receive data from the connection faster than sending data to it (Dean, 2006). The connection is asymmetrical. When connected to the switching facility (Telco), the transmitted signal is sent to a DSL access multiplexer (DSLAM), which combines multiple DSL lines and streams them into a larger carrier or even the Internet. Note that DSL provides faster throughput than the T- carrier, but the range is severely constrained; therefore, in business, companies use DSL to the Telco and T-carrier within the service network (Dean, 2006). All implementation of DSL is established in the OSI physical layer. Question 5: How does a network manage remote access to the corporate network? Answer 5: Remote users access the corporate network using authentication protocols usually through a dial-up interface, DSL (digital subscriber line), VPN (virtual private network), or PBX (private branch exchange, which is a private telephone system) supported by an application gateway or proxy server [COEG1]. The proxy server acts as a filter between the public network (WWW and Internet) and the corporate network. Passage through the system is usually encrypted using IPSec (Internet Protocol Security a Network layer security mechanism), PPTP (Point-to-Point Tunneling Protocol a TCP connection-oriented Transport layer protocol that provides internal validation and acknowledgment), or L2TP Transport protocol (Layer 2 Tunneling Protocol transmitted in UDP a connectionless protocol. Connectionless means that no acknowledgment is given from the receiver, also known as best effort (Dean, 2006). Access may be granted using the digital signature (a record comparison of one's user ID and password), hashed password, user certificate, or using the RADIUS server (Remote Authentication Dial-in User Service) and log-on messages that are compared to the security server's database (Palmer, 2005). Remote access using the tunneling protocols (PPTP and L2TP) are implemented through specified ports established for these protocol 1723 and 1701 respectively. Accesses through other ports are denied. Internal authentication is applied through call back, certificate, or 7
8 private key. CHAP (challenge handshake authentication protocol) may be used or password authentication protocol (PAP) verifying the user. Question 6: What packet-switching technologies were designed for use for long-distance data transmission? Answer 6: Two prominent technologies were designed for long-distance transmission: X.25, an analog signal format, and frame relay, a digital signal format. X.25 was established by ITU as a standard for packet switching across the Internet at a maximum rate of 64 Kbps based on the standard voice rate. Later, the technology was updated and provided Mbps throughput. X.25 standard specifies protocols used with the physical, data link, and network layers in the OSI model. This protocol set supported excellent flow control but lost efficiency with transmitting digital-based information like audio and video data. X.25 was a dominant packet switching WAN technology for a long time (Dean, 2006). Frame Relay supplanted X.25 protocols as the standard technology because of its digital format. Frame Relay works in the Data Link layer of the OSI model and supports multiple Transport and Network layer protocols (TCP/IP and IPX/SPX). In digital format data, errors are minimized. Though Frame Relay can identify errors, it lets the higher layers correct them. Errors are identified, and a corrected packet is then resent. Frame Relay supports more throughput than X.25, ranging from 64 Kbps to 45 Mbps depending on the bandwidth the customer chooses. An issue with Frame Relay is that depending on the traffic on the network (WAN), the throughput may be established at one rate (the CIR-committed information rate) and fall below the guaranteed level. Midnight data would flow faster than midday when more traffic is on the network (Dean, 2006). Question 7: How is wireless technology applied to WAN? Answer 7: Wireless is becoming a new implementation in WANs (Dean, 2006). IEEE standard (Wi-Fi) and (WiMax) are being applied all over the world. Users are granted access to this standard by subscription; corporations are implementing mobile wireless networking as remote utilization or wireless broadband. All the processes applied to normal remote access are still required for wireless access. Most wireless transmission format is DSSS 8
9 (Phase 2). The most current technology for wireless WAN is wireless broadband designed for high throughput and distances-data exchange (Dean, 2006). IEEE standard is the base guideline supporting this technology. Connectivity is available at airports and coffee shops around the world. Cyber cafes are in major business locations, airports, and many hotels. These are designated as hotspots. Most provide wireless access to the Internet and company Web services. An access point (AP) is connected to a server, then the local ISP or service provider. Authentication is required to access company intranets, but World Wide Web access is directly available at these hotspots. Internal network (corporate access) is not as common. Throughput varies depending on which standard is implemented and the available technology for its connection. AP to wire is much faster than AP to wireless network access provider (range 11 Mbps-54 Mbps). Hard-wired connection usually uses standard Fast Ethernet (100 Mbps). The latest standard being developed for wireless access is N, which may have throughput up to 500 Mbps, although the technology is still experimental. Even with Super G, the rate is maximized at 110 Mbps. Pure wireless networks also have a major issue with system security and secure data transfer. The supporting system that is used would require data to be encrypted before transfer (Dean, 2006). 9
10 Question 8: What is SONET, and how is it used? Answer 8: SONET technology refers to a timing-based optical fiber network configuration that provides high-speed data transfer over a long distance. SONET stands for synchronous optical network. Its implementation is similar to fiber distributed data interface (FDDI) by running dual optical fiber rings within a WAN ring. Another term for this technology is synchronous digital hierarchy (SDH). SONET is one of the best choices between international connections because it has a low fault/error rate with transfers. All connected sites must be synchronized to a system clock to ensure continuity of traffic transfers (Dean, 2006). Synchronization is established during the handshake (communication request) between sites by the sending node. SONET is a Telco service option available by lease and service agreement. It can be maintained as purely optical, crossover to T-carrier, or implemented with DSL. Access to the SONET connections and multiplexer can be achieved with any WAN topology. The following table identifies the available throughput using SONET/SDH technology (Dean, 2006): Because of its high cost, it seems that only large businesses can effectively implement this technology. It is more often used internationally or by an ISP guaranteeing QoS and reliability. It works well for streamed data types audio, video, and imaging (Dean, 2006). SONET is known as a self-healing network. Damage to the network causes an automatic reroute of the traffic, which makes it one of the most reliable networks around (Dean, 2006). 10
11 Question 9: What types of satellite orbits, targeting systems, and common satellite frequencies are used with a WAN? Answer 9: Though not as common as other technology, satellites accessing the Internet and corporate networks is an application of wireless connectivity. Recently, several satellite bandwidths have been offered from the government's control to commercial utilization. Microwaves directed at satellite receivers (transponders) have become a more viable solution to low-frequency shorthaul data transfers. Short-haul refers to line-of-sight terrestrial transmissions approximately miles. Satellite orbits are in three distinct distances and positions above the Earth. Satellites orbiting above the equator are in geosynchronous or geostationary earth orbit (GEO) at an altitude of 22,300 miles. This means that these satellites stay in the same location above the Earth. One of the main reasons for satellite link is data relay; GEO works to relay data in all directions to Earth's surface. Satellites that are in orbit between the equator and the upper latitudes (imaginary bands around Earth running parallel to the equator toward the poles) at an altitude between 10,350 and 10,390 kilometers are called medium/middle earth orbit (MEO). They provide coverage to a wide range of Earth's surface. Satellites in orbit toward the poles circle at an altitude of 700 1,400 km and cover a considerably smaller area of the Earth's surface. Data transfers to satellites require an upload from a ground station. Power from the ground base to the satellite is higher because the power to 11
12 retransmit from the satellite to Earth (downlink) has to be generated from on-board solar panels and batteries, but the power to uplink is from a commercial power generation. There are two targeting methods used to downlink data. Small aperture downlink is best correlated with point-to-point transfer. The receiving satellite stations usually have an array of dishes to receive downlinks tuned to certain frequencies. The frequencies are generated from the transponder (which is not the same frequency originally used to uplink). Data sent to a frequencytuned satellite dish (the dish is listening to a certain frequency) are connected in a line of sight logical circuit (the satellite sends data to a target receiver, the dish, which may only be a few feet across (diameter of the dish make it small aperture) [COEG2]. This is called small aperture targeting. When data are sent to a frequency tuned array, the military and government agencies usually needing a large downlink (amount of information) or large dish receivers (SETI- search for extra-terrestrial intelligence Institute), stream the information to terrestrial dishes simultaneously. Commercial use of the frequencies are leased from the government though the Federal Communications Commission (FCC). The first three bands are just slightly above microware channels ( GHZ). The upper frequency 12
13 bands were recently made available for use. The military channels are not much higher (60GHz-128GHz) (Dean, 2006). Question 10: Internet addressing works with domain designation. What is meant by domain, and how is it used? Answer 10: The Internet uses a number-base addressing system called Internet protocol (IP) addressing ( ). Additionally, it uses a hierarchal addressing designation that defines domains (a group of nodes that is managed as a single unit LAN, network cluster, Web server group.). All computers within an organization are identified as a grouping for example, OSNET or SOPRO own their computers. The computers are connected to the corporate network and managed by the system administrators that would identify those computers in the owner's domain-control. Domains can be managed locally or distributed across several LANs connected to a MAN or WAN. A university might have a single domain, but domains might have domains too. Consider the following: The University of Anywhere has student access and faculty access as well as and Web services access. Not everyone has permission to access all nodes. One would not necessarily want the students accessing the faculty work area where the exams are being developed or stored. These areas are segregated. Each would be a subdomain of the University of Anywhere's domain. As one can see, the hierarchal configuration exists. What about the university being connected to other university networks? Each university (campus) has its own domain. What are the universities connected to state networks, regional networks, or the Internet? Each layer provides a domain that controls a group of similar subdomains. A service that is available is the DNS (domain names service). DNS is a TCP/IP application that provides coordination to the network (domain) controllers. It is used to identify each node within the domain with a unique name and IP address. Each level has this ability as well. The local listing (database) names the node for a local name, and the domain name is added to the local name. Example: A node in a network is called mikesnode. If the node is part of the University of Anywhere network, the mikesnode belongs to UOA. The domain designation would be mikesnode.uoa. If the UoA network were part of a county network, Reed County, then an additional extension for that domain 13
14 would be added as well (mikesnode.uoa.reed). The concept continues if the Reed County domain was a domain in the state of California's network (mikesnode.uoa.reed.ca). Each layer adds a moniker telling the network the path needed to reach a specific node and no node can be exactly the same the node name must be unique. The domain identification tells the network application the way to an end user's computer. The same constructs support topic specified domains. Several commonly used domain identifiers have been traditionally used with the Internet. Most countries have a country domain. For example,.gb,.ru,.jp, and.us represent Great Britain, Russia, Japan, and the United States respectively; even Togo, Africa, uses.tg. Other domains used include the following:.mil for military,.gov for government,.com for U.S. commercial,.org for nonprofit organizational domains,.edu for U.S. educational, and.net for U.S. networks. Uses of the domain names are separated by a period (.) between domain levels. Domains are used by network control devices to map the layer and location of the node (Davis & Rajkumar, 2004). 14
15 References Davis, W. S., & Rajkumar, T. M. (2004). Operating systems: A systematic view (6th ed.). Boston, MA: Addison-Wesley. Dean, T. (2006). Network+ guide to networks (4th ed.). Boston, MA: Thomson. Palmer, M. (2004). Guide to operating system security. Boston, MA: Thomson. 15
It is the process of sharing data, programs, and information between two or more computers.
1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet
More informationWide Area Networks (WANs) Slide Set 6
Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) WAN Purposes Link sites (usually) within the same corporation Remote access for individuals who are off-site Internet access for individuals
More informationNetwork basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model
Network basics Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model Topic A Topic A: Network concepts Topic B: Network architectures
More informationVISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks
Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.
More informationIntroduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services
More informationThe Internet and the World Wide Web
Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda
More informationVoIP Dictionary, Glossary and Terminology
VoIP Dictionary, Glossary and Terminology The following provides a glossary of terms and definitions that are commonly used in VoIP Solutions. We hope this will provide a good reference for you during
More informationTYPES OF COMPUTER NETWORKS
TYPES OF COMPUTER NETWORKS What is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications.
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationCSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.
Multiplexing: combining information streams from multiple sources for transmission over a shared medium Demultiplexing: separating a combination back into individual information streams CSIS 4222 Ch 11:
More information16/06/56. Communications and Networks. Communications and Networks. Communications and Networks
Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,
More informationChapter 9 Introduction to Networks
Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations
More informationStudy Guide. Module Three
Exam Three will draw questions four content areas: our textbook, our assignments, the Rackspace Web Hosting Tutorial, and our class lectures. The purpose of this guide is to help you focus your exam preparations.
More informationArea Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low
Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What
More informationLAN, MAN and WAN. Basics and Comparison. University of Damascus. Computer Engineering Dept. Digital Communications. By Abdulrahman Idlbi
In the name of Allah, the Most Gracious, the Most Merciful University of Damascus Computer Engineering Dept. Digital Communications LAN, MAN and WAN Basics and Comparison By Abdulrahman Idlbi Introduction
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG
Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we
More informationend systems, access networks, links 1.3 network core
Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,
More informationModule Three SG. Study Guide. Exam Three Content Areas. Module Three. Chapter Seven, Backbone Networks
SG Exam Three will draw questions from multiple content areas including: our networking textbook, our wireless electronic textbook, our assignments and our class lectures. The purpose of this guide is
More informationWAN Technology & Design. Dr. Nawaporn Wisitpongphan
WAN Technology & Design Dr. Nawaporn Wisitpongphan 1 WAN Connection Modules 2 WAN Comparison 3 Integrated Services Digital Network (ISDN) All-digital phone line connection Technology since 1980s Allow
More informationLecture 8 Winter 2006 Enterprise and Personal Communications Networks
Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service
More informationChapter 1: introduction
Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,
More informationA+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling
A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More informationObjectives. Learn how computers are connected. Become familiar with different types of transmission media
Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives
More informationChapter 9. Introduction. Communications
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. 1 Introduction Page 247 Cell phones and other wireless technologies are allowing
More informationCHAPTER -1. Introduction to Computer Networks
CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a
More informationIntroduction to Wireless Networking ECE 401WN Spring 2008
Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.
More informationWAN Technologies CCNA 4
WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationSample. Overview of WAN Connections. Objectives. Module 1
Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this module, you should be able
More informationInternet Access Technologies
Lecture 4: Local Loop Technologies, Internet Access and Leased Lines Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Internet Access Technologies
More informationSince enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time
Syllabus You can go to cs.rpi.edu and then Faculty and my website from my profile Or you can go to www.cs.rpi.edu/~holzbh Or to be very direct, you can go to www.cs.rpi.edu/~holzbh/ccn18/index.php 1 Textbook
More informationNavpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : navi@iitk.ac.in) About Myself About Myself I am Network Manager
More informationClass X Subject : IT (Vocational) Chapter -1 Ouestion / Answer
Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More information(Network Programming) Basic Networking Hardware
EEE 448 Computer Networks with (Network Programming) Basic Networking Hardware Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Agenda What is a network device? Network Media
More informationMultiplexing (Recap)
Multiplexing (Recap) Multiplexing How to transfer data between two sites once there is a digital link between them? Analog to Digital (A2D) conversion Human voice is a continuous signal in the range 0-4
More informationPengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)
Pengantar Teknologi Informasi dan Teknologi Hijau Suryo Widiantoro, ST, MMSI, M.Com(IS) 1 Topics covered 1. From analog to digital age 2. Networks 3. Wired-communication data 4. Wireless-communication
More informationTwelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1
Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Wired and Wireless Communication Copyright 2012
More informationVPNs. Communication Technologies Last Points (briefly) VPNs Technologies. Satellite Networks. Telemedicina e e-saúde 2009/2010
Communication Technologies Last Points (briefly) VPNs Virtual Private Networks Main objective o Enable communication between two LANs as if they were together and separated. Telemedicina e e-saúde 2009/10
More informationChapter 7. Telecommunications, the Internet, and Wireless Technology
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different
More informationChapter 6 The Internet
Chapter The Internet Computer Concepts 2014 Chapter Contents Section A: Internet Technology Section B: Fixed Internet Access Section C: Portable and Mobile Internet Access Section D: Internet Services
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.1 Chapter 1 Introduction Text Book for this course Computer Networking:
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationCommunications and Networks The McGraw-Hill Companies, Inc. All rights reserved.
Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,
More informationNetworks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces
Chapter 15 Computer and Multimedia Networks 15.11 Basics of Computer and Multimedia Networks 15.2 Multiplexing Technologies 15.3 LAN and WAN 15.4 Access Networks 15.5 Common Peripheral Interfaces 15.6
More informationModule 11. OSI Model, Network Devices, and Network Standards
Module 11 OSI Model, Network Devices, and Network Standards Objectives 1. Networking A.Differentiate between layers of the OSI model B.2.9 Compare network devices C.Compare network standards D.2.7 Compare
More informationPPP. Point-to-Point Protocol
PPP Point-to-Point Protocol 1 Introduction One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs,
More informationLecture #25: Networks and Communications. Communication and Networks. What will we learn?
Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What
More informationLocal Area Network(LAN)
Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building
More informationChapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant
More informationFINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material
FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding
More informationCS610- Computer Network Solved Subjective From Midterm Papers
Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source
More information1.264 Lecture 23. Telecom Enterprise networks MANs, WANs
1.264 Lecture 23 Telecom Enterprise networks MANs, WANs Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners
More informationINTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com
INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationA typical WAN structure includes the following components.
CBCN4103 WAN is a computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more LANs. A WAN is a network usually provided by a specialised company called a
More informationand Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai
Data Communications and Networks Second Edition ACHYUT S GODBOLE Managing Director SoftExcel Services Limited, Mumbai ATUL KAHATE Senior Consultant Oracle Financial Services Software Limited, Pune Tata
More informationIntroduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. LAN, MAN & WAN Network in small geographical
More informationChapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1
Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 How Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies DSL Cable modems
More informationCOMPONENTS OF DATA COMMUNICATION
COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.
More informationInternet. Networks. An Old Way of PC-PC Communication. global positioning system (GPS) PC A to floppy disk Then floppy disk to PC B
global positioning system (GPS) Step 1. GPS satellites orbit Earth. Every thousandth of a second, each satellite sends a signal that indicates its current position to the GPS server. Step 2. A GPS receiver
More informationNetwoking Essentials
Mark Sportack Walter J. Glenn Sams' Teach Yourself MCSE Netwoking Essentials SAMS PUBLISHING IN 14 DAYS Sams Publishing is an independant entity from Microsoft Corporation, and not affiliated with Microsoft
More informationend systems, access networks, links circuit switching, packet switching, network structure
Introduction Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and
More informationDiscovering Computers Chapter 9 Communications and Networks
Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe
More informationCommunication Networks
Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture
More informationLAN Systems. Bus topology LANs
Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong
More informationData Communications. Course Design Data Communications. Pre/Post Test (80 Questions/80 Points) Upon Request None No No No
Data Communications Course Design 2005-2006 Course Information Organization Division EASTERN ARIZONA COLLEGE Business Course Number CMP 205 Title Credits 3 Developed by Lecture/Lab Ratio Transfer Status
More informationModems, DSL, and Multiplexing. CS158a Chris Pollett Feb 19, 2007.
Modems, DSL, and Multiplexing CS158a Chris Pollett Feb 19, 2007. Outline Finish up Modems DSL Multiplexing The fastest modems Last day, we say the combinations and phases used to code symbols on a 2400
More informationComputer Networks and Internet
Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data
More informationComputers: Tools for an Information Age. Chapter 7 Networking: Computer Connections
Computers: Tools for an Information Age Chapter 7 Networking: Computer Connections Objectives Describe the basic components of a network Explain the methods of data transmission, including types of signals,
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?
What s the Internet? Hardware view: What s the Internet? Hardware view: PC server wireless laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication
More informationLecture (07) Fundamentals of WANs (I)
Lecture (07) Fundamentals of WANs (I) Dr. Ahmed M. ElShafee ١ Agenda What is WAN? What is MAN? OSI layer1 of WANs Circuit switching services Packet Switching Services ٢ What is WAN? LAN standards and protocols
More informationSRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : BCA Semester /Year : EVEN / III Subject Name : Data
More informationNetworks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces
Chapter 15 Computer and Multimedia Networks 15.11 Basics of Computer and Multimedia Networks 15.2 Multiplexing Technologies 15.3 LAN and WAN 15.4 Access Networks 15.5 Common Peripheral Interfaces 15.6
More informationChapter 8: Multiplexing
NET 456 High Speed Networks Chapter 8: Multiplexing Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education - Prentice
More informationIT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview
IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate
More informationCSC Introduction to Computers and Their Applications. Background
CSC 170 - Introduction to Computers and Their Applications Lecture 7 The Internet Background The history of the Internet begins in 1957. In a response to the Soviet Union launching Sputnik, the first man-made
More informationTypes of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11
Types of Computer Networks ICS 614: Computer Networks Concepts and Principles 11 Types of networks Networks are categorized by distribution, size, and architecture. A network can be as simple as a single
More informationINTRODUCTION TO ICT.
INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO
More informationChapter. 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall
Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall STUDENT LEARNING OBJECTIVES What are the principal components
More informationWireless 300N ADSL2+ Modem Router For ADSL (Annex A), 300 Mbps Wireless n, MIMO, QoS, with 4-Port 10/100 Mbps LAN Switch Part No.
Wireless 300N ADSL2+ Modem Router For ADSL (Annex A), 300 Mbps Wireless 802.11n, MIMO, QoS, with 4-Port 10/100 Mbps LAN Switch Part No.: 524780 The INTELLINET NETWORK SOLUTIONS Wireless 300N ADSL2+ Modem
More informationChapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...
What You Will Learn... Computers Are Your Future Chapter 3 The definition of bandwidth The bandwidth needs of a typical user How modems change digital signals into analog Transmission media and methods
More informationOverview of Networks
CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and
More informationGLOSSARY OF CELLUAR TERMS
GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service
More informationComputer science..pharmacy college
Is the facility to transfer data to remote locations quickly & conveniently, the data is transferred by means of a telecommunication network. Note: Data communication is the transmission of electronic
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationNetwork Connectivity and Mobility Part 2
Network Connectivity and Mobility Part 2 BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1.
More informationend systems, access networks, links circuit switching, packet switching, network structure
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationChapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security
Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationData Network and Telecommunications Systems
1 Department of Computer Science and Information Systems, College of Business and Technology, Morehead State University Lecture 4 CIS 311 Introduction to Management Information Systems (Spring 2017) Data
More informationT e l e c o m m u n i c a t i o n s, t h e i n t e r n e t, a n d W i r e l e s s t e c h n o l o g y
T e l e c o m m u n i c a t i o n s, t h e i n t e r n e t, a n d W i r e l e s s t e c h n o l o g y C h a p t e r 7 Jun Akizaki The Power of PowerPoint WELCOME group members: 1. Dewi Setyani 16808144017
More informationElectrical and Computer Engineering Technology
ECET 3400 Spring 2012 Data Communications Southern Polytechnic State University Electrical and Computer Engineering Technology Instructor Information Instructor: Dr. Craig A. Chin, Assistant Professor
More informationBroadband Communication
Broadband Communication Enjoy a Triple Play Networking Trend in xdsl Technology Several types of DSL technology have implemented nowadays and adopted by PLANET broadband solutions to fulfill customer s
More informationPart I: Introduction. 1: Introduction 1
Part I: Introduction Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet what s a protocol?
More information