Chapter 2: LAN/WAN Interconnectivity

Size: px
Start display at page:

Download "Chapter 2: LAN/WAN Interconnectivity"

Transcription

1 Solutions Manual for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Michael Palmer, Bruce Sinclair Link download full: You can see more: Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: Objectives Chapter 2: LAN/WAN Interconnectivity After reading this chapter and completing the exercises, you will be able to: Explain the OSI reference model, which sets standards for LAN and WAN communications Discuss communication between OSI stacks when two computers are linked through a network Apply the OSI model to realistic networking situations Describe the types of networks as represented through LAN topologies Describe major LAN transmission methods, including Ethernet, Token Ring, and FDDI Explain the basic WAN network communications topologies and transmission methods, including telecommunications, cable TV, and satellite technologies Teaching Tips The OSI Reference Model 1. Stress to students that networking standards must be in place in order to ensure compatibility among the multitudes of computer/network hardware and software vendors. Use the example from the book to show students how difficult the pre-standards days were in this field. 14

2 2. Discuss ways the OSI model has facilitated growth in network communications over the years. Note that ensuring compatibility among vendors is not the only benefit. Another compatibility issue addressed by the model is ensuring that older network equipment is compatible with newer equipment. 3. Another benefit of the OSI model that is not listed in the text is ease of learning. The OSI model takes the difficult concept of communication between two devices on a network and breaks the process down into layers. This allows students to view the complex process in smaller, more specific steps. 4. When discussing the layered aspect of the OSI model, you might want to use the following analogy: When sending a letter to someone there are steps that are followed in order to ensure that the letter will arrive to the recipient safely. First, a letter is typed. Next, it is printed and placed in an envelope. The envelope must be properly addressed and stamped. Then, the letter must be placed in a mailbox in order to be delivered to the recipient. Breaking this process up into steps is similar to what the OSI model accomplishes with its layers. 5. Make sure that students understand that communications between two network devices go up and down the layered stack at each device. Use the example in the book to describe how this occurs. Note that the word stack is often used in place of the word model. 6. Stress to students that the OSI model is not an easy concept to understand initially. Many of the functions of the layers (particularly Layers 4-6) are hard to grasp because they are usually taken care of by software and are not seen by the user. It is an important part of networking and over time, students should try to understand what exactly occurs at each layer. Physical Layer 1. Discuss the characteristics of the Physical layer. Note that most of the characteristics found at this layer are visible to the user. This layer is usually the easiest to understand. 2. Since the physical layer is responsible for the physical transfer of data signals, it is considered the foundation of a data network. Remind students of the old saying: A house is only as good as the foundation upon which it is built. Most networking professionals agree that a network is only as good as the design and implementation of the physical infrastructure. 3. Consider bringing examples of media, connectors and other Physical layer components to class to use as visual aids. 4. Remind students that computers communicate with each other using binary code (1s and 0s). Discuss how analog and digital signals are used to represent binary numbers. 5. Discuss how EMI and RFI can cause interference with signal transmission on a network. When designing a network, students should be aware of the problems posed by EMI and RFI in order to avoid them. Data-Link Layer 1. Discuss the importance of the fields of a data link frame. Point out the address field and explain how the MAC address (physical address) is used in order to deliver the frame to the intended destination. Note that this address is not the same as another common address known as an IP address. 15

3 2. Discuss how the CRC field is used to detect errors during the transmission of a frame. Consider using the Internet to research some of the calculations used in CRC checking. 3. Make sure that students understand that the Data Link layer is divided up into 2 sublayers: MAC and LLC. Explain to students the Data Link layer is where hardware components of a network device interface with software components. The MAC sublayer is the lower of the two sublayers and is used to communicate with hardware components. The LLC sublayer is used for communication with software. 4. When discussing the differences between connectionless services vs. connection-oriented services, you might want to use an analogy of sending a letter vs. placing a phone call. When connectionless services are used, the source does not contact the destination before data is sent. When connection-oriented services are used, the source has to make a connection with the destination before any data can be sent. When sending a letter we usually do not contact the recipient before sending, but, when making a phone call we are contacting the destination. Network Layer 1. Mention to students that this layer is responsible for choosing the best path to send a packet on in order for it to reach the destination. If not for this layer, the Internet would be only an idea. 2. Discuss the term virtual circuits with your students. Make sure they understand that a virtual circuit is a temporary connection between two end nodes. Transport Layer 1. Mention to students that the Transport Layer performs many functions. Error recovery is one of these functions. Explain how acknowledgements are used to make sure that all information intended for the destination has been delivered. 2. Introduce the students to the term port numbers. The text does not go into detail regarding this subject, but it is a term that networking students will need to understand. 3. Discuss the importance of flow control. Usually, a source device can send information much quicker than the destination can process it. The Transport layer has many methods that can be implemented to facilitate flow control. One of which is through the use of acknowledgements, mentioned earlier in the section. Session Layer 1. Stress to students that the Session Layer is usually the most difficult layer to comprehend. Ensure students that as they learn more about networking concepts, the functions of this layer will hopefully become clearer. 2. Explain to students that besides establishing a session between two communicating devices, this layer is also responsible for dialog control. This means setting rules on which device can communicate at a certain time. When two devices initially communicate, the session layer implements Two-way Simultaneous dialog control. This is similar to communication on a 16

4 first-come, first-served basis. Communication collisions can occur (NOTE: not the same as a collision on an Ethernet network). If the devices experience a large number of collisions, the session layer can switch to Two-way Alternate dialog control. In this mode, the devices take turns to eliminate those collisions. Presentation Layer 1. Explain the importance of managing data formatting. Explain to students that mainframes are still in use on many networks today and users typically access mainframes using PC workstations. Since the two end devices use different types of data coding, the presentation layer makes sure one format type can be read by the other. 2. Discuss the benefits of using data encryption and data compression. Explain that if data has been encrypted or compressed by the Presentation layer of the source device, it is the Presentation layer s duty of the destination to de-encrypt and decompress the data so that it can be read by the appropriate network application. Application Layer 1. Explain to students that it is at this layer where the user interfaces with network applications such as file transfer, file management, remote access, , and terminal emulation. 2. Discuss the term redirector with the students. This service makes one computer visible to another for access through the network. Use Network Neighborhood to demonstrate this concept. Quick Quiz 1. What organizations developed the OSI model to help standardize networking technologies? Answer: ISO and ANSI 2. Which layer of the OSI model organizes bits so that they are formatted into frames? Answer: Data Link 3. At which layer would you find wire, connectors, and signaling? Answer: Physical 4. Which layer of the OSI model uses acknowledgements to ensure that data is sent and received correctly? Answer: Transport Communicating Between Stacks 1. Explain to students that in order for two devices to communicate, they must be operating under the same model. Use the board to demonstrate how information travels down through the layers at the source device. Then, travels up through the layers when it is received, where the original message can be read by the destination. Each layer at the source adds instructions that are to be followed by the destination, so that the destination will know what to do with the information. 17

5 2. Discuss how peer protocols are used to enable an OSI layer on a sending node to communicate with the same layer on the receiving node. 3. Introduce the term protocol data unit (PDU) which will also be discussed in the next section. Also explain that the PDU changes as it travels through each layer. Therefore, the PDU may be called different names as it travels through each layer. Applying the OSI Model 1. Discuss with students the example from the text of how the OSI model is applied. Point out that looking at the example in steps (layers) helps us understand the difficult concept of network communication. 2. Discuss Table 2-2. Make students understand that internetworking devices and protocols can be correlated to an OSI layer. 3. Consider inviting your school s network administrator or network technician to discuss how the OSI model can be used to support and troubleshoot network problems. Types of Networks 1. Explain to students the importance of learning the types of network topologies covered in this section of the text. It is important to have knowledge of all available when designing a network. 2. Discuss the considerations students should take when choosing the type of network topology should be implemented in a design. Examples of those considerations may be: Ethernet or Token Ring, amount of potential network traffic, type of software, other networks that may be connected, speed or bandwidth requirements, and security. 3. Although the text mainly covers physical topologies, explain to students that another type of topology is a logical topology which describes how nodes gain access to the media. Bus Topology 1. Prepare design examples that show how a bus topology is configured by either drawing them or finding graphic examples. 2. Discuss why a terminator is critical on bus networks. If using a drawing from the previous tip, use the drawing to demonstrate signal reflection. 3. Make sure that students understand the advantages and disadvantages of this type of topology design. Ring Topology 1. Prepare design examples that show how a ring topology is configured. 18

6 2. Explain that only Token Ring or FDDI networks implement this type of physical topology. 3. Make sure that students understand the advantages and disadvantages of this type topology. Star Topology 1. Prepare design examples that show how a star topology is configured. 2. When discussing the examples from the previous tip, point out that at the center of the star topology, a hub would be placed. Explain how and why hubs are used in most network designs today. 3. Discuss how the startup costs for this type of topology compare with the other topologies. Discuss other advantages and disadvantages of implementing a star topology. Bus Networks in a Physical Star Layout 1. Discuss how logical bus communication through the use of a physical star topology is accomplished. Point out that terminators are still used. 2. Explain how multiple hubs can be connected to expand the network in multiple directions. This topology is referred to as and extended star topology. Discuss the term backbone and how it is used in an extended star topology. LAN Transmission Methods 1. Explain that although there are three main LAN transmission methods, Ethernet is installed in more places because it has the broadest options for expansion and high-speed networking. The three methods are discussed in the following sections. Ethernet 1. Begin this discussion by explaining to students that one of the biggest differences in these transmission methods is how the host or workstation gains access to the media. 2. Explain the CSMA/CD control method. Make sure that students understand collisions and how devices recover from a collision. When discussing collisions, use an example of two students asking a question at the same time. The instructor will not be able to understand both, so the students have to stop talking, and then try asking their question again. 3. Discuss the characteristics of Ethernet NICs and what is required in order for them to operate correctly. Discuss where a NIC and the characteristics of the NIC (MAC address) can be found in the OSI model. 4. Explain the two examples of frame formats listed in the text. Discuss the significance of some of the specific fields such as source and destination address and the FCS field. 19

7 5. Make sure students understand that the standard is based on IEEE s interpretation of Ethernet. The Ethernet II frame format was developed by the original creators of Ethernet. Both recognize the standard which divided the data link layer into two sublayers: MAC and LLC. 6. You might want to use a protocol analyzer to capture a few frames and demonstrate the different fields found in the results of the capture. Token Ring 1. Discuss the characteristic of Token Ring. Mention that until recently, Token Ring networks could only operate at either 4 or 16 Mbps. 2. Explain that through the use of a device called a MAU, a token ring network can have a star topology layout. Use the whiteboard to demonstrate how a packet travels through the MAU in a logical ring. To do this, use the marker to travel from port to port without picking up the marker from the board. 3. Discuss the role of the token in Token Ring networks. Explain how it allows workstations to take turns sending data. Compare this to the way Ethernet devices gained access to the media. 4. You might invite a guest speaker, with Token Ring experience, to give a lecture on the benefits of Token Ring. FDDI 1. Explain to students that FDDI is used for high-speed backbone communications. It is not used to attach individual hosts to a network. 2. Discuss the characteristics of FDDI and how it operates. Discuss the benefit of using dual rings for redundancy. WAN Network Communications 1. Explain that like LANs, there are many different WAN network transmission methods. WAN network services are typically provided by telecommunications companies, cable TV companies, and satellite providers. Discuss some of the examples listed in the book. Ask students to list ones that might be more familiar to them locally. Telecommunications WANs 1. Discuss how telcos were the earliest source of WAN connectivity. Compare the most basic WAN communications versus T-carrier lines. Mention the option of fractional T services offered by most telcos. 2. Find out the type of WAN service used by your school. Consider inviting your network administrator or a representative from a local telco to discuss T-carrier services. 20

8 Cable TV WANs 1. Discuss how the Cable TV WAN services operate. In your discussion, mention how available bandwidths may vary depending on the Cable Provider. 2. Discuss the competition between Cable TV WAN providers versus Local Internet Service Providers in regard to providing Internet access to home users. Share your opinion of the future of ISPs. 3. Consider inviting a representative from a local Cable TV provider to discuss the services that they offer. Wireless WANs 1. In many communities, licensed amateur radio operators maintain packet radio LANs. Consider having members from a local amateur radio club make a presentation in class and discuss the capabilities of wireless communication for data. WAN Transmission Methods 1. Research the methods described in the chapter. Try to find graphic representations of how the methods work. Also, give examples of which technologies use which methods. For example, ISDN uses circuit switching and Frame Relay uses packet switching. Quick Quiz 1. Which topology is considered oldest communications design method? Answer: star topology 2. What occurs when two devices on the same Ethernet network transmit at the same time? Answer: collision 3. What device is used to join each node in a Token Ring network? Answer: multistation access unit (MAU) 4. FDDI supports a data throughput rate of. Answer: 100 Mbps 5. What speed does a T-1 line offer? Answer: Mbps Class Discussion Topics 1. Discuss what happens in terms of the OSI model when a user sends an across the Internet. 21

9 2. Would networking, as we know it, be the same if we did not have the OSI model? How might things be different? 3. Why is network security a more critical issue today than it was in the mid-1980 s? 4. Compare Ethernet and Token Ring transmission methods to how students would ask questions in class. 5. Discuss why MAC addresses (physical addresses) are an important component in networking. Additional Projects 1. Have students find out the top speed at which they connect to the Internet from home. Make a chart of all of the methods and the speeds of each method. Discuss whether existing line speeds are enough for their needs. 2. Have students research the services offered by their local companies, such as: telco, cable TV and/or satellite service. Have them report on which offer the most economical method of connecting to the Internet for home users. 3. Give students a scenario for a small network. Have students decide which physical topology and LAN transmission method they would use when designing the network. Further Readings 1. Tomsho, Greg, Guide to Network Support and Troubleshooting, Course Technology 2. Spurgeon, Charles, Charles Spurgeon s Ethernet Website, 3. Webopedia Website, Online Dictionary for Computer and Internet Terms, Technical Notes for the Hands-On Projects The lab setup for Chapter 2 hands-on projects includes the following elements (see the table): HANDS-ON PROJECT A lab or other access to workstations that have Internet access and Web browsers WORKSTATION OR SERVER OPERATING SYSTEMS REQUIRED OTHER RESOURCES REQUIRED 2-1 Workstations running any OS Web browser 2-2 Test lab network with a section of exposed coax or UTP cable Electric drill or fluorescent light 22

10 2-3 Workstations running Windows 2000, XP, or Red Hat Linux 7.x 2-4 Workstations running Windows 2000 or XP 2-5 Workstations running any Microsoft OS Workgroup with shared folders and shared printers 2-6 Workstations running Windows Paint 2000 or XP 2-7 Access to an Ethernet or Token Ring networked lab 2-8 Workstations running any OS Web browser Solutions Answers to the Chapter 2 Review Questions 1. Which of the following are possible Ethernet speeds? Answer: d. all of the above 2. One aspect of the ring topology that separates it from the bus topology is that: Answer: c. it does not use terminators 3. What is the T-5 data transmission rate for T-carrier communications? Answer: d Mbps 4. What type of source address is important to the MAC sublayer? Answer: a. physical or device address 5. The cable medium and voltage levels used on the cable are important to the OSI layer. Answer: physical layer or Layer 1 6. Collisions are not an important factor in Ethernet communications. True or false? Answer: False 7. Which type of protocol is more likely to enable detection of a communications error so that a frame or packet is resent when an error does occur? Answer: b. a connection oriented protocol 8. The OSI layer employs virtual circuits to establish communications paths. Answer: network 9. What is the purpose of Ethernet SNAP? Answer: Ethernet SNAP is used to provide a way to quickly adapt protocols that are not fully compliant with standards, such as AppleTalk and DEC s LAT protocols. 10. The purpose of flow control is to: Answer: b. help keep one device from transmitting faster than another device can receive 23

11 11. The field uses a cyclic redundancy check in an Ethernet frame? Answer: d. frame check sequence 12. An Ethernet network uses which of the following topologies? Answer: a. bus 13. Which of the following devices can work at any level of the OSI model? Answer: a. gateway 14. The type of switching separates channels by using different frequencies. Answer: frequency division multiple access (FDMA) 15. When beaconing occurs on a token ring network, what does this mean? Answer: the network is experiencing a problem 16. What type of WAN employs a headend in the topology? Answer: c. cable TV 17. A router performs discovery at the OSI layer. Answer: network 18. What types of packets are sent by FDDI? Answer: e. only b and c 19. Packet switching is a form of switching used on WANs. True or false? Answer: true 20. Which OSI layer can provide file transfer and file management services? Answer: c. application Hands-On Projects Tips and Solutions for Chapter 2 Project 2-1 In Step 6, the general reasons for standardization are provided by the ISO under the following topics: "Worldwide progress in trade liberalization" "Interpenetration of sectors" "Worldwide communications systems" "Global standards for emerging technologies" "Developing countries" Project 2-2 An optimal design for this project is a network that does not contain a network hub or switch and that is a bus network consisting of coaxial cable connecting two or more workstations and servers. Another viable option is a network that uses unshielded twisted-pair cable and a hub or switch. One method for displaying EMI/RFI problems is to first download a file of moderate size before applying EMI/RFI to the cable segment and observing the time it takes to download the file. Then place the EMI/RFI source as close as possible to the cable segment and observe and compare the time again. Emphasize to the students that proper installation and placement of network media is vital to reliable and optimal network performance. Coaxial cable is more susceptible to EMI/RFI interference because of the cable design and individual interface design of the hardware logic contained in the network 24

12 device. Unshielded twisted pair cabling and the individual interface design of the associated hardware logic contained in the network device takes into account EMI/RFI or noise present on the cabling and can tolerate higher noise ratios by employing media filters and isolation transformers on each twisted-pair interface that acts as a filter to minimize EMI/RFI. If your test network has an intelligent hub or switch that interconnects the workstations and servers, the easiest method for detecting problems will be to look for high error counts on the interface nearest the EMI/RFI source. You can observe these error counts on the hub or switch with the management software provided by the vendor or by utilizing the console port on the hub or switch. This project also demonstrates that a network having two or more workstations or servers should be interconnected via a hub or switch, and if possible, an intelligent hub or switch, to allow for better troubleshooting tools and for easier resolution of problems. Project 2-3 This project illustrates valuable tools for your students to use in identifying address information for a NIC in Microsoft Windows and Red Hat Linux operating systems. If you have other devices running other operating systems on your network, you might have students use similar tools to provide this information. This is example of why it is imperative that you have detailed documentation about your network so that when problems arise the device or devices that are causing the problems can be quickly located and repaired. You might also emphasize that it is important to keep this information up to date as the network grows. Most intelligent network devices, such as hubs and switches, will provide network management applications either locally or remotely that will allow you to view Layer 2 MAC addresses associated with individual interfaces to quickly locate devices connected to them. This will prove very useful in locating faulty devices on your network. This will also provide you with a tool for troubleshooting problems when you first connect a device to the hub or switch so that you can make sure the hub or switch verifies the address associated with the device connected to the interface. Project 2-4 This project enables students to view the SSL settings in Internet Explorer for Windows 2000 and XP. Consider using this project to initiate a discussion about the value of network security and encryption. You might also add a project in which students view how to set up encryption for a VPN or Web server and discuss the different types of encryption. Project 2-5 Students view the Microsoft redirector at work in this project. As a supplement to the project, you might have students monitor the activities of the redirector in Windows 2000 Server through the System Monitor. They can do this by selecting to view the Redirector object and one or more of its counters. To access the System Monitor, click Start, point to Programs, point to Administrative Tools, and click Performance. Next, click the plus sign in the System Monitor, select Redirector as the performance object, and select to view one or more counters. For example, you might have students monitor Bytes Total/sec, so that student can view the total amount of activity handled by the redirector. Project 2-6 This project provides an important visual tool and direct experience for understanding how a network is designed and why a network diagram is a valuable asset for (1) future design issues and (2) troubleshooting network problems. 25

13 Most network-drawing software vendors now provide stencils for many network devices and specific vendors. The stencils may provide detail down to the interface level for a better display of the network topology. This is a valuable add-on for network design and troubleshooting. Project 2-7 This project provides an example for your students that again shows why a thoroughly documented network is one of the most important steps in understanding how a network is designed and how it functions. The student should also completely understand how the cable plant is installed in the LAN and, if it is connected to a larger LAN or WAN, how it relates to that network. A close inspection of the network media is necessary to ensure that it meets the topology specifications for cabling types, distances, and routing of the cabling; and it will reveal the type of cable in use. Most cable vendors mark the cable type on the external cable jacket. For example, if the cable is for an Ethernet bus-type coaxial network, it will be marked as type RG58 A/U. If it is an Ethernet star-type unshielded twisted-pair network, it should be Category 3 at the minimum and hopefully Category 5. Students should inspect the connections to network devices and to the associated interfaces to determine if they match the topology specifications. For example, for Ethernet bus-type coaxial networks that are daisy-chained, each connection must contain a T-connector and an RG58, 50-ohm terminator when applicable to the last device on the chain. If the network is an Ethernet star-type unshielded twisted-pair network, RJ45 connectors should be installed and using the proper EIA/TIA 568 specification for color-coding and pin outs (students will learn more about this in the next chapter, but can begin making rudimentary observations now). Other topology specifications such as token ring or FDDI can be checked in the same fashion. When documenting their findings, students may discover that the internetworking devices provide an important key to understanding the network topology and transport method. Project 2-8 This project enables students to find out more about cable TV access, such as through two and AT&T Broadband. Due to the dynamic nature of the web pages maintained by the providers, the links may change for this project and your students may need to select other links that will provide the same information. Cable TV does provide a means for WAN access in many areas and one that is relatively easy to install and maintain. Most providers install and configure the equipment necessary to make this connection possible. The providers also supply support and instructions for problem or service change resolution. This access method is now widely available in many areas, particularly in metropolitan areas. Solutions to the Case Project Assignments In the following assignments, you work with RM Graphics to select a network transport method and the network topology. RM Graphics is a client of Network Design Consultants, your employer. You also help a new colleague to gain a better understanding of the OSI model. RM Graphics is a company that employs 19 graphic artists who reproduce the circuit designs or schematic drawings of electrical engineers. Most of RM Graphics' customers are Fortune 1000 companies that contract with RM Graphics to reproduce circuits for inclusion in customer product documentation. RM Graphics is interested in implementing a network to link the individual 26

14 workstations of the graphic artists, and has a particular need for reliability and high capacity for transmitting very large graphics files. 1. Which transport method, Ethernet or token ring, do you recommend they implement on their new network? Why? Answer: The RM Graphics company has, by their company function, some high-bandwidth requirements due to the large file size manipulations. Some of the requirements and design issues that the student should consider are: Schedule a time to visit the company and gather the following information: Meet with company administrators and employees to gather as much information as possible Focus on the administrator s wants and needs, such as network criticality and reliability Meet with a representative number of the people that work on a day-to-day basis with the applications and determine network demands Inspect the building architecture and determine the feasibility of various network topology considerations Meet with the building manager, if applicable, and determine if any present or future building design issues will present any problems. With these and other considerations in mind, the student should make his or her case for Ethernet or token ring, providing reasons for his or her selection. Note that due to the popularity of Ethernet and the many options that it offers, it is likely that this will be the best solution. 2. Given what you know about network topology, which basic topology do you recommend for RM Graphics? Answer: Using the information that the student gathers from the company, its administrators, employees, and building management, then an informed decision can be made to determine the network design, topology, and transport method. The student should consider all of the information and determine the present and future needs of the organization along with the vendor used and the related topology needed for compatibility. Students might consider the current user base for Ethernet and token ring as well as the cost and availability of related network equipment. Of course, the topology will be linked to the student s answer for part a in this case. If she or he recommends token ring, then a ring-based topology (noting that it is a physical star) should be used; and if the recommendation is for Ethernet, then the topology can be a bus or star, with star as the preferred option. 3. Brett Mason, a new colleague at Network Design Consultants, is unsure about some aspects of the OSI model. He has a list of questions for you and asks that you develop a table that he can use as a reference for the answers. Create a table containing two columns and seven rows. Label the left column "Network Function" and label the right column "OSI Layer." Enter each of the following functions in its own row under the left column and then specify the OSI layer that performs that function under the right column. Brett's questions about functions are as follows: Which layer resizes frames to match the receiving network? Which layer performs data compression? Which layer ensures data is received in the order it was sent? Which layer handles the data-carrying signal? 27

15 Which layer provides file transfer services? Which layer enables routing? Which layer enables the receiving node to send an acknowledgment? Answer: The communication with and understanding of a new employee in any organization is vital to the firm s success. Brett should thoroughly understand the technology and how it relates to the successful completion of the project. The creation and presentation of the table showing the relationship of the OSI model and the layer functionality s will be important for Brett in designing present and future projects. Directing Brett to other sources of information such as the regulatory organization s web sites or documentation will also help Brett understand. Brett can visit the IEEE, IETF and other network related regulatory web sites for further information. There are also many different trade periodicals that Brett can consult along with numerous training courses from several different training groups. FUNCTION Resizes frames to match the receiving network Performs data compression Ensures that data is received in the order it was sent Handles the data-carrying signal Provides file transfer services Enables routing Enables the receiving node to send acknowledgement OSI LAYER Transport Presentation Transport Physical Application Network LLC at the data-link layer for connection- oriented service and the transport layer 4. Brett likes your table and has another question. He would like you to explain MAC addressing. Answer: Brett s MAC addressing question can be explained by the Organizationally Unique address assignment by the IEEE for each vendor company. Each network interface or NIC on a network device has a unique address that enables a frame to reach its destination. In this address, called the device or physical address, the first series of bytes identify the NIC vendor and are a valuable tool for network administration. The student might recommend that Brett visit the IEEE web site at and follow the standards links to the organizational unique identifiers for a downloadable document with each vendor s address. 5. RM Graphics is calling for help in developing a way to electronically receive and transmit files to their customers. Explain three ways in which they can use WAN connectivity for this purpose. Which of the three ways do you recommend for their situation? Answer: RM Graphic s request for file transfer and retrieval should be investigated with the following considerations: Company resources such as server availability, disk storage resources, and CPU resources WAN bandwidth requirements File types and security 28

16 Several types of methods for file transfer and retrieval could be: An FTP server A web-based server An outsource service provider providing file transfer and retrieval and WAN bandwidth Each of these methods can be accomplished through WAN connectivity such as: POTS/PSTN T-carrier lines Cable TV Wireless communications, such as radio or microwave communications Also, each method has advantages and disadvantages that include the following issues: Security Local or remote administration WAN bandwidth costs and availability Equipment costs Solutions for the Optional Team Case Projects 1. Western Antiques, the company with which you worked in Chapter 1, is interested in linking the LANs in five of its stores that are located in different cities in the same state. The stores are 20 to 100 miles apart. Form a team and discuss the best method for connecting the individual store LANs into a WAN. Answer: As a team assignment, it is extremely important to assemble the team with the appropriate personnel in the respective areas of expertise. Western Antiques as a retail business requires a highly reliable, secure, and cost effective network to enable each of its stores to perform business activities. The selection of the WAN topology and the provider of that topology depend on the service provider s network and bandwidth availability. Now that Western Antiques has decided to connect several different stores on a WAN, a more complex decision should be made as to the incorporation of data, voice and possibly video onto to its network. Some aspects to consider are: The cost of the bandwidth for each site Cost savings of long distance voice calls Use of video conferencing on the WAN Circuit and equipment return on investment period of incorporating data, voice and video The type of transport method such as POTS, T-carrier, cable TV, and wireless will depend on availability, costs, bandwidth requirements, and compatibility with the desired applications. These decisions are complex and need thorough decision making to provide the best services for Western Antiques in terms of reliability, security and cost effectiveness. 29

17 However, in terms of these factors, the most likely solutions studied to this point are POTS and T-carrier. 2. Several of the consultants at your company are interested in the relationship between accessing the Internet and how the OSI model is implemented. Create a team to make a presentation to the other consultants. In your presentation, consider as an example how one person uses a network browser to access the Internet. Trace the interaction of the browser and Internet to each OSI layer. You might use tables or diagrams to better illustrate your explanation. Answer: Again as a team, it is extremely important that each member of the team has a fundamental understanding of how each application or device interacts with one another. One possible presentation would be to explain and display how each network related device such as a PC and its associated web browser software, a hub, a switch, a router, and a server correspond to its respective OSI model layer. Trace the PC s browser request for Internet access through each device and how the device corresponds and interacts with the respective OSI layer, showing how it transits up and down the OSI model. Students might use tables via a word processor, overhead slides, or PowerPoint slides in their presentation. 30

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Full file at

Full file at Hands-on Networking Fundamentals Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. Your network computer can transmit faster than an older network printer can receive. What capability of

More information

Full file at

Full file at Hands-On Networking Fundamentals, Second Edition Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. You run a machine shop that houses many electrical machines, fans, and an air conditioning

More information

Contents. Introduction to Networking. Preface...i. Introduction... xix

Contents. Introduction to Networking. Preface...i. Introduction... xix Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and

More information

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1 IT 4504 Section 4.0 Network Architectures 2008, University of Colombo School of Computing 1 Section 4.1 Introduction to Computer Networks 2008, University of Colombo School of Computing 2 Introduction

More information

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards Guide to Networking Essentials, 6 th Edition Chapter 6: Network Reference Models and Standards Objectives Explain the OSI reference model layers and their relationship to hardware and software Explain

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Chapter 4: Network Access

Chapter 4: Network Access 4.0.1.1 Chapter 4: Network Access To support our communication, the OSI model divides the functions of a data network into layers. Each layer works with the layers above and below to transmit data. 4.0.1.2

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network

More information

What is a Network? A connection of two or more computers so that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources. NETWORKS What is a Network? A connection of two or more computers so that they can share resources. Network Benefits Remote access Sharing files & resources Communication Cost Maintenance Communication

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

Computer Networks and Internet

Computer Networks and Internet Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data

More information

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved. Unit 10 Networks Copyright 2005 Heathkit Company, Inc. All rights reserved. The basic components of a network: Connections (Physical Medium) Protocols (Common language) Services (Clients, Servers, and

More information

This PDF document is a sample chapter from the book...

This PDF document is a sample chapter from the book... This PDF document is a sample chapter from the book... To order this book, print the last page of this document. Copyright 2001 Society of Manufacturing Engineers Chapter 37 Manufacturing Networks 37.1

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

NETWORKING 1. Internet 1.2. Standardized addressing

NETWORKING 1. Internet 1.2. Standardized addressing NETWORKING 1. Internet The uses and the actual physical size of the Internet grows day-to-day. It is an area of technology that is immersed in jargon and ignorance. Many people often confuse the World

More information

Hands-on Networking Fundamentals. Chapter 12 Maintaining and Troubleshooting Your Network

Hands-on Networking Fundamentals. Chapter 12 Maintaining and Troubleshooting Your Network Hands-on Networking Fundamentals Chapter 12 Maintaining and Troubleshooting Your Network Objectives Use hardware and software methods to monitor a network Perform backups over a network Solve a broad range

More information

A. Department Information: Business and Economics Management Information Systems Course ID: MIS 090

A. Department Information: Business and Economics Management Information Systems Course ID: MIS 090 SAN BERNARDINO VALLEY COLLEGE CURRICULUM APPROVED: FA2000 1 I. CATALOG DESCRIPTION: A. Department Information: Division: Business and Economics Department: Management Information Systems Course ID: MIS

More information

Netwoking Essentials

Netwoking Essentials Mark Sportack Walter J. Glenn Sams' Teach Yourself MCSE Netwoking Essentials SAMS PUBLISHING IN 14 DAYS Sams Publishing is an independant entity from Microsoft Corporation, and not affiliated with Microsoft

More information

Introduction to Networking

Introduction to Networking Networking BASICS Introduction to Networking... 2 Network Media... 4 Network Design... 5 Network Architectures... 7 Protocols and Network Software... 9 1 Introduction to Networking A computer network is

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

Lecture (02) Network Protocols and Standards

Lecture (02) Network Protocols and Standards Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components

More information

SYLLABUS. Departmental Syllabus

SYLLABUS. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0801 SEMESTER: COURSE TITLE: Networking I COURSE NUMBER: CIST- 0117 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL: PREREQUISITE(S):

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

Lecture (03) (I) OSI Reference Model

Lecture (03) (I) OSI Reference Model Agenda Lecture (03) (I) OSI Reference Model Dr. Ahmed M. ElShafee History OSI Layers Layers function OSI & TCP/IP & NetWare Example protocols OSI Layering Concepts and Benefits OSI Terminologies ١ ٢ History

More information

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 04 Media and Devices College of Information Science and Engineering Ritsumeikan University Network Media and Devices l When you build a network, the network hardware may be used

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

2. Network functions are associated with only one layer of the OSI model. 4. Not all Transport layer protocols are concerned with reliability.

2. Network functions are associated with only one layer of the OSI model. 4. Not all Transport layer protocols are concerned with reliability. Chapter 2: Network Standards and the OSI Model TRUE/FALSE 1. Standards assist in network design. T PTS: 1 REF: 39 2. Network functions are associated with only one layer of the OSI model. F PTS: 1 REF:

More information

ก ก Information Technology II

ก ก Information Technology II ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36 Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

CCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks

CCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks CCNA Exploration Network Fundamentals Chapter 10 Planning and Cabling Networks Updated: 15/07/2008 1 10.0.1 Introduction 2 10.0.1 Introduction The following have been covered in previous chapters: considered

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1 Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

Chapter -4 OSI Reference Model

Chapter -4 OSI Reference Model Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces

More information

Computer Communication Networks Lecture No. 1

Computer Communication Networks Lecture No. 1 Computer Communication Networks Lecture No. 1 Reference books used in lectures 1- Computer Networks, Tanenbaum 2- Communication networks, Sharam Hekmat 3- Computer Networks, a system approach, L. Peterson

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3 The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture

More information

CHAPTER -1. Introduction to Computer Networks

CHAPTER -1. Introduction to Computer Networks CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming 2 TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming Network Technologies 3 4 Elements of the Network Sender

More information

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1 Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee Typical LAN Features for Physical layer Typical LAN Features for Data link layer Standards Overview 10BASE2 and 10BASE5 10BASE T

More information

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I Lecture (04) Network Access layer fundamentals I By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Typical LAN Features for Physical layer Typical LAN Features for Data

More information

Chapter 2 Networking Standards and the OSI Model

Chapter 2 Networking Standards and the OSI Model Network+ Guide to Networks, 6 th Edition 2-1 Chapter 2 Networking Standards and the OSI Model At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

Communication Networks

Communication Networks Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture

More information

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta)

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta) 70-742 Number: 70-742 Passing Score: 750 Time Limit: 120 min File Version: 1.0 Microsoft 70-742 Exam Name: Identity with Windows Server 2016 (beta) Sections 1. Understanding Local Area Networks 2. Defining

More information

Communication Technologies

Communication Technologies Unit 29: Communication Technologies Unit code: F/601/7264 QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to ensure learners understand the

More information

The NIC is the main interface between the computer and the network cable.

The NIC is the main interface between the computer and the network cable. The NIC is the main interface between the computer and the network cable. 50 Parallel data into serial data. Memory CPU Computer 10011001 Cable 1-0-0-1-1-0-0-1 NIC 51 Considerations when selecting the

More information

Network Protocols. Terms you ll need to understand: Techniques you ll need to master:

Network Protocols. Terms you ll need to understand: Techniques you ll need to master: 3 Network Protocols Terms you ll need to understand: OSI Reference Model Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer IEEE 802 specifications

More information

NETWORK SECURITY ITEC 435

NETWORK SECURITY ITEC 435 NETWORK SECURITY ITEC 435 Agenda Chapter 2: Introduction to Networking Introduction to Networking Networking Fundamentals Reasons to Network Getting the Message Across Analog Information on an Analog Medium

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Lecture (04 & 05) Data link layer fundamental

Lecture (04 & 05) Data link layer fundamental Lecture (04 & 05) Data link layer fundamental Dr. Ahmed M. ElShafee ١ Agenda Foundation Topics Typical LAN Features for OSI Layer 1 Typical LAN Features for OSI Layer 2 Standards Overview 10BASE2 and 10BASE5

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Local Area Network(LAN)

Local Area Network(LAN) Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Chapter 10: Local Area Networks

Chapter 10: Local Area Networks Chapter 10: Local Area Networks MULTIPLE CHOICE 1. CSMA stands for: a. Client-Server Multi-Access c. Carrier Server Master Application b. Carrier Sense Multiple Access d. none of the above 2. The CD in

More information

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science 1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we

More information

(Network Programming) Basic Networking Hardware

(Network Programming) Basic Networking Hardware EEE 448 Computer Networks with (Network Programming) Basic Networking Hardware Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Agenda What is a network device? Network Media

More information

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

More information

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network 87-01-01 DATA SECURITY MANAGEMENT NETWORK TECHNOLOGIES FOR INFORMATION SECURITY PRACTITIONERS: PART 1 Chris Hare INSIDE What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches;

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Module 11. OSI Model, Network Devices, and Network Standards

Module 11. OSI Model, Network Devices, and Network Standards Module 11 OSI Model, Network Devices, and Network Standards Objectives 1. Networking A.Differentiate between layers of the OSI model B.2.9 Compare network devices C.Compare network standards D.2.7 Compare

More information

Different network topologies

Different network topologies Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical

More information

Data Communication. Introduction

Data Communication. Introduction Data Communication Introduction Course Information Assistant Instructor Reza Hassanpour Faris Serdar Taşel Office: L214 Office: L205 Phone: 2331338 Phone: 2331357 Email: reza@cankaya.edu.tr Email: fst@cankaya.edu.tr

More information

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?

More information

Come & Join Us at VUSTUDENTS.net

Come & Join Us at VUSTUDENTS.net Come & Join Us at VUSTUDENTS.net For Assignment Solution, GDB, Online Quizzes, Helping Study material, Past Solved Papers, Solved MCQs, Current Papers, E-Books & more. Go to http://www.vustudents.net and

More information

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Chapter 2 Communicating Over the Network

Chapter 2 Communicating Over the Network Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,

More information

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11 Types of Computer Networks ICS 614: Computer Networks Concepts and Principles 11 Types of networks Networks are categorized by distribution, size, and architecture. A network can be as simple as a single

More information

Gigabit Networks, VLANs & Wireless LANs

Gigabit Networks, VLANs & Wireless LANs Hands-On Gigabit Networks, VLANs & Wireless LANs ( Advanced Local Area Networks ) Course Description This Hands-On course will discuss traditional Ethernet as it is evolving today and its future. Ethernet

More information

Discovering Computers Chapter 9 Communications and Networks

Discovering Computers Chapter 9 Communications and Networks Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe

More information

Computer Networks. Chapter 1 An Introduction to Networking

Computer Networks. Chapter 1 An Introduction to Networking Computer Networks Chapter 1 An Introduction to Networking Contents Why use network? Network history Types of networks By connecting methods By geographic areas By topologies By network model Why Use Networks?

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information