PDF / /!

Size: px
Start display at page:

Download "PDF / /!"

Transcription

1

2 // PDF!

3 Main Mini P.C! "# $# %#& '() $# " Package :.+ * '+,, '(-!. / $ 0! 1 2#! : &+# ' User & 5!(.14 5!( 67 * $"8 5!( 9 ( Ram) 6; $<1= 0""+ A#9 $<1= 0""+ : Single user '! Multi user ' +,! Multi programming!

4 Main) ( ر.+, 1 %6"1 BC D"! * 01EF %C "(.+, *C & $1; $ B*G H,.0! I ' +,! ( J&(F 0!.0! #!)!." ( BAIF $% +,#! 9 56K Main) ( ر.+,,K# 'L " & 2+ M ( HC (! 4.0! I *C $CA & NOKP!." +%L# $,".0! $CA & (*+7 'L " (+P! " ( *C." +, $( " *C & 0!.CK B & Q" DQ!* 5Q#C & '(-Q! R+Q=.Q" $ +# '(-! H, 5 +,# %, ' +,.0! *C.0!.CK S ( T ( * CI! $P! : Q Q! ( J&(QF "& +( V 0! $! U!F B& 'L " (+P 5; $Q% * Q! & '(-Q! Q BQ J&Q) UNIX QX Q Q Q! & '(-Q! 06 $ W.+ CI Y!, $#

5 : +Q,#Q * +Q#( \QA L"+QC" Q [QA /Q7 Q" Z"[ & $ G +, & $K8.+,( 28# '(( HG# 56K! " # $%& ' Local Area Network ( Lan) 67 $CA " Z"[ & 5*( "! " \A & 0 A 67 $CA.(*+7 "1]9 '(*+7 " (! " K $ * B#R " 07 /7 Wide Area Network ( Wan ) '( 4 $CA Lan."+, & Wan " ^ ( X ( * +#+# "1]9 0"(*+7 Wan $CA."L <# ( Wan."4 0#," B +" Q ( (8" L"+C" /A : # %&( ) *+,-. *C ("& (+P Q "# *, " & B( ( '*_ 67 $CA.+#( # (! /7 (. $CA ( * =[ $,& ( 66K`. * 6 (+#! B+) (9* $.+, T $P! 06R ( 67 $CA K7 $[ B&! $ 1a $," * +" $P! B&! &# 2LK! 67 $CA " (.+,K#.+, B,K[ R * "bf cdp# 67 $CA ^ Q %C Q"( (Q +Q,# 0QKR BQ4 Q1 0Q! & eiq '(-Q! BC 67 $CA.+, 1 BAIF $% 'L!( * ` LF W

6 ر :Pack Q8= Q " $ $ 5_[ [A \dt ( _[ 1 H, ( 0`%! 67 $CA ( $1Qa B) $Q... * QdT f7q $Q \ 5_[ * +G g() ^ +A g() h! +# G C.+# '+# Packet $.". ( OPEN SYSTEM OSI! INTERCONECT 2%- " 5; $K! (+#!." $CA (+#!."AP *."1*P OSI H+ [QQQA QQQ((R & QQQ iqqq"p QQQ 6QQQ; jqqq QQQ% BQQQ, $QQQ * '+QQQ $QQQk QQQ6 jq % " H+.".( $14 $ $CA ( ( Communication Protocol ).(&(FK# \A R L#L * 5k9 $ * +( $k \A 6 +, $GA[ * +T * +, '(-! 6AR $"O /! '+ $k 5+T & $"O. 0! '+ CI $"O 0- & H+.".+( $k +P $"O $.+Q $+# (9* $"O +, " " $CA " ( 0!.CK * 0 # ` $"O K (9* 6 0`= ( '+Q $Qk 5+QT gq! 2 n $"O ( '+ 28# +,"1 * J&(F $6 $ 0!." ( +, $GA[ 0" YQ.Q" $Q.(+Q# B) & QAR * n-2 $"O l# * T! $ L * ( =[ 2( n-1) $"O /! Q "%* (8" * 0( +T 5*- L"+C" $"O +, " " ( %, 5*- ((R " $CA.(4 5; '(! $CA.". \A R Physical Data link Network Transmission Session Presentation Application :! C"1 $"O '(( \A $"O $CA $"O HG# $"O $"O : gk V"K# ( $"O W : ( Physical)

7 * $Q"8 * +Q#+# Q,P MQ Q8," ( Q%.Q" ^ (( *! % * C"C` 5I C"1 $"O ^ /T ( B"9 * m`* n C * od! $ \ ((R. 0! O $"O $-E* %." 67.0! \ $"O." $ HG# /7 8# * 5O l# ^ h#1 ^ B!O+ l# ( $Q<7` Q" ( 0Q +,) & " * ( $<7` ( 0 ")! 5; $ 0!.CK $"O." ( \A (. +Q Full Duplex Q" Half Duplex HG# J* 0!.CK 5; *(." & " (. + 0Q1"( Q " * 5_[ HQQ! " +# +QQQ=* B) ( HG# /T Half Duplex HG# J*.0 #.CQK /T " $6!* $ BKQQ 01"( * HQQ! J*." (.(QQ $14 $ 5QQ_[.0! "bf BC /T " /! 5_[ BK 01"( * H! Full Duplex HGQ# J* ( : ( Data link) $QC6 (+Q# *! % L"( $"O." (( '+% $ 'L " *(. /T B*+ \A R $"O." $Q Packet %# * + B( pi " $#I# $"O.".+!, Packet 5 5_[ 'Q7# * BQ&.QP.(4 5; $"O." ( # dt o_; * &! C). +"1 5_[ $.0! $"O." i"e* & # /T $!( : ( Network) Q & $Q "Q $CAQ ( ^ (( '+Q% $Q 5_[ H! Y!, &8 (8" $"O.".QP qqt \QA " R Y!, $"O." +,, '(-! 5_[ HG# i6 Q" $6Q!* $ HG# $"O ( ( Connection ) \A."+, +# (9* 5; ( $"O.".+,.(4 5; Multiplex J* $." +, R Data link $"O ( \A : ( Transmission ) Q $Q"O 0""+Q QK $"O." ^ +( $k $ 67 5+T $ 0! $"O."."F $"O." o_q; * CQ) QdT $Q"O.Q" (.+Q( 28# 5_[ B"9 * \A +,"1 H, <# &.""& $Q +#QQ '+Q#(4 f7; 0`= $ +# '+ 01"( f7; S Y $ " Packet * +# 5_[ HG# ^ \A l* (4 5; 5_[ 07; H, "%# = $"O." ( L"( 5A OQ $"O $ ( r $"O." (9*. (4 5; $"O." /! \A T *.""& $"O $.+,( $( $ 5_[ B"9 H, '7# * /T $!!( '7# /7 l# & G : ( Session )

8 BQC * +Q, HQ, BQ QA +Q +Q(Q pi $"O." Z"[ & B 67 $CA " $Q $Q +Q,Q.P $"O.".,tK +, 1 Full Duplex * Half Duplex 0`= s"p ( * (( Q * Q! $CAQ ""+ k gk $"O. +, '(-! $CA & +# #& $ ( * <# & B $"O." (.( 28# $"O." /! HC 0`= & n*t! ( HC &* 5;.+# H, $CA & '(-! L#L * +G : ( Presentation) 5_[ B(*)( $ * (( *! ( 01 ) 5_[ Y`R * %6"1 HG# ^ 5_[ 0, $"O." $Q-E* $"O.". (4 5; $"O." ( L"( %A`R $ 5_[ $9 * 5_[ "I4& ^ % ( H_QT QAR & 6k Q =.(( '+% L"( ((R $ ( Protocol ) ((R " 5_[ "+A QL"( i"e* & 'L " *(. ( ) 0! ( c_t * V"K# $7-; \dt.+ $"O." : ( Application ) Q Q! * B &# $ ("& L $"O." T!.0! $"O $G [A /!* $"O." 5Q; $Q"O." 5#C /! # $CA ( L"( B pi * B 2F HG#. (( '(-! ( ^ *Q! Q"1 Q $Q# ^ Q_[ Q%C# 0""+Q $# ^ %6"1 HG# $ \ 5+T.(4.(( R $"O." (! B1 /T * C#*C` 0 F ^ *! 0,"F

9 % $ #"ر : Servers Work Stations Net Work Interface Cards Communication System '+,( h"*! 'L " ( $CA % ) $CA 8# ( [A! : ( Servers).%&! / $ h"*! " $k 2&O 1 2# & K R R+= * 1 0! & 0! 5A '+,( h"*! " : + "& '+,( h"*! +# $CA " 6 0`= (.$CA B Q9 HQ= ( (Q Q Q" +# $ 0! $CA "!! * 2&O v : Fail server Q1 0! 5#C & 0! (R.".+ qt T! "* qt $# Q!.(bL e $ $CA B. ` " dt LF * hard disk AR & (T $Q $ B!!( '7# 5<# * 0""+ %, 0!9 H= ( Fail server * $ 6.(( '+% A,9 5#C * "1 2Q8# LF.b4 e $ ""+ 56K $ 0! $# " 'L!( : Print server.+( Q (QT hard disk.qb4 eq $ 06R $ 0! $# " 'L!( : Data base server Q QT ( Q%#) * Q 56K 28# * _[ %C# _% * (( $CA B '(-Q! 2QL, ( * +, Multi tasking %6R ( NK '+,( h"*!.". +( R.( 28# Data base server ( L"( 0K R * 'L " ( J&(F & K R %#) & \QA Q 2&O Q 5+QT $Q 0Q! $Q# Q" 'LQ!( : Communication server.+,. $CA & nt 'L!( * $CA B : ( Work Stations) ( $.2 $ 4 ^ +,, '(-! B) ei 5#C & * +, $CA " $ $ +, " *C NO; Work Stations (( R L"( 'L " T ( 'L " " 1 0! 5#C B 0!." $CA " 'L "!! $I. +#K# $14 <# ( 5#C.b4 e $ H, * $CA 'L ".!! w1." ^ +,( 28# J&(F +,# * +, +,K $.+( CI

10 : ( Net Work Interface Cards ) $3( & L"( C" +#( '+% *! "1 * 'L " * [A!. \A R $-E* \dt ( 5_[ 1 H,.0! 5_[ H! Y!, B& pi $CA ( i"e*.+,, 5_[ H! $ 2+R A!, B& ( $CA ( 'L " 0! 2&O [A : 4( [A! T! CI (. (( '+% $CA i6 x9. \A R 6; $-E* : +#( 0`T( "& Topology " +,AK [A /T $!( '7# \A H#. $CA B*( 'L!( H!+, C & 0! 5A +,AK : Topology " +,AK : & +,A y" %` Bus!" #$%$& '+I L"( 'L!( $ 'L!( " & Y $ $ $ " Z"[ & 'L!( \A +,AK." ( * $1" HG# *( & ( '(( R * 'L!( " Z"[ & $ F. ( R ( B& 0KR * Y# = J*." L"( " & 0! 01"( R L"( 'L!( & " /! 'L " $6 +( z & " ( `C '4 $ 0!."!." Y ". 0! B) & 4. + I +"A# { & H[ J*." (.(( +,T 0!( & $CA \A." $ 0"G n 0! '+,, 0"G " $ Repeater 'L!( $6!* $ ( '(-! { & V H[.+# C Ring $'( #$%$&

11 5*-." ( L"( 'L!( $ 'L!( " & / dt +,AK +,# +,AK." ( * '( 0= " ( %, 'L!( /! 2F H!. +, $ # (&)! *( $ 0!." G6= +,AK HC ".0! 01"( R (( R ( $ $" K 'L!(.`* /!."!! 0". (4K# 5; 4(! $ $CA 'L " (+P B( " * B( $1a $.0! O 1 " $CA ( %#) jt "! Signal C Star ) #$%$& CENTRAL " 'L!( " $ (T qt / Z"[ & 'L!( +,AK." ( &.((.-6! +,AK $ ("& 0A '! +,AK.( $ HUB $C," Y"P & *.0!%#) O [A 0! * 7 j# 0`%! J*." ".0! ("& B) $," Hub C

12 : : 'L " " T ( +# %,,P B& " ( [A H# $CA! X ( $ 8#) & H# & '(-! $ n= 0!.CK $<7` ( $CA 'L " & " L"( c[ & * +. 0! g 7 HG# /7 $!!( pi B#R * J* " 0" 2*` +, $( [A HG# 0! $CA! " (. + $( $CA " (!! VG# +# J*." " $!!( + J* " "& 0 #! 0! V8,! P %,( $#} 0 ) B/S Y = 5_[ /T.b4 e $ y" %*. +( V 5+ $ 5_[ HG# } 0! +# /T : & +,A : - $ L!( & [A /7 ( NKk( ( Token ) 0_ 2# $ qt ( Pocket ) $ $ J*." ( "& K *( & C" +# +, 01"( Token $ L!( 0! \A H= ( L"( 'L!( : +( 28# * '( nt /T & Token +" + + 2F H! $ " 'L!( $C; ( Token N(+8 +" '+,!1 'L!( ^ H! $KT & hf +, /T (* (T 2F h!.+, H! +P 'L!( $ B) * '( /T (* ~ (Token) 0_ g() +" %, +A# 2F H! $ " 'L!( $C; ( [ & hf NK= $ 0!." ( J*." 0". +, H! +P 'L!( $ B) '( 0!."!." " &.+! +T 'L!( $ 2F H! 0# pi B&.+ AT (T +P 'L!( g() & +" L!( $ Carrier Sense Multiple Access - 6 w " ( B( 0A7; J* $ $A + CSMA/CD B) i- 2# $ J*." L"( (1 $ (. Kd B(( J4 +" +, 0A7; +T $ R., ( ^0! $CA 5) $CA 8# ( J*." ( hf. +, 0A; $ 2+R h! * 0 # 07A; H= (." '4 +, 67 * $"8 /T ` 5; $ 0! '+ Y# F " T( ( $ (!." (. +, 2F H! $ 2+R /T B+ `T & hf + $( H! F 'L " (9* $ Collision " (T '+"+F +,, H! /T ( F $<7` " ( $CA 5 *( '4.+ Collision Detect i- J*." %# ( CD c= *(.+) +T ] 2F." ( H! /T ( Jam 2# $! 7 2F (4 5; (T " $ '4 ( $ L!( *( h! +, D6d (T & 'L " $6 /T ( G m`* fd!

13 B( `T 5; ( h! * +,, A; 1( B& '&+# $ " +# $( 0 (T /" ( jt " * 4(!!."!! 0". +,, 2F H! $ 2+R /T.0!O 1 (! " B+ B) '+K HC * 0! ( : ( \A y" %d7. 0! $CA 9 '+,( \A C"1 /7 [A H# & <, : & +,A $CA - :!"#!"$ %$& '+ '+ QQQ! ^ \AQ m`,c ( [A /QQ7." K"+QQR *." HKP *."QQ B& 0-9." & 1 (+QQQP +# '+QQ '+ $ "# V ( JF* QQ! $ *(.0Q!.QQ,. +,QQ( CI " * +#QQ4 QQQR C!_F c_s " T( ( QQ! '+ '+! $K8 4. +,# ( Unshielded Twisted Pair ) UTP 6 ( Shielded Twisted Pair) STP ;= ^ ( '(( R K,`) c_s " T(.+,#

14 : :!(!!; <: 7 #! '& (! # $3!%: "& '%( )( )*+, -. "!* & ;= [,] *C` 5P * /7 "# ^ l#." C"1 T! 06 $.+, $9 HC /7." (C6K +# ^ "(#( (9 C"C` 5*( * 'L!( " " * 0,!*61 O " C"(# & A } ( = 0!.CK T+.".+, I NA # 0, ( <#." & STP l# %6. ( (8" 1 : '/0 1 2 ( r.".( ipv! T( ( C"C` H,L! H[ B+ ("& H= ( /T L"( %# ( $ " 'L!( * ( 2&O += & K 2F = % `F l-.+# dt ( +, 1* 0 pi : ) '&3(,4( CI "%#&T^ K,`) c_s * L"+C" '+ '+ $! *( V"1 r." ^ +,, (8" #& 0} "! K 0*G 'K $ %#&T.".+,( h#1 0"(*+7 Y9 0"%# ( * '+ 2F = % `F 21 ] * B+.%F.( (Cross talk) '" 0-9. [,] * C"C` G` & ;= T+^ 9T C"C` T+ '*_ STP %6 ( (.". +, (*+7 l#." # " T(!.+( z I B& 0KR 06 $ HG# /7 l#." & '(-! (*+7 H[ ( ^ %"(*+7." (9*.0! y" ^ Y# #!) *

15 (Coaxial Cable ) ( %) * $6;1.0! $14 R `T 61 $#! " T( ( $ 0! e&# `- ( "." (*+= ) O h#1 (." ^ 0! '+ F Z" " $#! * #*( (. r "# $ 0A # 0, '*_ $ ^ O % #1 ( '(-! 06R.+, '(-! R ( L4.+,, +F 5 m`,c ( ( %6." $ '+ $. + #4 * CI '+ '+ $! & %6." Y# 56K * H ^ G (.0! = %#) HG# \dt.#r ^ %6." ( h#1.1 O 06 B) ( $1 C C"1 5QI * DdQQG fd! (QQP * & ^.#R." ZA[ (( $I 0*G )) 0*G.".+") 0!( $ ( Y = ) 0QQ*G "^.+,# ( Characteristic Impedance) 2F ^ ( %, J $I *G $ " '4 ^ $ 0!." ( +G." 0K ( 5," S (.(K# hcp, /T %# $ (T ( ^ /T ( '+ '(!1 C"C` T+ ^ 0! H! H= ( $ +P 2F '+ hcp, 2F * +( z gcp# ^ /T %#.+ +T '(-! R S HG# /7 * +, (*+ ^ $I 0*G *G /! ^ 7 %# *( `(." $.+,# Terminator N=_d; 0*G.".(

16 & 6`( $ '4.(( L B) DdG fd! (P $ $I 5*G ^ + $-4 $ d#k." ( $I 0*G ^ +" C ] DdG fd! ^ += & V B+ T " * B+ '(I1 AR.+, K 5*- $I 6 $PdR +,# 0K R." * '+ ~ 0K R

17 ( Optical Fiber Cable ) -.$/ '(-! 06 $ %6.".+#( 7 %6 5%9 & & # A1 ^ ("& +#,%F 06 $ ^ +,. /7 "# <# & ^ C"C` B"9 8 # & # A1." '*_.+,( 28# `#) / B*+ H8"( \A +,# B * +,, H] K 9 ^ +, K B&* ( ^ ( $ *( ;1 B.+,K# +"+% %#) 4(& #& * 4(!1 +, # 61 c_s " ( $ #m 5C6!* +,# c- h,9 " & &# $6 & %." 61! +, * # A1 $6 +, & $K8.+# '+ $T! ^ +#( R 5*- 0 C ja.+#4 R C!_F c_s " ( ^ +#'+ $1a C#C 5+R V"1 $ ^ : +# G 6; $!( $! $ # A1 %6 Step- index Multimode Grade-index Multimode Signal-Mode L"( l# & V * +,."F 0- * #& 0KR ( Step- index Multimode %6.+#4 R '(-! ( $CA ( # A1

18 y"+ $ A#9 fd! & c- /7 0 C Y"a Grade-index Multimode %6 ( # $C6 ^ (4K# 5; # 6 V& c- /7 '"( * 6., (.(.+, [,7, " k9 V& e&# %6.".+, ("& +#,%F ( * '( 0KR B4 Signal-Mode %6.(4 5;! $ %#) * 5O 28# * +, " * ( Light Emitting Diode) LED # ("( $6!* $ # " ( H,L! H! %`,L! "+A $-E* ("(.".(4 28# ( Injection Laser Diode) ILD ` ("( PIN ("( $6!* $ # H,L! /T L"( c[ (. +#( '+% # H,L! $ C"C`.( C"C` %`,L! $ "+A N (+8 $ (+8 * '+ 0"G ^ '+ "+A C"C` k_ $ # k_ +" '+ ipa k_ 0"G H,L! $ "+A B*+ # H,L! $ # '+,, 0"G ƒƒ H! (.+# "+A # k_.+ $T! +, 0"G C"C` B." ^ ( = # A1 * PI# 5O (8" ( (9 k $C; (.0 #( $CA `) '+" HG# /7

19 $ $!!(= L#L ' (,#R $ 0! [A /a * %* & $K8 $CA ((R " * $CA ( B4+,, +` '((R." (9*.( \A =K " * K R 28# %K R 28# } %* 0" $ $CA $ \ L"( 1 2# * 1 0! 5*( $ i6 B4+,, +` 5O7 $ ( Y9.".+, 26 \A +,"1 i6. +,,, ( CI (8" B*+ +# '+ $T! q ((R " : Ethernet 01! " $ Ethernet! " (. +, OSI H+ C"1 $"O ( ((R." J* * +,AK & ( $"b] 'L " $6!* $ $CA $,P." $ 0! HP1 S [A & 'L " * 10Mb/S 5_[ HG# 0!. ( '(-! CSMA/CD /T $!( ((R.".( $CA 6; $ Transceiver " * '+,, H, " Z"[. (K# pi ((R." ( HG# /7 * +, pi 'L ". \A L#L.( $14 <# ( Ethernet ((R "& /7 RG-8 50= $I 0*G dr 7 RG-68 50= $I 0*G e&# 7 150= $I 0*G ( * 'K ) '+ '+! B*C * * dr # A1

20 : IEEE !( CSMA/CD J* & Ethernet +,# * 0! Ethernet $ $A ((R.".+, Data Link $"O & K R * C"1 $"O ( ((R.". +, '(-! [A /T $ : ( G LLC * MAC $"O *( $ ((R." ( Data Link $"O MAC LLC Media Access Control Logical Link Control IEEE802.2 $"O ( LLC $"O K L#L * IEEE802.3 ((R ( MAC $"O '7#.(( R Token Ring %2$& : IEEE " +, Data Link $"O & MAC V * C"1 $"O ( IEEE802.3 ((R +,# IBM 0 0T! *, $ *C H BC!.+, 1 $! HG# /7.( '(-! 0_ HG# J* * $G6= +,AK & Token Ring ( +,AK +,# E $ 0! $G6= l# &! +,AK $4. 0! 7 * '+ Multi ) MAU 2# $ L!( B*( 2&O 5%8 L"( 'K $ $G6= "&. +! <# $ '! MAU $ [A /T " $6!* $ 'L " & " * $14 R ( Station Access Unit.+# ( Attached Resource Computer Network ) : ARCNET 01-3 $! +#!." ( HG# /7.+, '(-! 0_ HG# J* Star +,AK & ^ J 4 06R ^ "bf cdp#.+ # A1 " * ( 93=) RG62 7 * '+ J*1 F Ethernet & +P!." $ 0! '+ r Arcnet B& 0KR * jt ".+ $CA!." $CA J 4. +# HUB 2# $! " $ 'L!( $6!." ( HP1 HUB " & 'L " " $6;1 X+=. (*1 $CA $ # L"( HUB B B*+ "& 0! B!) Arcnet $ \ 5OC D1 * " +9 $CA & 'L " " $ \ %6 B $CA 'L " ( H_T TCO/IP 01-4 i- B) 2# $ (( R." Stanford 'LI#( ( Vinton cref ^ ƒƒ $( "* ( \A ((R.".(%#, 0! Transmission Control Protect / Internet Protocol

21 . ((R."% B, $TCP/IP '&*.+ (8" 5*- ((R i6. * *C $CA. \A * i6 ((R $CA. \A ^ 0! '( OSI H+ +,# [A H+ " + ( TCP/IP $ 4.( $T, ( $T, [A H+ " 5 $C#) & V TCP/IP '&* ^ OSI H+ & '(-! J 4.0! HAR ( OSI H+ $"O ( ((R & $K8 B, $ * +, OSI H+ & $CA $"O ( IP.+( $k fd! *( ( [A 5+T TCP/IP 5+T & TCP DR* (.+" $( V"K# $"O +# * '+ &S) HG# $"O ( TCP 5+T.+, '(-! IP /! '+ $k Segment 2# $ " $ $ ^ +, 01"( O $"O & $ _[ +A 'L " ( TCP.+"1 %#) $ $CA $"O $ \ 5_[ $." 01"( & hf IP.+, G $"O Z"[ & Data gram.".+,# Data gram N=_d; IP ( 5_[ $ * (4 28# hc K +G 'L " (.+# G, +G 'L " ( $CA $"O $.""& "& 5_[ Segment * & * '+ n! Segment 5 5_[ Data gram.( '(-! ^+, (8" BLK# $CA. \A BC $ 0! $CA $"O ( ((R IP.".+,, R \A L"+C" +,# 5*- $CA *( $ Z6P 'L " ((1." &.+, Data Link * C"1 $"O ( (9 ((R * T! & G ((R.( $14 <# ( TCP/IP, ( IEEE802.3 ((R NOKP 0!.CK $C6 ^ (K# R '+#4 'L " * '+,!1 'L ". 0} Gd, " IP ( Data +, $ L,. +,, [ -6 +G $ +A & HG# Data gram $K A 0} " (9* $ ^ +# H! +G $ +A & Y $ gram.+,! +G $ 0!(# Y 0!.CK ^ %#) +G $ 2F B+! & B,K[ (8" * +(K# +G $ +A & 2F B+!,Kv.,tK IP.(4 5; TCP ( ( ^ 5_[." * & * +, 0A} Segment ( Segment H! Y TCP,Ka.+, Y +, '+ 01"( 0!(# Y 0!.CK $ " Segment +G.( ;= B,K[ +G $ 2F B+! & ^ +" 2F 01"( +G $ B+! 6% Data gram +,, '(-! TCP/IP & $ $CA & $K8 " (.".(*. & (I# 01"( L " $6!* $ Data gram 06%." vg# & hf 4.(( <# ( $CA 1 ( V"1 * B(4! Data gram (9* & 469.0! '+ $14

22 (>+? cq[ $CAQ Q" Q 1 0! &# $K8 ^ +#+! B, $ 67 $CA & "%K R 2Q# Q&# $Q "L9^ ( $# * %L "! 'K $^ $CA!. +#&!.(( '+% $ 1 0Q%9 2&O 5+QT * 0Q! $CAQ Q1 2Q#!! V * 67 $CA " Y6R BQ Q( 0Q# * (.Q" H* '. (( (9* ' *( Memory Management ) FILE Server File Server File Server (>+? 1 2#. +,+ $k $CA!! 56K 28# $Q<1= 0""+Q ^ $CA #L"! ^ HX B, $ 1 2# (8". ( 2# B 5+T 01"( $Q 0Q! B) 2*( ' * ^ ( $# C," q (Multitasking) ' +,! " $ 0!. ( $# UNIX, OS2 +,# ' +, %6! & C" *.+# '+"4 2*( = ' LAN Manager Microsoft * +Q,Q '(-Q! * UNIX Banyan +,# ^ Q Q! & ^. (I 9 File Server OS2 Banyan & $Q 0Q! Unix Q Q! * Q $CAQ "+Q Q1 2# " File Server 1 2# 1 2# B4+,, +` & T! 07 Banyan 0Q & Vines Q1 2Q# Microsoft 0 H7 H7 Vines Vines $Q ^ '(Q) Q Q! Q" & '(-! 0". +,C ( '%. = 7# $ ^!." 5#C $Q Q Q Q! * (9 ( $# ^ $ 0!." $CA 1 2# B,. +#4 R $CA 1 2# '(-! ( +,# = Q Q %K Q! Q \QA BQC ^ 'L Q" Q"( ( B(b4 e $ BC Vines " & 2Q# $CA! " (. ( 2# B R 5#C * ^ SNA *TCP/IP ((R

23 ( Q Q" 5Q#C K & +# ^ ( $CA (*.-6 /T Z"[ & $ ^ Q" +` 0.". 0! $Q 0Q! 6Q Q! Vines 1. 0! $CA J*1 F 1 2# & C" B, Vines. +, '(-! $CA T( Netware Netware Novell 0 & Netware! ^ $CA 1 2#."*1F $Q Q8#) & (( f9q Q Q! Q" (Q8" ^ $CAQ 1 2# "Q * 0Q! ( ^ Q! Q1 0Q! $Q IQ C"(# 06 $ ^ 0! '+ $# $CA q QR iq6 Q +Q,AK Q ^ Q1 0Q!! X * $!.". 0! I. 0! "# ( ^ 0! x9 cq Q H) '+Q" $CAQ Q1 2Q# Q" $Q Netware $ "%6R T"! $ ^ $( (. "&( ^ 0! '( "+A K (File Allocation Table ) 3@+ : A%; #! $(%3 Q +# 5_[." * 0! B & '+ ei 5_[ *= $CA "( ( $ 8#) &.1 0!( & 06 $ 5_[.1 0!( & dt & 469 +Q%L# Q"( (Q & QL"( Q7 ( FAT & Q Q" ^ Q1 Q8 Q"( (Q *( ( 5Q_[ Q +Q%L# BC Netware! + +,K& ( file Allocation Table) FAT STF Netware!.+, Q9 "( ( *( * BK d.# 56K * '( B C" _ "( ( *(.".+, * Q (Q9 5_[ ^ %C "( ( & C" * (9 5_[.1 0!( & 5; (.( OQ Q BQ,K[ 0Q6R " $CA $!( BC.".(4 R '(-! ( +# L"(.+, 1 Hot Fix Redirection 7?2& B!!( C5 *D A& 5Q_[ Q eq6 Q7 $,.+#T #) ^ "( ( * e6.# & hf Netware Hot Fix 2Q# $Q L"( 7 ( 5_[ * '( 0((" 7." g() ^ +,C# 0Gd '+ $#.+ "# 0!." q $.KQa (.+Q,Q 4Q69 Q"( ( fd! ( HC &* 06 $ 5_[ B+ jt & K.".(K# $# B) ( hf." & * '+ $T, Bad Block B, $ w1 7

24 "+E #.!D F %E & Netware.+Q,Q '(-Q! Q! $<1= & 640 KB & %, ( d $ DOS! S6 Disk Hashing, Disk Caching, Elevator Q6K "Q# Q.Q".+Q,Q '(-Q! $Q<1= QK * (Buffering) 5_[ 0R +%L# 56K $6!.".Ka (. +, 1 Seeking.+( 28# $<1= K $ $CA B 0Pa* H, Disk Hashing Q" $QCL,.+Q,Q +%L# RAM ( "( * %6"1 7 $ \ 5_[ File Server * '+Q +QF Ram ( 0Q! $ "1." 7 +!1File Server $ "1 " 01"( ag.(4 28# 0! $ ( h"*! Disk Caching (Q & K QR 0_[ Netware +!- File Server $ 6"1 01"( ag " '4.Q" $Q \Q QL"( 0Q_[ 'Q4 +Q,Q G, Ram $ _ 0! "1." $ \ $ "( $Q Q8#) &.(4 5; Ram & "( ( 8 ( h"*! ^ ( ag "( ( & 0K R QK.Q" ^ 0Q! $Q#}*C += ( Ram( * $#} 6 += ( "( ( ( 5_[ $!( B& Q.Q# 5Q6K 2Q8#.Q" '*_. +( V"1 +; & V File Server"L9 0!.0! "bf BC L"( $ ( h"*!.= ( ^ " "( ( * Elevator Seeking Q'+Q#*F B( +F H= ( #L" +, " +, ~1 Elevator Seeking 2%- % e( hqf +Q,.0!... * -G} ^ +K7 ^ 7d Y $ (1."! * 0! 0 ` " ( (9 (1 HQA#( $Q ^ ((QL QA-` c*q= Q%# ( +QK7 '+Q#*F HA#( $ $C#) & AR 7d '+#*F B( +F &.01 +T +K7 '+#*F! $ h!.0i4 +T ^ (( R 7d $ "(# $ -G} '+#*F h"*q! (Q (.K N, ^ +, Netware! 07 $ File Server " 0Q# ( h"*q! 0Q1"( Q $CA B File Server $4.+( 28# "( ( & ( +, "( ( + 6P1 7 C"(# ( 67 $ \ $ "ag $ ( h"*! ^ +( R.(4 28# 0# & nt

25 DOS G(.+ $CA \A R $ (R ^67 56K 28# "#, ( +" ^$CA 'L " " ( 07 +#K# ^y" %K! * (+#! 1 2# $ &# 06 $ 'L " H=. ( $# " +" ( 9 'L " ( $ $CA 1 2# & K R $8# (.+, ' "*! $CA * 67 56K N` 0!.CK 'L " B * + y" %K! & C" 07 "9.+ (Resident) 4+# $<1= ( +" $#." ^+( 28#!.( $ 26 '+,, '(-! ^L"( 1 2# & c_t ^ Netware! i6 %K! & $K8 & '(-! BC!.".+,K# ^'L " ( ;T.+, 1 $CA " ( ^ DOS & B) 'L " $ $CA (.+, '(-! shell 2, $K8 & Netware! $-E* ^(( 2# IPX.COM $ $#.`* ^0! '+ CI "9 $# *( & shell ^+,, '(-! 2*( 0K R.(( '+% $ ^'L " L"( ( T ( * ^ File server %F B(!1 K $#." ^+, (*!( $ R*.0! NET4.COM " * NET3.COM $ \ '+ (*!( 4.0! $CA $ $[ " 67 56K $ \!(." $ (4.+ +T 9 $CA Z"[ & 5," S ( ^( G, DOS $ N, ^ K.+ +T,) $CA 'L " ( shell '7# 5k9 1 ( H6 $(>+? % 'L "! e( R - & C" Z"[ & $CA ( (9 5#C $CA!.+, 1 'L "! (Drive +,#) $CA "!! 0".0 # 1 $CA Drive * & 9 06R %, ^ $CA 1 2# " " ( $ B).+( +=* la " * BC +, $ $ 0!." ^67 ;T + <# ( $# ( 0! 2&O ^+,, I 5_[ * +,# +, ^$<7` " ( +, ~1 ^HX B, $.( 0" ^qt 5_[! " * +, B( 5_[ /Aa $ 2+R *( 4.+, "1 " * H= ( $<7` " ( -# *( 67 $CA.( "1.1 0!( & " * 5_[ A.1 0!( & r +#." ^+,, *( $ %*.".+( $k #C * %* 0`=." &* & 469 ^ $CA! ".+# G!! $!( ei '+#*F ( (9 5_[ $!!( ( L,K (8" (lock) -R J* $CA 5#C "! $ ei g!( ( L,K (8" Semaphore J* - ( Lock ) D= I(

26 5"7 $ ei!!( ( L,K (8" $CA! /! $ 0! * ^ -R J* ( " " * "1 " $ + $ $# J*." (.(* $ ( " " * "1 " ( ( " "1 4.+, -R $[ ( " "1 $ +T! & + $(!!( (.( 2_ $# $! c[ &." + '+ -R L"( $# /! $#." 0!T( 0`T( B) ( L"( $# $C," & B,K[ $#." * '+ 28# b4 -R 5;." S! & L"( 0!T( H! $# B"F (.(( +T $( (T $ ^ ( +#.(( -R $ +T +# $# ".+( R $# T ( -R & -6 l# 0!.CK $CA! ".+, '(-! -R l# & vp " * K & :! $%&! # K4 L ( D=!@J " # (Logical) Gd, * (Physical) C"1 -R (NO Wait) A; B*+ * (Wait) A; -R (Exclusive) 7# * (Shareable) e R -R." (.+, ag 7# A; B*+ C"1 -R! & $# " 0!.CK HX B, $.( '(( 7a +, $!(." & " ( ( 0K R '5& >+ $ D= 0" G (K Z"[ & %, L,K B) ( * $( AT $A,9 /G1 $ 0! 6-R Gd, -R $# ( $9 -, j9 -R ag( $# 4 = -R l#." & '(-! 5; (.( h"# $# K!., (.+( ] B) * +, +F!!( <# ( 5_[ $ 0 # +T (T 5_[ $!!( & ^ b4 -R B(A# Z1 5; ( $ +, <, [ $# (( $-E*.+, ( (.+, 469 _K ^ '+ -R 5_[ $ $#!( &! ^ C"1 -R J* (.(+# (9* $# T+ BC $# " /! -R 0" 2+ 5; ( = 5;." M L% M $3@D= $8#.+! $# l_[ $! c[ & P"! -R 0!T( $8# ^ A; B*+ -R J* (.0! '+ -R $# '(-! B, * '( g!( ( <# ( 5_[ $ 0!,P." $ 0AX (.0 # g!( ( B, * 0! '+ -R L"( $# /! 5_[ $ 0!,P." $ -, $8# 5_[ $ +( l_[ $ " * +, C (T 0!T( 0AX $8# H= +" $# J*.".0 # g!( ( <# (

27 c[ B&! + '+ -R L"( /! <# ( 5_[ 4 ^ A; -R J* ( (. +( l_[ $# $ 0AX $8# * +, -R $# 5_[ h! '(K# A; -R B+ J*." & '(-! ^ 0! HAR R * pi ^ 5_[ & $# '(-! B& X+= $ "! $ _[ B( -R <# ( %+ $# " 0!.CK 5;." S (.+,K# (8" `C.+#K R ^ 0! '+ -R L"( $# /! 1 2#." (.+,( R T ( J* *(." & A ( 1 2# & T -R $ ( '(( h"# $# $ BC.". 0! A; B*+ l# & ( 0`= ( b4 -R J*.+, ag <, R <# B& ^ A; $(N: 9 = $ D= 5_[ B+#T %, ( " "1 " $ $ +,( '&9 $# (+P $ ^ e R -R & C" $ X+= $[ ( " "1 ( 5_[.# BC 0`=." (.+, $(!!(.0( +,#.# BC $G * ( '(( $# = 5_[." $!!( BC ( -R $# " /! 5_[ 4 7# -R J* (.( $14 L"( $# & B+#T ( Semaphore) I( +#4 R $# & I (+P T ( BK d $ #C $!!( ( L,K (8"! /! $ 0! ] DR* ( ( Semaphore).( '(-! & C" $!!( & " $ \ ( Semaphore) ( Semaphore) ( Semaphore) J* & ^.+ $( -; " 0AX "(G +# * ( H, * +%L# J&.0! J& " ( * +, H, $CA 5#C $.+,, '(-! BC B) & BK d +# $ 0! " $# (+P X+= $CA 5#C ( Semaphore) ". (4 R $# : T ( BK d +# $CA 5#C & C" 4 HX B,.( +T H, B) : J&!. +!1! ag +, '(-! $CA 5#C & +T $ $# J*." ( +QQG 4.(QQQ4 K BC." B(( T ( (QQQ ( ^ ( Semaphore) " * (QQQ4 QQR $# QQT ( <# (QQ BC ^ +QQQQQQ 0QQQAX (+ +G g! QQQ ( Semaphore) ( <# ( BQC ^ + -; ( Semaphore) +G $C; (.( ( Semaphore) & +QQQQ=* ^ (T 2K & hf $#.+, A; ( Semaphore) +G B+QQ 0AX +" $# * 0 # g!( $ +=* " B+ '(*1 rqq." ^ +, 2_ QQQ! $.( ( Semaphore) ( Semaphore) B(Q +QQG

28 O*P Deadlock & $K8 7# B( -R $ n= (T $( 0%9 $# *( 0!.CK ( & ( V B( -R <# ( * '( -R (T 5_[." & I " * ^+, $( 5_[ w1 $# & " M * + L"( T ( $# &# ( 5_[ & I 4.+, L"( * ( +,# $( $ (R $# & " M ^ +,C# 2+R L"( $# $ 5_[ b4* $ 0A # KP $# *( & V +# * '(A# $# *( p 0`=.".( ;= Deadlock 0`=.+" * Record1 2# $ '+#*F " & ( *( +" $( $# *( +, ~1 HX B, $ $# *( & " M ^ +,, -R Record2 2*( $# * Record1 H* $# 4. +,, -R Record2.+) +T (9* $ Deadlock 0`= * +,( $( (T $ +#K# &# ( 5_[K B( -R ( $# " 4 ^ $ 0!." 0`=." & 469 J* " 5_[ B(K# -R $ 2+R (+8 h! * +, (&) 0! '( -R $ _[ K ^ (A# Z1 (T.+"K# <# ( $K8 + $# " ^ $ 0!." (( R $# T ( Netware! ( $ L"( J* (.+, (; $K8 K B+ -R ag B"F ( * '( b4 0_ &# ( 5_[.(K# $b4 -R M 0G1 2+ 5; ( * +# '+ -R 5_[ K 0G1 5; Transaction Tracking ^ %6"1. \A 06 $. + '+ CI i6 "1 & 0!.CK _[ #! " $K BK B(*)( &* +,"1.( L"( %6"1 5"7 ( ] r +# "1 " ( ].+,# Transaction " %6"1 * '+) ( &* $ 5_[ & K R ^ ( HC ( Transaction " 28#.= $# " $ L, * '(A# B,K[ R! 9*T 5_[ Y." $.+# '+# R $`* 0`= $ &, L"( 0K R.+, J& +R1 ( &* $ i6 %6"1 ( 5_[ K " ^ +, '(-! Transaction Tracking & $ K! (.+#(4 $`* 0`= $ %6"1 $6 ^ HC B+) (9* $ 5; ( "* +,").( '+# Automatic Rollback N=_d; $`* 0`= $ %6"1 0I4& +,"1

29 (Q) *& B) $! BO <# & *( +,# (1 * 0! '( 4 _[! " $CA H, b` ^+ '+ 'T $CA ( K% 5_[ 0!.CK L"( c[ & ^+, $(!!(.0! = ^ B L#L * 0=_; +"+ :( G!! $T *( $ $CA ( B (C6K * 5#C H, +, $CA ( $ i` ( '(( * $ " $ '&9 j.+ +T! +P 1 ( 2*( $T * 0T(F T H* $T 5k9! $ 1." ( L( %# & C" 2# 4.+!F * & «2#» " ^$CA $ (** 2L, Netware +T 1." $( (.+ +T '(( $CA ( '&9 * $ ^+ $CA "+ /! '+ i"p ^0! '( " ^ (** 2L, $ # $ NKG ^(( $CA ( " $ T * 5#C $ +"(.(( L <# ( * $CA "+ /! $ 0! # <, ^ 0! '+ ' «2#» $ $ 9 hf." &.0! '+ $14 NOKP 61 2# " * 2# ^+ PR* 2# Y!, *+GK` = +" $CA ( 2# T $ $CA ( " $ (( 0"." * PR* 2# 2# \A.+, A!, %#.0! +- B. \A R (." * ( $T, B L"( * $CA "+ /! '+ $CA (* qt " 9 $ ^L"( B " 0=_; B*+ (1 0!.CK Y." $ + Netware (." & 469.+,, '(-! ^0! '+ <, * $ "&8 & *."&(F +."! $ 1." $( (.0! '+ $14 <# ( +"+ (!. HK B & (+P ( ( ;T &8 * 56K 0! 2&O $CA " ( ( & ( ^B +, $!( BC Netware,!.( +T +- B +, $!( (." (.(

30 R $!( " ( $ (1 * (4 5; 0R( $ +" +, $!(.".+, 1 «'*4» 5; $ ^+, $( e $9* L"+C" ^+,( 28# $ 6K " * &# ( 5_[ ( +" +#4.+ $( L"( '*4 " I xv 0!.CK '*4 " (8" + ( ^( $CA B $K $ '*4.".0! Everyone '*4 ^% '*4 "! $ ^ $ 0!." '*4." 0;T ".( (8" 5; $! $CA "+ /! '*4." '4.+ +T '*4." & v 5; $ ( i"p.014 +,T R '*4." ( +"+9 B %, ^( (8" '*( * ( ef v 2# * '*4 2# & +# %, * (4 5; $CA "+ /! B +,'*4.+, ;= l_[ %#)!( (! *&.+#+ 2#." $ \ (password) A + * «2#» " +" $CA $ (** 2L,.( $CA (* * $ \ A + * 2# B( (* " * Login!( & '(-! ( $ #.+ +T 469 $CA $ * (** & ^+, " /6S (T A + " * 2# ^ '4 * ^(** 2L, A + b` ^+# D6d ( A + & ^(** 2L, 0!.CK +,,.( (* c*= * c*= B 2# * A +.(K# E $7-; * "& 2F $ $A F ^+#+# f7; A + * ( $CA (* 2# +, P! 4.+ +T '+"( V"K# $7-; Access to server denied You are attached to server SINASOFT. * ( '+!F A + * & ^+A# '+ $T, $CA * 2# * + $( (** ( P! 4.( +T 01"( O 2F $I F h! $CA ( '7# 2*` 5; ( ^j =." $6!* $ $ 0! = ( $CA ( ") $CA "+ $6! * '( & w1 j = 0! 2&O $CA $ " (**.( "&.+ '+I# $ (L"( ( % *& 07; &! $6!*." $ * 0! $CA ( 0 '+,+#I# DR* ( ^ " A + "+ T ( A + 0, -= + Netware! (.( D6d 0" : ( (." +.".(( R $CA *( (.(L %#) & Z=." ^ " * ++ A + s"p '&9 B $ +# $CA "+ -.+, ~ B A + +# $CA "+ 5;

31 6 0`= (.+, A +.( $ A8 B +# A + 0, V"1 $CA "+.+ $+# A + +# ".( $ 26 B Y." $.+, pi A + &8 H[ R+= +# $CA "+.( +,T ^ H[." & I " * * H[ A + '(-! 5; (.+, 26 A + ` s"p $ B +# $CA "+ ^ 2*` 5; (.+,.P A + s"p *(. B& +# $CA "+ ^BC." & ^( $CA (* 6AR A +."+, +# ^A + " A B& vg# & hf «A (**» N=_d; '+ vg, A + (**.+,.P (+P." +# $CA "+.+,# (Grace login) B 2*` 5; (.+ 6AR A + +# +"+9 A + ( 0`= (.+, (* +"+9 A + $ ( A8 "+ * (. Netware,! $6!* $ NK ^'(-! 5; ( ^w1 5#C $6 1." 6K (.(( '+% $ %#) & '(-! 2+ " '(-! $ D9 4 K %, $CA.+ +T,) 5#C." & '(-! L#L # *!%:.( $CA (* $- & &* (* &* $#A &! ( +# " ( 0`=(.".+, (*+7 &* $#A & ;T 5! ( $CA & '(-! $ +# $CA "+ &8 5! B HX B, $.0! <, R $- &* ( 0! # 0R( &8 5!.(K# i"p "& 5; {/ 0! & $A,% $A, &* / {/ 0! & $A,y,F &* i"p &8 0! B, $, 0! '+ Y# B) ( $CA ( $ B&! 5! NOKP.++T 469 $CA $ (** & 5! & nt 5R* (.( $9 "& 2F $ $A F +$( $AC $ (** ( P! $,K 5! ( 4.+ +T Attempting to login during an unauthorized time period. The supervisor has limits the time that you can login to this server. Access to server denied. You are attached to server SINASOFT. F,+ $CA ( H= (, &8 B& vg# DR ( * '+ $CA (* N_AR 4.(+T 01"( "& 2F $ $A

32 >> SINASOFT CONNECTION TIME EXPIRED, PLEASE LOG OUT..( +T 01"( 2F." $ $A F, (I# nt $CA & 4 >> SINASOFT CONNECTION TERMINATING IN 1 MINUTE. $CA * \A $CA!, (I# nt $CA &, $GR( " 0b4 & hf 4 H= ( $# 0!.CK, ( $ $ \ %6"1 $6 H=." (.( +T DdR (* $+; 5_[ $ Y." $ * +'+!# \A DdR A!, 7 $ 'L " (.+,, $9 w1 2F $ +" B b`.(.+ +T,), $CA ( &8 5!.P L#L 1." 6K (.2 *!%: '&9 * 5#C.( (* $CA 'L " & " & +# " ( 0`= ( B) & $ L " [A * (( * A+ * 2# $ L $CA ( 56K 28#.(+#, 0!'+ $CA (*, $CA $ (** qt $ +, " " & '(-! $ B +# $CA "+, 2F." $ $A F, ( $CA (* &8 S & +, P! 4.+, (*+7 : (+T 01"( Attempting to login from an unapproved station. The supervisor has limited the stations that you are allowed to login on. Access to server denied. You are attached server SINASOFT..0! B(T 0K R ( $ ^ 0K R " B B( (*+7 ^." ( " (9 5_[ B+ & 469 [T $ 'L " & vp "( F_1 # ( vp ( ( ( (9 5_[ 0, -= (." (.( $T+# & %#) "( ( (.( '(( 'L " B $ %, 'L!(." '&9 "( L>J AN *!%: $K Z"[ & * '+ $CA (* 'L "."+, & 2# " +# " ( 0`= ( $CA $ H <# & B +# $CA "+.+ $CA $ BK 5; $ 'L " H 0"(*+7 & '(-! 5; (.+, (*+7 ^ i6 'L " & BK 5; $ $ B& 5; $ %#) & +# " $ " 'L " (+P +# $CA "+ ^ B&.+,.P ^ + $CA

33 $ (** ( P! * + $CA $ ^ &8 (+P $ " 'L " & ^ $C; ( : + +T $9 2F." $ $A F ^ + $( L"( 'L " & $CA Attempting to simultaneously login on too many work station. The supervisor limited the number of active connections you may have. Access to server denied. You Are Attached To Server SINASOFT. INTRUDER DETECTION / LOCKOUT pi ^ +#( $CA $ (** ( P! $ 0=_; B*+ (1 +# + " $CA "+ 4 ^ +, (* 'A A + +# " $ ` 5P1( (+P +".".+( qt 2# " $CA $ (** ( P! ^ '+.P 5P1( (+P & V p '4.+, (*+7 j 7 A + B(& g+= H= ( =_; B*+ (1 p." ^ (I# Z1 * + $( (1 pi & hf $ +, <, [! +# $CA "+ 2*` 5; (.+ +T 0`=." (.( $ ( ( '+ $CA $ (** ( P! * 2# $ $ ) j = 0=_; B*+ : ( E $7-; * 2F." $A F Intruder detection lockout has disabled this account. Access to server denied. You Are Attached To Server SINASOFT. $.(&+# B"9 $ B) +# $CA "+ %, * ( (*+ $[ j = H=." ( +T 469 f7; A + B(( = 2#." (** & I 5+ Y.".0! <, R $CA "+ $6!* $ B& 5+.".+ B"9 $ (+8 * j = $CA "+ * +, $P9 $CA "+ $ +" $CA ( $(.(&+# +G." 4.+,.P Z1 S (**.14 '+"(# 2&O B& 5+ +# $CA "+.( $14 '+"(# 6AR Z1 S (** $6 ^ (bl Z1 S (**."T) & B&

34 (R) *&! +, $CA ( $ $C," ( ( Netware, + $b4 1 ( +" i6 28# ( * "#* 5#C + $CA (* $C," & hf."(! i6 56K 28# B "# H, %* 1." (.( H,.+# & % fd! $! ( %6"1 * 56K 28# B &8 H, Netware! ( : (4 5;.+,, K += ( ^ &8." Q ( Trustee Assignment) &8 " ( * $.+ 56K vp 28# &8 ( I +, " "( 0!.CK " 0"v &8.+,# I B) & v " ^ + '+ $14 <# ( "&8 I.+ 5*- L"( 0"v &8 +# ^ K I fd! ( &8." Q ( Maximum Rights Mask) I ( AP &8 5G6P & I ( AP &8.+,,.P I " ( &8 A * +,,.(.P B $6 ^ K " 28# 2&O "# &8." Z"[ & * '( I I ( 28# $ (R M ^ (I# 28# &8 ^ I ( AP &8 '4.( +# $[ * +, K "1 fd! (, + & 0K R." Q ( file attributes) "1 $I.+,.P qt "1 " * 56K 28# '&9

35 ( Trustee Assignment) $#S $ & +,#^ +, H, fd! ( 56K 28# '&9 $ ^ &8.".+, 5*- L"(." & v "." ^ + '+ '(( p " $ I " ( "&8 '4 0!.CK.( 'A 2%- +"A# v " 2%- +, $9.+,# I I." v * 5;." ( ^ + $+# qt I " ( &8 M + $CA.0 # %"(*+Q7 * A + +,# &8." $ 0!." 0"v &QQ8 ( ( % $C# qt QI " ( 56K T 28# * '&9 * +, Q 5G6P & $CA $ (** : +,,.P : & +,A &8." %6"1 B( & &8 0! '+ & $ 6"1 & B+#T &8 0! '+ & $ 6"1 (.# &8 "1 " ( (8" 2L, B( & * ) (8" &8 ( %6"1 0 `.14 ) I " 8 9 &8 `T I " " "1 " B( ef &8 I "& 2# ] " %6"1 $I B(( ] &8 0"v &8 +# ^ + 0`- &8 ( $ ^ I 0`- &8.+, ~ I &8 " * +( ] I( B "! (Open) (Read) (Write) (Create) (Search) (Delete) (Modify) (Parental) O R W C S D M P &8." %A & C".+ &8." & A " " +# QQI " ( " &8 &8 M) ( I " ( $.( BI# [ ] 5 Y.".0! ( &8 M ).0! 5*- (+# &8 I." ( $ + ( * 0! [ROSWC]&8 ( I " ( user1 2# $ $ +, ~1 ^ HX B, $.(+# I." ( &8 user3 2# $ L"( * 0! [ ] &8 ( I.K ( user2 ( $4.0 # I." v user3 +, I." v user2 * user1 B 0`=." ( $CA ( *(." 0PR +#+# M 28# &8 I." ( user3 * user2 K.(! +P 0K R ( $ (( " 5*-

36 +, (8" +"+9 "1 " I." ( +# ^ + C &8 ( I " ( 4 (+8 B( & "1. & hf.,tk.(( n= W &8 $ "1." ( 5_[& B( (*.0! 2&O R * O &8 B) 7 B+"( * *T $#S 7+ L; '(( [ROSWC] 0"v &8 DIR_1 I ( $ +, ~1.+, $9 "& C $ i"p L"( 5; $ &8 $ "9 ^ I." I"& $6 ( ^ H=." (.0! '+.( +T &8." ( + '+I# SDIR_1A [ROSWC ] SDIR_1B [ROSWC ] DIR_1 SDIR_1 [ROSWC ].( '(( &8 <# ( I "& ( %, $ +" 0"v &8 B(( 2L, Y." $ i"p (+8 &8 I B) ( +" I " ( 6AR I &8.1" B"9 & 469 $+# 28# '&9 SDIR_1A I "& ( AR HX ( 4 HX B, $.+#." &8 5;." (.( R &8 M I ( * 0a &8 +" +.( +T [ ] B) I "& * SDIR_1A I ( I." ( &8 $ 0! [ ] &8 ( I " ( $ B 5*- w1 HX ( * &8, +A# I "& " v 4.( pi, (0 # I." v) (+# 0"v &8 %,, 0! I " v $, 01" +T B"9 I "&." $ 6AR I.0( +T I." ( (T

37 & $ +, ~1.+$( L"( " 0"v &8 $6 +( '&9 " $, &8 ( User-2 * J [ROSWC ] &8 ( User-1 2# $ DIR-1 I ( +T * $ User-1 &8 $6, ( '(( User-1, User-2 $ 4.+ [ROS] 6; &8 ( ( %,, +, $9.+ +T [ROSWC ] &8 ( * +! User-1 &8, ( '(( User-2, User-3 $ O HX ( 4 N_X +, K.+! +T * $ 0! User-2 (T $ \ $ [ROS] &8 %, $C6 +! +# * $.0! USER-2, ( USER-2 4,P", 0! $1[ ", :+, $9 "& HX $.0! [ROSWC] &8 ( I " ( Ali.0! [ROS MP] &8 ( Babak * [ROSWC MP] &8 ( BABAK, ( '(( ALI, BABAK $ 4.+! +# ALI $ P * M &8.+#+T R [ROSWC] BK ALI &8 * ++T. $#S " ( "&8 +# " +,# '*4 " (.0! '*4 B) +,# '*4 ( 0"v '(( '*4 " $ $ "&8.+, " &8 +,# N, &8.". + $( I '*4 B), ( '*4 " v '4.( G, '*4 B) xv $6 $, (.+ +T '*4 B) v, (, '*4 " $ * 0(+T, (MAXIMUM RIGHTS MASK), (! $(S "+.+,,.P I " ( B 5T A, +,, K I fd! ( $, &8.".(( 5T I $6 ( * '(,X." & $CA : & +,A 0"v &8 +,# &8." %6"1 B( & &8 (Open) 0! '+ & $ 6"1 & B+#T &8 (Read) 0! '+ & $ 6"1 (.# &8 (Write) "1 " ( (8" 2L, B( & * ) (8" &8 (Create) ( %6"1 0 `.14 ) I " 8 9 &8 (Search) `T I " " "1 " B( ef &8 (Delete) I "& 2# ] " %6"1 $I B(( ] &8 (Modify) 0"v &8 +# ^ + 0`- &8 ( $ ^ I 0`- &8 (Parental O R W C S D M P

38 .+, ~ I &8 " * +( ] I( B "! ), I ( AP &8 * +, AP I B) (, 0"v &8 K I " (8" 2L,.+$( I." ( wg=." K +# " Y." $.( w1 &8 K &8 B & &8 +, " " +" (B K ) I." ( AP &8 B( (*+7.( cb=, I ( AP ( AP &8 $ 8#) &.( cb= I " ( AP &8 & D &8 +, ~1 HX B, $ &8 ( $ # = hf." &, +,,.P I " ( B $6 &8 A I (+# (9* I." ( AP &8 ( D &8 "&.+,, ef 6"1 +,#K# + # D 0"v.0! A +R1 I." ( B D &8 * $, 0"v &8 c_t * +, I " 5G6P x9 I 2# +,#, I ( AP &8.+,,K# +F B"9 I " I"& $[ K 28# $ (R M, I ( AP &8 & &8 " cb= & hf $ 8#) & '((R (&8 $6) [ROSSWCDMP] I ( AP &8 qt ( 9 $, (+#.+# (File Attribute) Netware #L"! ( "1.+,, K "1 +=(, Netware, + & 0K R." :& +,A 5O=.".0! $I " ( (Normal) N 567 ~1 VF 5, "1 " (8" 2L, Netware! $ 0! $I, $I." 5_[.+, # +,. e R ^ +#( $I." $ "%6"1 (4 <# ( B).0!.# * B+#T R 6"1., B*( (Read Only) RO 567 #) +#K# M * +,# "1."+,# %, B, + $I." ( 6"1 4.(+# &8 $ L.".+ ", B) ( " * +( ] #) 2#, +, ef (Read Write) RW 567 ^ ( $# +, 1 &8 ( $ # $6!* $ +#, + $I." ( $ 6"1.( ef " * ( '(( 2# ( Shareable ) S 567

39 $I.".( $b4 e $ +, $6!* $ +# + $I." ( $ 6"1.(* $ RO $I ( Modified ) M 567 & hf.+# nt Modified $I & %6"1 $6 ( $% BAIF $CA %6"1 & $.( +T +F Modified $I "1." +, +F ] 5; $ 6"1 7 '4 B&." Execute Only NU,., ( $ 6"1.( $ COM * EXE $`A#( "%6"1 B %, $I." B( e F ^ "1 T( (.# & $I." & '(-! 5; (.0!9 R %, + $I.+ +T 469 "1 B( * "1 2# s"p ^ "1 System NU, 2#.+, '(-! System $I " "1 & (T 6T( 28# Netware!! +# 6"1., B+"( $+;.(K# E I " %6"1 0 ` ( "%6"1.,.+, HC ( ( Indexed ) I NU,." & ^ +, 0" L & V K8= ( $ "%6"1 i6 %K R $!( ( D" %6"1 i6 %`*+9 ( "1 " i6 5PdR g() ^ $CA!.( '(-! $I $!( 5;." ( * ( ("& +# "1 " i6 5PdR (+P.+, +%L# ^ %!() &! Y & '(-!.( c; B) g().1" ("& B& "1." & $PdR ".(( V"1 %9 R 5; $ "1 " i6 5PdR $!( 0! +# ( Hiden) H NU,.+ +# E I " %6"1 0 ` ( ( 5 ^ + $I." ( $ 6"1 2#." (] ( & (.+,, '(-! $I." "%6"1 & (T 1 2# &.+ +T $[ 1 2# ( HC &* r $I." B"9 ( B 0! 2&O ^ +, '(-!! 0, %6"1 $I & +"( <# ( 4.+( R

40 ( Effective Rights) V $#S DR* (.+, " 28# * '&9 '+,,.P K ( ^ I "( " } &8 Z"[ & $ "&8^ * (1 0"v &8 lk8 & +,A I " ( " &8 0!.CK $ "&8.0! '+! * $ '*4 Z"[ & $ "&8 * 0! '+! * $ 0,.(*1 lk8." $ +" # + '( +F B"9 I." $ 6AR I Z"[ & L"( 5A $.I ( AP &8 Gd, ja & +,A I " ( " } &8 /! BA $ * 0"v &8 & $!( B) & +,A I " ( " } &8.+ '+ +" I ( AP &8 *P Bindary.".0! ] R $CA "+ /! $ $CA 0, $ \ 5_[ & 0! 5A Bindary "1 *(.".+# +%L# NET$BVAL.SYS * NET$BIND.SYS "1 *( ( 5_[ * I ^ I ( B 0"v &8 ^ '*4 ^ B#) A + * B ( ( _[ *= +# HC ( 6`( $ '+#*F." $ ( (.0!... * i; ^ I ( AP &8.+ +T '+I $CA ( "& 5_CI.(( ] " ( cb= BK# " 2#.(( ] BK# " A +.(( ] BK# " &8.(( ] BK# I ( AP &8.( '(( V"K# File Server * Bindary ( dt 2F ( $-R* & %6"1." & BAIF $% +" $CA "+ Bindary ( (9 5_[ B( g = `( $.+, 469 $CA + $#.".( '(-! BINDFIX CK $# & B Bindary ( HC &* 5; ( 28# B) * &!& 56K h! * '( nt B g!( & Bindary $ \ %6"1.+#4 R B g!( ( (+8 %6"1." &! & K B"F & hf. +( Y $CA "+ & ( & T ( * '(( J4 K = BINDFIX &! & 56K.= ( 0!( & HK= ^ ( HC ( 6`( $ $[ 'L " Bindary &! &.= ( 4.+, i6c ^ &! & K l* & AR $CA " ( Bindary ("& 0K 06 $.(( (9* %6"1.1 * NET$BIND.SYS %6"1 ( * +, $% Bindary $ \ "1 *( & " BINDFIX.+, +%L# NET$BVAL.SYS.+, ef.old %6"1 $ +T & BINDFIX ^ &! & K B( Z1 5; (

41 $ \ %6"1 BINDREST!( 9 B ^ &! & K ( HC &* 5; (.+#(4& H* 5; $ Bindary.(+# R B g!( ( * ( 9 R $CA "+ $6!* $ BINFIX!(

SPARE CONNECTORS KTM 2014

SPARE CONNECTORS KTM 2014 SPAREPARTSCATALOG: // ENGINE ART.-NR.: 3208201EN CONTENT CONNECTORS FOR WIRING HARNESS AA-AN CONNECTORS FOR WIRING HARNESS AO-BC CONNECTORS FOR WIRING HARNESS BD-BQ CONNECTORS FOR WIRING HARNESS BR-CD

More information

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN

SPAREPARTSCATALOG: CONNECTORS SPARE CONNECTORS KTM ART.-NR.: 3CM EN SPAREPARTSCATALOG: CONNECTORS ART.-NR.: 3CM3208201EN CONTENT SPARE CONNECTORS AA-AN SPARE CONNECTORS AO-BC SPARE CONNECTORS BD-BQ SPARE CONNECTORS BR-CD 3 4 5 6 SPARE CONNECTORS CE-CR SPARE CONNECTORS

More information

ก ก Information Technology II

ก ก Information Technology II ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access

More information

22ND CENTURY_J1.xls Government Site Hourly Rate

22ND CENTURY_J1.xls Government Site Hourly Rate Escalation rate 000 AA0 Administrative Assistant Level I 000 AA0 Administrative Assistant Level II 000 AB0 Application Engineer Level I 000 AB0 Application Engineer Level II 000 AC0 Application Programmer

More information

Appendix 5-1: Attachment J.1 Pricing Table -1: IMS Ceiling Loaded Rates at Contractor Site

Appendix 5-1: Attachment J.1 Pricing Table -1: IMS Ceiling Loaded Rates at Contractor Site Appendix 5-1: Attachment J.1 Pricing Table -1: IMS Ceiling Loaded Rates at Contractor Site Escalation rate 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 0001 AA01 Administrative Assistant Level I $51.00

More information

https://support.industry.siemens.com/cs/ww/en/view/

https://support.industry.siemens.com/cs/ww/en/view/ Support Packages for TIA Portal V14 February 2018 https://support.industry.siemens.com/cs/ww/en/view/72341852 Siemens Industry Online Support This entry is from the Siemens Industry Online Support. The

More information

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved. Unit 10 Networks Copyright 2005 Heathkit Company, Inc. All rights reserved. The basic components of a network: Connections (Physical Medium) Protocols (Common language) Services (Clients, Servers, and

More information

https://support.industry.siemens.com/cs/ww/en/view/

https://support.industry.siemens.com/cs/ww/en/view/ Support Packages for TIA Portal V13 March 2018 https://support.industry.siemens.com/cs/ww/en/view/72341852 Siemens Industry Online Support This entry is from the Siemens Industry Online Support. The general

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components

More information

Chapter 10: Local Area Networks

Chapter 10: Local Area Networks Chapter 10: Local Area Networks MULTIPLE CHOICE 1. CSMA stands for: a. Client-Server Multi-Access c. Carrier Server Master Application b. Carrier Sense Multiple Access d. none of the above 2. The CD in

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

Local Area Networks (LANs) & Networks Inter-Connection Chapter 5

Local Area Networks (LANs) & Networks Inter-Connection Chapter 5 CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks Inter-Connection Chapter 5 Nada Al Dosary Aldosary.na@gmail.com http://ct1502.edublogs.org 1 Outlines Understanding

More information

CD _. _. 'p ~~M CD, CD~~~~V. C ~'* Co ~~~~~~~~~~~~- CD / X. pd.0 & CD. On 0 CDC _ C _- CD C P O ttic 2 _. OCt CD CD (IQ. q"3. 3 > n)1t.

CD _. _. 'p ~~M CD, CD~~~~V. C ~'* Co ~~~~~~~~~~~~- CD / X. pd.0 & CD. On 0 CDC _ C _- CD C P O ttic 2 _. OCt CD CD (IQ. q3. 3 > n)1t. n 5 L n q"3 +, / X g ( E 4 11 " ') $ n 4 ) w Z$ > _ X ~'* ) i 1 _ /3 L 2 _ L 4 : 5 n W 9 U~~~~~~ 5 T f V ~~~~~~~~~~~~ (Q ' ~~M 3 > n)1 % ~~~~V v,~~ _ + d V)m X LA) z~~11 4 _ N cc ', f 'd 4 5 L L " V +,

More information

NETWORK SECURITY ITEC 435

NETWORK SECURITY ITEC 435 NETWORK SECURITY ITEC 435 Agenda Chapter 2: Introduction to Networking Introduction to Networking Networking Fundamentals Reasons to Network Getting the Message Across Analog Information on an Analog Medium

More information

Contents. Introduction to Networking. Preface...i. Introduction... xix

Contents. Introduction to Networking. Preface...i. Introduction... xix Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

The NIC is the main interface between the computer and the network cable.

The NIC is the main interface between the computer and the network cable. The NIC is the main interface between the computer and the network cable. 50 Parallel data into serial data. Memory CPU Computer 10011001 Cable 1-0-0-1-1-0-0-1 NIC 51 Considerations when selecting the

More information

DETAIL SPECIFICATION SHEET

DETAIL SPECIFICATION SHEET INCH-POUND MIL-DTL-55302/128D 18 April 2013 SUPERSEDING MIL-DTL-55302/128D 4 June 2004 DETAIL SPECIFICATION SHEET CONNECTORS, PRINTED CIRCUIT SUBASSEMBLY AND ACCESSORIES: RECEPTACLE, DOUBLE ROW, 4 THROUGH

More information

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS GAYATRI COMPUTERS Prepared by : VENKAT.G 1 What is Networking? Module 1: NETWORK BASICS Networking: Connecting two or more computers or network devices(routers/print Servers / Firewall Devices..etc) for

More information

IEEE standards for local area networks

IEEE standards for local area networks IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information

Working with Data sent to a Computer or Flash Stick

Working with Data sent to a Computer or Flash Stick Working with Data sent to a Computer or Flash Stick File Names and File Formats Data sent to a flash stick is saved as a.txt file. The file name for the saved file is in the format: DATA FILE TYPE Send

More information

OPAL-RT FIU User Guide.

OPAL-RT FIU User Guide. OPAL-RT FIU User Guide www.opal-rt.com Published by Opal-RT Technologies, Inc. 1751 Richardson, suite 2525 Montreal, Quebec, Canada H3K 1G6 www.opal-rt.com 2013 Opal-RT Technologies, Inc. All rights reserved

More information

Section 1.1: Networking Overview

Section 1.1: Networking Overview Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission

More information

Network Administration

Network Administration 16-Bit Core - Loading... 3:28 32-Bit Core - Loading... 3:27 802.3... 1:36 802.4... 1:36 802.5... 1:36 A Account Database Synchronization... 11:29 Account Policy... 7:20 Account Policy - Managing... 7:22

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1 Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Patch Panel Cable Guide 3-5-3

Patch Panel Cable Guide 3-5-3 Net... 5... 5... 5... 7... 8... 8... LAN - - WAN - - 9... - - 9... 9... - 4-9... - 4-... - 4-... 4-4-... Hub and Spoke 5-4- 4... Full Mesh 6-4- 5...Partial Mesh 7-4- 6... 8-4- 6... 7.... Client/Server

More information

Lecture 8: Switched Ethernet and Collision Domains

Lecture 8: Switched Ethernet and Collision Domains Lecture 8: Switched Ethernet and Collision Domains Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Ethernet Installations 2 1 Twisted Pair and Fiber

More information

Local Area Networks. Ethernet LAN

Local Area Networks. Ethernet LAN Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

SMF Transient Voltage Suppressor Diode Series

SMF Transient Voltage Suppressor Diode Series SMF Transient Voltage Suppressor Diode Series General Information The SMF series is designed specifically to protect sensitive electronic equipment from voltage transients induced by lightning and other

More information

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

Ethernet. Computer Networks. Lecture 4.

Ethernet. Computer Networks. Lecture 4. Ethernet Computer Networks Lecture 4 http://goo.gl/pze5o8 The History of Ethernet Originally: DIX Ethernet (DEC-Intel-Xerox, Ethernet II) - 10Mbps. No LLC sublayer Later standardized as: IEEE 802.3 Frame

More information

Raj Jain. The Ohio State University Columbus, OH

Raj Jain. The Ohio State University Columbus, OH Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting

More information

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 04 Media and Devices College of Information Science and Engineering Ritsumeikan University Network Media and Devices l When you build a network, the network hardware may be used

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

The following pages contain a guide for the installation

The following pages contain a guide for the installation INDEX The goal of this section is to illustrate how Siemon Company products can be used to support some of the most popular and emerging networks on the market. Section Contents 100Base-T....................................

More information

GE Fanuc IC695ETM001. Rx3i PacSystem

GE Fanuc IC695ETM001. Rx3i PacSystem GE Fanuc IC695ETM001 http://www.pdfsupply.com/automation/ge-fanuc/rx3i-pacsystem/ic695etm001 Rx3i PacSystem Ethernet module 10/100 Mbits 2 RJ45 connections one IP address IC695E IC695ET IC695ETM 919-535-3180

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

Parts List, Charging Chart, Wiring Diagrams

Parts List, Charging Chart, Wiring Diagrams Parts List, Charging Chart, Wiring Diagrams PHH150, PHH180 3 Phase PACKAGE HEAT PUMP UNITS TABLE OF CONTENTS PARTS LIST------------ 2-5 PARTS DRAWING - - - - - - -6-16 CHARGING CHARTS - - - - - - - 17

More information

Tape & Reel Packaging For Surface Mount Devices. Date Code Marking:

Tape & Reel Packaging For Surface Mount Devices. Date Code Marking: Tape & Reel Packaging For Surface Mount Devices Automation of surface-mount assembly by the use of pick-and-place equipment to handle tiny components has been enhanced by evolutionary improvements in tape-and-reel

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Network Media and Layer 1 Functionality

Network Media and Layer 1 Functionality Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)

More information

ELC 537 Communication Networks

ELC 537 Communication Networks Modern Academy for Engineering and Technology Electronics Engineering and Communication Technology Dpt. ELC 537 Communication Networks Prepared by: Dr. Nelly Muhammad Hussein Sections & Objectives Principles

More information

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity. FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Lecture 05 Chapter 16 High Speed LANs

Lecture 05 Chapter 16 High Speed LANs NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education

More information

This PDF document is a sample chapter from the book...

This PDF document is a sample chapter from the book... This PDF document is a sample chapter from the book... To order this book, print the last page of this document. Copyright 2001 Society of Manufacturing Engineers Chapter 37 Manufacturing Networks 37.1

More information

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless TRANSMISSION MEDIA LOCAL AREA NETWORK (LAN) TECHNOLOGY 10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless page - 2 LAN TECHNOLOGY Protocol What is a Protocol? A protocol is

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

Lecture (04) Network Layer (Physical/Data link) 2

Lecture (04) Network Layer (Physical/Data link) 2 Lecture (04) Network Layer (Physical/Data link) 2 By: Dr. Ahmed ElShafee ١ Dr. Ahmed elshafee, ACU : Spring 2018, CSE401 Computer Networks Agenda Ethernet standards 10 base 5 10 base 2 10 base T Fast Ethernet

More information

Internet Architecture and Protocol

Internet Architecture and Protocol Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming 2 TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming Network Technologies 3 4 Elements of the Network Sender

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

Other Protocols. Arash Habibi Lashkari

Other Protocols. Arash Habibi Lashkari LAN Technology Other Protocols Arash Habibi Lashkari PHD of Computer Science - Information Security July 2010 Other Protocols Outlines: FDDI: Fiber Distributed Data Interface Token Ring: IEEE 802.5 LAN

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Cable types and connectors Fiber A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulated onto light waves. Fiber optics

More information

Lecture (04) Data link layer

Lecture (04) Data link layer Lecture (04) Data link layer By: Dr. Ahmed ElShafee Standards Overview CSMA/CD Ethernet standards 10 base 5 10 base 2 10 base T Fast Ethernet Gigabit Ethernet ١ ٢ Standards Overview Like most protocols,

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee Typical LAN Features for Physical layer Typical LAN Features for Data link layer Standards Overview 10BASE2 and 10BASE5 10BASE T

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Typical LAN Features for Physical layer Typical LAN Features for Data

More information

Network Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology

Network Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology By Dr. Piya Techateerawat Network Topology Bus Topology Ring Topology Star Topology Fully Connected Topology (Please refer to the 1 st lecture) Combined Topology Local Area Network IEEE 802.3:- Ethernet

More information

Lecture (04 & 05) Data link layer fundamental

Lecture (04 & 05) Data link layer fundamental Lecture (04 & 05) Data link layer fundamental Dr. Ahmed M. ElShafee ١ Agenda Foundation Topics Typical LAN Features for OSI Layer 1 Typical LAN Features for OSI Layer 2 Standards Overview 10BASE2 and 10BASE5

More information

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2 High Speed LANs CS420/520 Axel Krings Page 1 High Speed LANs Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs CS420/520 Axel Krings Page 2 1 Why High Speed LANs? Office

More information

Introduction to Networking

Introduction to Networking Networking BASICS Introduction to Networking... 2 Network Media... 4 Network Design... 5 Network Architectures... 7 Protocols and Network Software... 9 1 Introduction to Networking A computer network is

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are

More information

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed

More information

N11 = 100 MBH Input Aluminized Steel S13 = 125 MBH Input Stainless Steel E15 = 15 kw Electric Heat. E30 = 30 kw Electric Heat

N11 = 100 MBH Input Aluminized Steel S13 = 125 MBH Input Stainless Steel E15 = 15 kw Electric Heat. E30 = 30 kw Electric Heat PRODUCT NOMENCLAUTRE D L -4 N07 A T A A A 1 DIGIT Model Description Options 1 D Product Category D = Air Conditioner, Single Package 2 3-5 L -4 Product Identifier Nominal Cooling Capacity MBH L = R-22

More information

Introducing Cisco Data Center Networking

Introducing Cisco Data Center Networking Introducing Cisco Data Center Networking Cisco 640-911 Dumps Available Here at: /cisco-exam/640-911-dumps.html Enrolling now you will get access to 209 questions in a unique set of 640-911 dumps Question

More information

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D.

ITEC 3210 M - Applied Data Communications and Networks. Professor: Younes Benslimane, Ph.D. ITEC 3210 M - Applied Data Communications and Networks Professor: Younes Benslimane, Ph.D. Midterm Exam February 11 th 2013 Instructions Duration: 1 hour 20 minutes Answer all questions No documentation

More information

CompTIA Network+ Course

CompTIA Network+ Course CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency

More information

W52P1J-15-D-0060 [ ] Honeywell CN70GQ5KN00G1A40

W52P1J-15-D-0060 [   ] Honeywell CN70GQ5KN00G1A40 AMIS AIT-V Contract Products Snapshot This AIT-V Contract Products Snapshot is an abbreviated presentation of the product offerings by the three contractors providing their products and services. All CLINS

More information

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS 15.1 Computer room networks require very high data rates and usually are concerned with transfer of large blocks of data. 15.2 Backend LAN: Backend networks

More information

Module 11. OSI Model, Network Devices, and Network Standards

Module 11. OSI Model, Network Devices, and Network Standards Module 11 OSI Model, Network Devices, and Network Standards Objectives 1. Networking A.Differentiate between layers of the OSI model B.2.9 Compare network devices C.Compare network standards D.2.7 Compare

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the

More information

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control 168 430 Computer Networks Chapter 16 High Speed LANs Introduction Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs Why High Speed LANs? Office LANs used to provide

More information

Chapter 4: Network Access

Chapter 4: Network Access 4.0.1.1 Chapter 4: Network Access To support our communication, the OSI model divides the functions of a data network into layers. Each layer works with the layers above and below to transmit data. 4.0.1.2

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 2017 Lecture 18 Link Layer Protocols Continued Who is this? Reading: Chapter 5 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright

More information

Ethernet 101 Siemens Industry Inc All rights reserved. usa.siemens.com/industry

Ethernet 101 Siemens Industry Inc All rights reserved. usa.siemens.com/industry Connected Manufacturing Ethernet 101 usa.siemens.com/industry Why Ethernet Ethernet is Everywhere! Page 2 Ethernet is everywhere Ethernet is the most common computer networking medium Standardization on

More information

UYM-UOM-UOY-UOD- UOS-UOB-UOR

UYM-UOM-UOY-UOD- UOS-UOB-UOR UY-UO-UOY-UOD- UOS-UOB-UOR Indexable date stamps at.: Acier inoxydable 5-55 HRC :15 Remove inner insert from the outer insert using a screwdriver REF* REF REF REF REF REF REF D F 1 UY 4/2* UO 4 UOY 4/2*

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Chapter 9 Ethernet Part 1

Chapter 9 Ethernet Part 1 Chapter 9 Ethernet Part 1 Introduction to Ethernet Ethernet Local Area Networks (LANs) LAN (Local Area Network) - A computer network connected through a wired or wireless medium by networking devices (s,

More information

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub Ethernet -- Topology: Ethernet MAC: Hub Single collision domain Hub Hub Relay Collision! After a collision, stop for a random time wait for a random time, then try again. (Walrand/Varaiya slides) - computers

More information

JUBILEE HOW-TO HANDBOOK

JUBILEE HOW-TO HANDBOOK O T W O H E E L I B U J HANDBOOK TABLE OF CONTENTS ACCOUNT SETTINGS INSIDE A CASE Adding My Attorney Bar Number Adding an Office Adding Users Entering Your ECF Login & Password FILING CASES Adding Creditors

More information

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan Campus etwork Design Thana Hongsuwan Ethernet Standard 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMS v2.0 1-2 OSI Model Ethernet address Six bytes

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Chapter 12 Behind the Scenes: Networking and Security 1 Networking Advantages Networks Increase productivity Enable the sharing of hardware resources Facilitate knowledge sharing Enable

More information

Networking Essentials

Networking Essentials Networking Essentials Mark A. Sportack / SÄNiS PUBLISHING 201 West 103rd Street Indianapolis, IN 46290 Introduction xxiii Part I Network Fundamentals 1 A Networking Primer 3 Evolution of Networks 4 Standards

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

2-Type Series Pressurized Closures

2-Type Series Pressurized Closures 2-Type Series Pressurized Closures A complete pressure tight reenterable closure system for enclosing spliced connections of communications cables in a wide variety of applications. The 2-type Closure

More information

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? CCNA 1 Chapter 4 v5.0 Exam Answers 2015 (100%) 1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? application transport data link physical

More information

OSI Model with Protocols. Layer Name PDU Address Protocols Device

OSI Model with Protocols. Layer Name PDU Address Protocols Device NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation

More information