1 Abstract Keywords: Wireless, wired, network, router, packet switching, circuit switching, protection, MPLS

Size: px
Start display at page:

Download "1 Abstract Keywords: Wireless, wired, network, router, packet switching, circuit switching, protection, MPLS"

Transcription

1

2 1 Abstract The growth number of broadband user connections in the world, the wide use of mobile devices and other appliances to get information through the Internet always requires some level of availability to support customer needs. This necessity made infrastructure high available for being used to be used on large scale and has then been migrated to service providers which offer solutions and they ensure short time to repair. In this seminar we present the structure of wired and wireless networks and the structure of computer networks with Internet. We overview the common point of wired and wireless networks, router, different network topologies, describe packet and circuit switch networks and point out major protection methods for high availability. Keywords: Wireless, wired, network, router, packet switching, circuit switching, protection, MPLS 2

3 2 Table of Contents 1 Abstract Table of Contents Introduction OSI Layer Wireless networks Wired Networks Protection on layer OSI Layer Circuit-switching networks ATM Packet switching network Token Ring CSMA OSI Layer Routing OSI Layer MPLS Suggestions for future work Non Protected Hot Standby Ring Protection Space Diversity Frequency Diversity Tributary Protection Tributary Always On IDU Hot Standby Protected Tributary IDU Hot Standby Tributary Always On IDU 1+1 Dual ODU Conclusion Works Cited

4 3 Introduction Increase in data transfer over computer networks requires a protection mechanism. With protection we intend to protect data due to network failure. Our goal is to make network parts redundant to achieve higher data transmit reliability. [1] [2]These network failures can happen as a result of broken links, equipment failures, traffic jams, etc. In practice protection can be done in two ways: with hardware and/or software. Hardware protection is done with redundant hardware element in the network system. This redundant element has to be ready all the time and at the point of failure it needs to take over all the responsibilities from failed one. The redundant element is the same in function and purpose as failing one. Both of them must control status of them self and among each other. This communication is done in software and controls relevant information, and switches to redundant element when failure occurs. Software protection can be done with redundant path, this means that between transmitter and receiver exist at least two independent paths (not necessarily same network technology). When failure occurs, software reroutes data to go through redundant path. Customers, who use this connection for transmitting data, must not notice the difference. We also need to have in mind that some protocols, like for voice call, must not exceed 50 milliseconds of failure time, so these systems must be fast in responding. Because these redundancy systems are very expensive, only important backbone routers use it. Protection can be done on multiple layers of ISO OSI layer scheme. OSI is divided into seven layers, within each, one or more entities implement its functionality. OSI layers are: 1. Physical; Media, signal and binary transmission 2. Data link; Physical addressing 3. Network; Path determination and logical addressing 4. Transport; End-to-end connections, reliability and flow control 5. Session; Inter host communication, managing sessions between applications 6. Presentation; Data representation, encryption and decryption, convert machine dependent data to machine independent data 7. Application; Network process to application For our seminar first three layers are important and later we will review them in details. Our goal in further research work will be to implement different protection scenarios in a real network, to measure time delay and data throughput. Based on these results we will try to propose new network protection scenarios. 4 OSI Layer Wireless networks Wireless networks have advantage comparing to wired networks mainly where a problem is terrain (mountains, swap, sea, jungle, etc.). Although term wireless network is loosely, there are three main types of network: wide area, local area and personal area networks. Wide area networks include the networks provided by telecoms. It is designed to transfer traffic across longer distances and can be used as part of backbone networks. A typical system contains access points, base station gateways and wireless bridging relays. The wireless connections between access points are usually point to point microwave links. In this type of network we have technologies like LTE, WiMAX, UMTS, GSM, etc. Wireless local area networks are set up to provide wireless connectivity within small place like house, airport, hotel, etc. This gives users ability to be connected to the Internet 4

5 through access point and to move around within a local coverage. Main presenter of WLAN is standard also known as Wi-Fi. Personal area networks are networks that provide wireless connectivity over distances of few meters. The devices establish an ad-hoc network when they are within range, and the network is dissolved when the devices get out of range. These technologies are infrared (IR), Blue Tooth, ZigBee, etc. 4.2 Wired Networks Wired networks consist of cooper twisted pair, coaxial lines and fiber-optic lines. Cooper twisted pair is mainly used for telephone networks. One wire transmitting data is like an antenna, while twisted pair cancels out the waves from each other. Coaxial line has better shielding than twisted pairs, so it can span longer distances at higher speeds. It is used mainly in cable television. Fiber optic is the most advanced technology, used for all kinds of services: telephone, television and internet. 4.3 Protection on layer 1 There are several ways how to achieve protection on Layer 1 and some researches have been made [3]. If we have a case where an excavator cuts the bundle of cables and we have a primary and redundant cable in this bundle, we are not able to reestablish a connection and the problem remains. We have two solutions; first is that we have wireless redundant link; second is that redundant cable goes in totally different way. The less primary and redundant connection have in common, the better is the protection. 5 OSI Layer 2 Today s networking is combination of different sub networks [4]. This sub networks are circuit switched or packet switched networks. For quality assurance it is important to understand how packets of data are created and how are they directed across different networks. 5.1 Circuit-switching networks The term circuit switching refers to a communication protocol where two network nodes establish dedicated channel. Instead of having each channel correspondent to physical path, paths are virtual. Three general properties define the circuit switched path: point-topoint connection; steps for establish connection, using it and to destroy It; equivalent to physical path. Point-to-point connection means that connection is made between two end points; transmitter and receiver. Second property describes that each connection is done in three steps. In first step circuit is established, in second step data is exchanged and in third step the path is terminated. Third property describes that although it is virtual path, for a user it is the same as isolated physical path. For explaining circuit switching network parallelism with phone call can be made. When we are trying to call someone we need to dial his number and then wait for the connection before we can talk. All the words follow the same path through network. After the conversation is over the connection is terminated. And if something is wrong on the way- if failure occurs - the connection is terminated. This is one of the main reasons what telecoms do not like about it. But it has some good sites like Quality of service (QoS) and billing. Despite having technologies like TDM, X.25 and Frame relay, Asynchronous Transfer Mode (ATM) is far more important. 5

6 5.1.1 ATM ATM [5] [6] uses asynchronous time-division multiplex. It is core protocol over SONET/SDH backbone of the public telephone network. At first it was designed for telephone circuit switched networks, but then it was adapted for small packet switched networks as well. It is constructed for high-throughput data traffic and real time, low latency content like voice and video. The ATM cell consists of a 5-byte header and a 48-byte payload. (For comparison, Ethernet packets can be up to 1500-byte). ATM technology gives the impression that multiple data is transmitted along at the same time, but it actually divides time slots among more strings, so only one data string at a time is being transmitted over the path. Time slots are determined based on type of data. It operates as a channel-based transport layer, using virtual circuits. Virtual circuits are divided in two levels as shown on Figure [1], virtual path (VPI) and virtual channel (VCI). On each physical line there is 8 or 12-bit VPI identifier and 16-bit VCI identifier. Figure 1: ATM path 5.2 Packet switching network The main alternative for circuit switching is packet switching, which form the basis for internet. A packet switching uses statistical multiplexing in which multiple packets compete for the use of shared media [7]. The big difference arises because a packet switching requires from a transmitter to divide the message into blocks of data, called packets. The size of packets varies depending on used technology. There are three main properties: arbitrary, asynchronous communication; no set-up required before communication begins; performance varies due to statistical multiplexing among blocks. The first property means that the transmitter can communicate with one or multiple recipients, and one receiver can receive packets from one or many transmitters. Between two successive communications an arbitrary long delay can occur and this connection can happen at any time. A second property means that packets can be transmitted directly, no need to perform initialization and after transfer is done, no need to notify for terminating a connection. Third property means that statistical multiplexing is rather done among blocks (packets) than bits or bytes. That is, the transmitter transmits entire packet, and then allows other transmitters to transmit packets. Only when no other transmitters are ready to transmit a packet, one can transmit repeatedly. A data packet on Ethernet link is called Ethernet frame. It can be up to 1500-byte in size in some cases even bigger. Packet size depends on data size. As shown on Figure[2] in the head of a packet are 6-byte Media Access Control (MAC) source address and 6-byte MAC destination address. Based on these two addresses switch can determine from which physical interface the packet came and which physical interface to transmit it. Switch builds its own database and each MAC address is in a combination with a particular physical interface. So when packet is traveling around network, each time it comes to switch, it checks source and destination MAC address, it changes the header with new source and destination MAC address and transmits it to the destination. 6

7 Figure 2: Ethernet and IP Packet We know different protocols for statistical multiplexing in packet switching: ALOHA, MACA, MACAW, CSMA, Token ring, Token bus, etc. Two dominant protocols we will present in details: Token ring and CSMA. To understand different packet switched network topologies we prepared an overview. Topology is the layout pattern of different network components, computers, switches, hubs, routers, etc. Its physical design of a network includes the devices, location and connections among them. We have six basic topologies and several combinations. Basic topologies are: Point-to-point; the simplest topology, where two devices are connected with one link Star, Figure[3.1]; special point-to-point connection, where multiple nodes are connected to central device. With N nodes, we have N point-to-point connections. Ring, Figure[3.2]; this topology got name after the circular fashion in which nodes transmit data in one direction around the ring. Each node has two neighbors, one on its left and the other on its right, because data are traveling in only one way, each node acts like repeater. Mash, Figure[3.3]; this is the most protected, fault proof network. Here each node is directly connected with all other nodes. The number of connections can be calculated with this formula: (N(N - 1) / 2), where the N is the number of nodes. Bus, Figure[3.4]; basic topology for Ethernet, where each node is connected with a single cable to bus cable. Bus cable is like backbone and connects all the nodes. It works based on device address. Data is sent to all nodes on the bus but only the node with right address keeps it, other nodes discard the data. Figure 3: Network topologies: 2.1-Star topology; 2.2- Ring topology; 2.3- Mash topology; 2.4- Bus topology 7

8 5.2.1 Token Ring [8]Physically, a token ring network is connected as a star, with hub in the center, and other communication equipment as arms. Because only one transmitter can transmit at the time, special 3-byte frame is sent around stations- called token. Only the station carrying token, can transmit data. Duration for transmitting depends on predetermined importance of station. When the permitted data is sent from one station, token moves to the next station, which can then start to transmit data. This protocol is good to send distributed data, but has speed issue. It can only operate up to 100 Mbps and this is main reason why CSMA dominates CSMA CSMA is algorithms for allocating MAC. Its purpose is to transmit packets among bus without collision [9]. When a transmitter has data to transmit, it first listens to the channel to see if anyone else is transmitting at that time. If the channel is busy, the transmitter waits until it becomes idle. When the transmitter detects an idle channel, it transmits a frame. If a collision occurs, the transmitter waits a random amount of time and starts all over again. This random delay in case of collision detection has an important effect on the performance. There is a small chance that two transmitters will wait exact same time and then start with protocol from beginning, but in case this happens the delay gets more and more important and protocols performance gets worse. Many protocols arising from CSMA have been proposed: CSMA With Collision Detection (CSMA/CD) [10], CSMA With Collision Avoidance (CSMA/CA), CSMA With Collision Avoidance and Resolution using Priorities (CSMA/CARP). 6 OSI Layer Routing Routing, on 3th OSI layer, is a process of selecting paths, where network traffic will be sent. It is performed for different kind of networks, for circuit switching and packet switching. In packet switching networks, each packet is routed individually. Packets are forwarded as logically addressed packets from their source towards their destination through intermediate nodes, typically hardware devices called routers. Between source and destination device is usually more than just one path. Two successive packets sent from source towards destination do not have to go through the same path. Reasons for not going the same path are different; link failure, rout congestion, hardware problem, etc. This routing is done based on routing tables. Each router device builds and maintains its own table for routes to various network destinations. Devices communicate with each other through protocols Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) [11]. These protocols bases on different variables, for example; vector distance determination to the destination device and cost of a path, which provider can determine for each path. Protocol calculates all variables and determines the shortest path to destination. These protocols are also ready for network failure, as they have mechanism that checks the connectivity with other routers. If they sense router failure, they update routing tables with bypass of failed router if possible. The structure of IP packet is shown on Figure[4] and is similar to Ethernet packet without MAC addresses [12]. IP packet is transmitted across networks with Internet Protocol (IP) source and IP destination, each having 4-byte. Important information for routing is also the subnet mask which is a logically visible subdivision of an IP network. All computers that belong to a subnet are addressed with a same most-significant bit-group in their IP address. This results in the logical division of an 8

9 IP address into two fields, a routing prefix and the rest for host identifier. The rest field is an identifier for each computer. 7 OSI Layer MPLS [13] [14] Multiprotocol label switching (MPLS) was originally designed to improve speed of routers but now it is merging as a new important standard technology that offers new capabilities for IP networks. MPLS takes the best of ATM and Ethernet at same time. Instead of IP source and destination it uses short labels, similar like ATM. In MPLS there are two types of routers; edge and label switched routers. Edge router where packet enters the MPLS network encapsulates the IP packet and adds the label in the header. Edge router prepares label switched path for packets and notice, over OSPF protocol, all the routers on the path which label to use. Label switched routers forward MPLS packet based on label, they also have possibility to change, drop or add labels. Finally before labeled packet leaves the MPLS network another edge router removes the label. The same can be done for ATM network except that MPLS packet is first divided to fit ATM cells size (48-byte). These labels can also be dynamically changed due to forwarding or network failure. MPLS besides OSPF and RIP protocols support manually updating the forwarding tables. This benefit in traffic engineering where we can control the data flow, predict and prevent congestions, etc. MPLS packet is shown on Figure[4], where we see that MPLS header is between Ethernet (OSI layer 2) and IP header (OSI layer 3) so we say that MPLS is in 2.5 in OSI layer. Header size is 4-bytes it can have multiple labels in one packet, but last label must have s bit set to 1and all prior labels must have s bit set to 0. Figure 4 MPLS packet 8 Suggestions for future work Till now we discovered different networks and protocols they use to direct data packets across network. The goal for the future work is to implement different scenarios containing these networks in real environment and measure throughput and time delay. Based on results we will get we will try to optimize protection scenarios and provide better solutions to the existing ones. We prepared several scenarios that will be explained in this chapter. We will presume that our router can handle these technologies: wireless microwave point to point and wired; fiber and twisted pair cooper. Microwave hardware consists of three parts as shown on Figure[5]: Outdoor Unit (ODU), Radio access card (RAC) and Indoor unit (IDU), wired hardware consist of Data Accessed Card (DAC). 9

10 Figure 5: Router with IDU, RAC, ODU and DAC Protection scenarios are: 8.1 Non Protected A non-protected terminal, also known as 1+0, is a configuration in which there is a single transmission path without redundancy of any kind. A terminal has a single ODU and a single RAC. In this configuration any traffic-affecting fault in either of these units will result in a loss of traffic over the link. 8.2 Hot Standby A protected terminal, also known as 1+1, provides two redundant transmission paths, but only one is active at any one time [15]. A hot standby terminal consists of two ODUs and RACs. Each ODU operates on the same frequency, with the online transmitter connected to the antenna, while the offline ODU is muted. In the receive path, the incoming signal is split between the two receivers. Once again the RAC automatically selects a corrected frame over an uncorrectable frame. 8.3 Ring Protection The architecture enables a self-restoring ring construction, where the traffic enters and leaves the ring from a single point. The traffic is carried in one direction around the ring and the alternate direction is used to provide a protection path when the primary direction fails [16] [17]. 8.4 Space Diversity Space Diversity is a special equipment configuration used to combat the adverse effects caused by multipath fading (which occurs only at lower frequencies). The diversity operation is realized by receiving the same signal using two antennas, spatially separated (vertically). Each antenna is connected to a receiver. Once again the RAC automatically selects a corrected frame over an uncorrectable frame. 8.5 Frequency Diversity Frequency diversity is a dual-frequency protected configuration, which provides protection against multi-path fading (although less than that provided by space diversity), but requires the use of a single antenna. In FF configuration, the main and redundant radio links 10

11 operate on different frequencies, with path selection made again between the two received signals. There is no transmitter switch. 8.6 Tributary Protection In this construction two data access cards are used to provide protection against card failure. Cables connect the two cards to the customer s equipment. Both cards receive data from the customer s equipment. One of the cards puts this data onto the back plane. In the transmit direction one of the cards supplies data to the customers equipment, the other mutes its interface. 8.7 Tributary Always On This configuration is the same as the Tributary protection operation, except that in the transmit direction both of the cards supply data to the customers equipment. The customer s equipment switches between these two always on tributaries. 8.8 IDU Hot Standby Protected Tributary In this configuration two protectable IDUs are used to provide protection against equipment failure. It is similar to Hot Standby in the radio link, and Tributary Protection in the customers interface. Cables connect the two IDUs to the customer s equipment. Both IDUs receive Ethernet packets from the customer s equipment. The active IDU transmits the packets onto the radio link. In the transmit direction the active IDU supplies packets to the customers equipment, while the inactive IDU mutes its transmitter interface. 8.9 IDU Hot Standby Tributary Always On In this configuration two protectable IDUs are used to provide protection against equipment failure. It is similar to Hot Standby in the radio link, and Tributary Always On, on the customer s interface (the customers equipment switches between these two always on tributaries) IDU 1+1 Dual ODU In this configuration a single IDU connects to two ODU s to provide protection for the ODU s and the radio link. Hitless Rx diversity is supported in this configuration. 11

12 9 Conclusion The principle of high availability architectures is reviewed. We have also described the structure of computer networks which are basic for Internet. We presented different approaches how to upgrade network to be protected for case of hardware and software failure. For further research we will investigate optimization for different network topologies. The main goal in these researches will be to find optimal protection, hardware or software with the minimum cost for customer. All of these considerations can make a protection topology more complicated. 12

13 10 Works Cited [1] - v l b l ty ut t tw k Reliability and Maintainability Symposium (RAMS), 2011 Proceedings - Annual, pp. 1-6, [2] S I R uc Detection and recovery of the blocked ports defect for the reliable Ethernet R t ct Sw tc OptoeElectronics and Communications Conference (OECC), th, pp , [3] J d D B db d cc N tw k w t l R du d cy Design of Reliable Communication Networks, [4] A. S. Tanenbaum, Computer Networks, Fourth Edition, 2003, pp [5] R Hu t M - t c l d c t ctu Computer Communications, pp , [6] o. T. D. E. &. T. Woo-Y u v d l x bl du d cy M cc w tc y t ATM (ICATM 2001) and High Speed Intelligent Internet Symposium, Joint 4th IEEE International Conference on, pp , [7] B R l bl d t l c u c t y t u u l bl tw k t d Communications Systems, IEEE Transactions on, zv 12 št 1 1-9, [8] S yt IS0 8802/5 token ring local- tw k Electronics & Communication Engineering Journal, zv 11 št , [9] B N d ll Ex t l Ev lu t O t l SM IEEE Infocom, pp , [10] Z Adaptively Switching between CSMA and SD-CSMA in Multi-Antenna Based Ad Hoc N tw k IEEE Military Communications Conference, pp. 1-6, [11] J M y OS F V 2 Network Working Group, [12] J R J t l St d d t I D t v IEEE 802 N tw k : Information Sciences Institute, [13] E R Mult t c l L b l Sw tc c t ctu Network Working Group, [14] M. A.-L B cc N tw k v l b l ty t t v c u I /M LS tw k Communications Magazine, IEEE, zv 46 št , [15] S S v t v R du d cy M t N tw k D v c IEEE CONFERENCES, pp ,

14 [16] D. L. K. L. June-K K v R Et t R t ct N tw k Optical Internet (COIN), pp. 1-3, [17] L B F G R - t ct c : l t d c t l t t Computers and Digital Techniques, zv 132 št ,

Local Area Networks (LANs) & Networks Inter-Connection Chapter 5

Local Area Networks (LANs) & Networks Inter-Connection Chapter 5 CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks Inter-Connection Chapter 5 Nada Al Dosary Aldosary.na@gmail.com http://ct1502.edublogs.org 1 Outlines Understanding

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Chapter 4: Network Access

Chapter 4: Network Access 4.0.1.1 Chapter 4: Network Access To support our communication, the OSI model divides the functions of a data network into layers. Each layer works with the layers above and below to transmit data. 4.0.1.2

More information

(Network Programming) Basic Networking Hardware

(Network Programming) Basic Networking Hardware EEE 448 Computer Networks with (Network Programming) Basic Networking Hardware Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Agenda What is a network device? Network Media

More information

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION Q-1(a) In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities can send at the same time. (b)

More information

CHAPTER -1. Introduction to Computer Networks

CHAPTER -1. Introduction to Computer Networks CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies. Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1 IT 4504 Section 4.0 Network Architectures 2008, University of Colombo School of Computing 1 Section 4.1 Introduction to Computer Networks 2008, University of Colombo School of Computing 2 Introduction

More information

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model Network basics Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model Topic A Topic A: Network concepts Topic B: Network architectures

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies 1. Explain different network devices in detail. Or Explain NIC (Network Interface Card) in detail. Network interface cards are add on cards as hardware cards on the motherboard. This is additional hardware

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Lecture 05 Chapter 16 High Speed LANs

Lecture 05 Chapter 16 High Speed LANs NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education

More information

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 IP Addressing and Subnetting: Establishing Elementary Networks using Hubs, Switches and Routers. Objectives:

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

IT 2004 Data Communication & Networking

IT 2004 Data Communication & Networking IT 2004 Data Communication & Networking Week 4 Network Topology, Architecture & Access Methods P.G.R Nayomi Gamlath MSc(Pdn), BSc (Rajarata) ATI -Kurunegala Why networks? To share resources (such as printer,

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

Lesson 1: Network Communications

Lesson 1: Network Communications Lesson 1: Network Communications This lesson introduces the basic building blocks of network communications and some of the structures used to construct data networks. There are many different kinds of

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Review of Topology and Access Techniques / Switching Concepts

Review of Topology and Access Techniques / Switching Concepts Review of Topology and s / Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Three base wired topologies Bus, star, ring Two wireless topologies Ad-hoc, infrastructure

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

Raj Jain. The Ohio State University Columbus, OH

Raj Jain. The Ohio State University Columbus, OH Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet HTML tutorial today. Announcements CMPE 80N Spring 2003 Week 5 1 2 MAC Protocols MAC Protocols Round-robin. Scheduled-access. Contention-based. Contention-based

More information

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed. LAN interconnecting devices INTRODUCTION LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed. Connecting devices

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

Different network topologies

Different network topologies Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

1. Data Link Layer Protocols

1. Data Link Layer Protocols 1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay 6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

CHAPTER 2 - NETWORK DEVICES

CHAPTER 2 - NETWORK DEVICES CHAPTER 2 - NETWORK DEVICES TRUE/FALSE 1. Repeaters can reformat, resize, or otherwise manipulate the data packet. F PTS: 1 REF: 30 2. Because active hubs have multiple inbound and outbound connections,

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communication. Chapter # 1: Introduction. By: William Stalling Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications

More information

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the

More information

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

University of Southern California EE450: Introduction to Computer Networks

University of Southern California EE450: Introduction to Computer Networks University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

More on LANS. LAN Wiring, Interface

More on LANS. LAN Wiring, Interface More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network

More information

Lecture (02) Network Protocols and Standards

Lecture (02) Network Protocols and Standards Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components

More information

Chapter 8 LAN Topologies

Chapter 8 LAN Topologies Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines

More information

ก ก Information Technology II

ก ก Information Technology II ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Chapter 6 Wireless and Mobile Networks

Chapter 6 Wireless and Mobile Networks Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 6: Wireless and Mobile Networks 6

More information

Hubs, Bridges, and Switches (oh my) Hubs

Hubs, Bridges, and Switches (oh my) Hubs Hubs, Bridges, and Switches (oh my) Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. Differ in regards to: collision domain isolation layer

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless Peter Steenkiste Data link fundamentals» And what changes in wireless Aloha Ethernet Wireless-specific

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information