FAQ: Network Topologies and Architecture

Size: px
Start display at page:

Download "FAQ: Network Topologies and Architecture"

Transcription

1 Question 1: In a wide area network (WAN) environment, what topologies are used, and how are they structured? Answer 1: A local area network (LAN) structure is configured inside a campus or facility to provide local connectivity using bus, ring, star, mesh, or hierarchal topology. Similar layouts are used within a wide area network (WAN) topology. The difference is the technology used to connect them and the sites themselves. Inside each site, the typical topology is maintained; the site connections are based on the technology applied. The WAN bus can use leased or subscribed media to send data. When an organization has only a few sites, this topology usually is adequate. In city-to-city connection (pointto-point), T-carriers usually provide access from a local telephone exchange; for intercity connection (metropolitan area network or MAN), sites are supported by digital subscriber lines (DSL). Wide area network ring topology is similar to simple ring topology except that it connects sites in a physical ring instead of nodes in a logical ring. Again, it uses common carriers (telephone companies) to provide the distance connection (Davis & Rajkumar, 2004). For example, imagine the sites 1, 2, 3, and 4. Site 1 connects with dedicated T1 (Full) to Site 2; Site 2 connects to Site 3 with T-1 lines 3 to 4 with a DSL, and Site 4 to Site 1 with T1, creating a true ring. Modifying the ring would be difficult, and the cost involved would be high, so this WAN usually has a limited number of sites (normally not more than four or five) (Dean, 2006). 1

2 Wide area network star topology uses a central site as a distribution center (like a hub) connecting through dedicated lines to each subordinate site. This does create a single point of failure from the hubbed site stopping all communication within the WAN; however, if a subordinate site fails, the remaining site will still maintain connectivity. Extending the WAN star is relatively easy. It simply connects to the central site with the dedicated connection. This is why it is used by most organizations in a WAN environment (Dean, 2006). Wide area network mesh topology is just like the LAN mesh topology. All sites are directly connected through dedicated lines to all other sites. These are the most fault-tolerant WAN layouts because they provide multiple paths to send and receive data. If a route goes down, data can bypass that route and still reach their destination. There is a configuration within the mesh topology that permits separate branch connections from a primary site to a connected site 2

3 that is not in direct connection with all sites. This configuration is called a partial mesh WAN (Dean, 2006). Question 2: What is meant by a high-speed Ethernet network? Answer 2: A high-speed network usually refers to a network where the throughput exceeds 100 Mbps and the network connects to outside communication system configuring for a MAN or WAN environment (Dean, 2006). The standard throughput in local area networks (LANs) is between 10 Mbps and 100 Mbps; although, in some cases, depending on the topology and media, higher speeds are achieved. High-speed Ethernet, IEEE standard 802.3z, achieves transfer in the gigabit range. There are several types of gigabit Ethernet standards used today in networking (Dean, 2006): The standard 1000BASE-T can use twisted-pair CAT 5 or higher media with a range of 100 meters. The standard 1000BASE-CX, the standard uses twinaxial (dual core coaxial) with a range of 25 meters. The standard 1000BASE-LX relies on multimode fiber-optic cable (MMF) with a range of up to 550 meters; if single-mode fiber-optic (SMF) cable is used, the range is 5000 meters. 3

4 The standard 1000BASE-SX uses MMF and has a range of up to 500 meters (Dean, 2006). Additionally, there is media that supports 10 Gbps throughput: The standard 10GBASE-SR uses MMF and has a range of 300 meters. The standard 10GBASE-LR uses SMF and has a range of 10,000 meters. The standard 10GBASE-ER uses SMF and has a range of 40,000 meters. In all cases, the topology is star configuration (Dean, 2006). By definition, the term high-speed is based on network throughput. Extending the definition to systems outside the LAN (MAN/WAN), the standards available are 1000BASE-LX with SMF, 10GBASE-LR, and 10GBASE-ER. The maximum is only about 25 miles. The use of fiber-optic repeaters (concentrators) can extend the range creating a solely corporate owned high-speed network. These fiber-optic systems are expensive and require additional connectivity components. More often than not, corporations use leased services to extend their network using the telecommunication providers to outside the MAN configuration (Dean, 2006). Question 3: What is the T-carrier service, and how is it used? Answer 3: T-carrier is a leased WAN transmission method that uses digital transmission over high-speed public switched telephone network (PTSN). This service is 4

5 usually contracted through a network service provider (NSP). This high-speed network does not have the same throughput as the high-speed Ethernet fiber-optic network. The T-carrier method uses time division multiplexing (TDM), a system of streaming synchronized compressed data to provide a maximum of 64 Kbps over each channel. T1 contains 24 channels providing a throughput of Mbps. T1 can be dedicated to the full throughput or provide individual channels, called fractionalt1, to the users (Davis & Rajkumar, 2004). Each channel is equivalent to one voice circuit through a normal phone line (Dean, 2006). T1 can provide data packet switching and circuit switching as a transmission format. Similar to the T-carrier, Europe uses an E-carrier system. Europe's E1 provides 30 channels instead of 24 like in the United States. E1 has Mbps throughput. For the purpose of this discussion, the T-series will be addressed. T-carrier common designations are T1 and fractionalt1, both having total throughput of Mbps, and T3, which equates to 672 voice channels 45 Mbps (28 T-1s). T3 also has a fractional designation (Dean, 2006). With the T-carrier, full-dedicated channel allocation can approach high-speed Ethernet levels over wire cable system, but to meet true high-speed networking, users need to access SONET systems, a fiber-optic leased system (Dean, 2006). The following table displays the carrier specifications (Dean, 2006): FractionalT1 service provides a specified number of dedicated channels to the leaser. The contract provides the services based on actual use. It might be just one channel at 64 Kbps or bundled channels each providing 64 Kbps. For example, if a user needed 500 Kbps throughput available, then the lease 5

6 would be for 8 channels (7.8 channels required). If a user only needed access to T1 at night, then the lease would specify that as well. One pays for what one uses. Question 4: What are the various types of DSL, and what are their capabilities? Answer 4: Digital subscriber line (DSL) services are a WAN connection method designed in Bell Labs. DSL has a unique frequency. It works in bandwidths above 3300 Hz. It is limited to the distance from the service provider (telephone company-telco). The range from the source provider is between 1,000 ft and 26,000 ft depending on the technology implemented. Downstream refers to traffic from the Telco switching facility to the subscriber's throughput, and upstream traffic from the subscriber to the Telco throughput is also dependent on the implementation. The technology that offers more throughputs in one direction over the other is described as asymmetrical; balanced throughput is deemed symmetrical. The following DSL categories are available (Dean, 2006): ADSL (asymmetrical DSL) G.Lite (a kind of ADSL) HDSL (High Bit-Rate DSL) SDSL (Symmetric or Single-Line DSL) VDSL (Very High Bit-Rate DSL) SHDSL (Single-Line High Bit-Rate DSL) The following table is a comparison of DSL types (Dean, 2006): 6

7 Digital subscriber line requires unique equipment to establish its connection. It should be noted that the further away from the switching source (Telco), the less throughput that can be achieved. Connection is established using a DSL modem that manages the modulation of the signal. Knowing the difference between upstream and downstream will explain why. When using a DSL modem connected to the Internet at ADSL (full rate) mode, one can receive data from the connection faster than sending data to it (Dean, 2006). The connection is asymmetrical. When connected to the switching facility (Telco), the transmitted signal is sent to a DSL access multiplexer (DSLAM), which combines multiple DSL lines and streams them into a larger carrier or even the Internet. Note that DSL provides faster throughput than the T- carrier, but the range is severely constrained; therefore, in business, companies use DSL to the Telco and T-carrier within the service network (Dean, 2006). All implementation of DSL is established in the OSI physical layer. Question 5: How does a network manage remote access to the corporate network? Answer 5: Remote users access the corporate network using authentication protocols usually through a dial-up interface, DSL (digital subscriber line), VPN (virtual private network), or PBX (private branch exchange, which is a private telephone system) supported by an application gateway or proxy server [COEG1]. The proxy server acts as a filter between the public network (WWW and Internet) and the corporate network. Passage through the system is usually encrypted using IPSec (Internet Protocol Security a Network layer security mechanism), PPTP (Point-to-Point Tunneling Protocol a TCP connection-oriented Transport layer protocol that provides internal validation and acknowledgment), or L2TP Transport protocol (Layer 2 Tunneling Protocol transmitted in UDP a connectionless protocol. Connectionless means that no acknowledgment is given from the receiver, also known as best effort (Dean, 2006). Access may be granted using the digital signature (a record comparison of one's user ID and password), hashed password, user certificate, or using the RADIUS server (Remote Authentication Dial-in User Service) and log-on messages that are compared to the security server's database (Palmer, 2005). Remote access using the tunneling protocols (PPTP and L2TP) are implemented through specified ports established for these protocol 1723 and 1701 respectively. Accesses through other ports are denied. Internal authentication is applied through call back, certificate, or 7

8 private key. CHAP (challenge handshake authentication protocol) may be used or password authentication protocol (PAP) verifying the user. Question 6: What packet-switching technologies were designed for use for long-distance data transmission? Answer 6: Two prominent technologies were designed for long-distance transmission: X.25, an analog signal format, and frame relay, a digital signal format. X.25 was established by ITU as a standard for packet switching across the Internet at a maximum rate of 64 Kbps based on the standard voice rate. Later, the technology was updated and provided Mbps throughput. X.25 standard specifies protocols used with the physical, data link, and network layers in the OSI model. This protocol set supported excellent flow control but lost efficiency with transmitting digital-based information like audio and video data. X.25 was a dominant packet switching WAN technology for a long time (Dean, 2006). Frame Relay supplanted X.25 protocols as the standard technology because of its digital format. Frame Relay works in the Data Link layer of the OSI model and supports multiple Transport and Network layer protocols (TCP/IP and IPX/SPX). In digital format data, errors are minimized. Though Frame Relay can identify errors, it lets the higher layers correct them. Errors are identified, and a corrected packet is then resent. Frame Relay supports more throughput than X.25, ranging from 64 Kbps to 45 Mbps depending on the bandwidth the customer chooses. An issue with Frame Relay is that depending on the traffic on the network (WAN), the throughput may be established at one rate (the CIR-committed information rate) and fall below the guaranteed level. Midnight data would flow faster than midday when more traffic is on the network (Dean, 2006). Question 7: How is wireless technology applied to WAN? Answer 7: Wireless is becoming a new implementation in WANs (Dean, 2006). IEEE standard (Wi-Fi) and (WiMax) are being applied all over the world. Users are granted access to this standard by subscription; corporations are implementing mobile wireless networking as remote utilization or wireless broadband. All the processes applied to normal remote access are still required for wireless access. Most wireless transmission format is DSSS 8

9 (Phase 2). The most current technology for wireless WAN is wireless broadband designed for high throughput and distances-data exchange (Dean, 2006). IEEE standard is the base guideline supporting this technology. Connectivity is available at airports and coffee shops around the world. Cyber cafes are in major business locations, airports, and many hotels. These are designated as hotspots. Most provide wireless access to the Internet and company Web services. An access point (AP) is connected to a server, then the local ISP or service provider. Authentication is required to access company intranets, but World Wide Web access is directly available at these hotspots. Internal network (corporate access) is not as common. Throughput varies depending on which standard is implemented and the available technology for its connection. AP to wire is much faster than AP to wireless network access provider (range 11 Mbps-54 Mbps). Hard-wired connection usually uses standard Fast Ethernet (100 Mbps). The latest standard being developed for wireless access is N, which may have throughput up to 500 Mbps, although the technology is still experimental. Even with Super G, the rate is maximized at 110 Mbps. Pure wireless networks also have a major issue with system security and secure data transfer. The supporting system that is used would require data to be encrypted before transfer (Dean, 2006). 9

10 Question 8: What is SONET, and how is it used? Answer 8: SONET technology refers to a timing-based optical fiber network configuration that provides high-speed data transfer over a long distance. SONET stands for synchronous optical network. Its implementation is similar to fiber distributed data interface (FDDI) by running dual optical fiber rings within a WAN ring. Another term for this technology is synchronous digital hierarchy (SDH). SONET is one of the best choices between international connections because it has a low fault/error rate with transfers. All connected sites must be synchronized to a system clock to ensure continuity of traffic transfers (Dean, 2006). Synchronization is established during the handshake (communication request) between sites by the sending node. SONET is a Telco service option available by lease and service agreement. It can be maintained as purely optical, crossover to T-carrier, or implemented with DSL. Access to the SONET connections and multiplexer can be achieved with any WAN topology. The following table identifies the available throughput using SONET/SDH technology (Dean, 2006): Because of its high cost, it seems that only large businesses can effectively implement this technology. It is more often used internationally or by an ISP guaranteeing QoS and reliability. It works well for streamed data types audio, video, and imaging (Dean, 2006). SONET is known as a self-healing network. Damage to the network causes an automatic reroute of the traffic, which makes it one of the most reliable networks around (Dean, 2006). 10

11 Question 9: What types of satellite orbits, targeting systems, and common satellite frequencies are used with a WAN? Answer 9: Though not as common as other technology, satellites accessing the Internet and corporate networks is an application of wireless connectivity. Recently, several satellite bandwidths have been offered from the government's control to commercial utilization. Microwaves directed at satellite receivers (transponders) have become a more viable solution to low-frequency shorthaul data transfers. Short-haul refers to line-of-sight terrestrial transmissions approximately miles. Satellite orbits are in three distinct distances and positions above the Earth. Satellites orbiting above the equator are in geosynchronous or geostationary earth orbit (GEO) at an altitude of 22,300 miles. This means that these satellites stay in the same location above the Earth. One of the main reasons for satellite link is data relay; GEO works to relay data in all directions to Earth's surface. Satellites that are in orbit between the equator and the upper latitudes (imaginary bands around Earth running parallel to the equator toward the poles) at an altitude between 10,350 and 10,390 kilometers are called medium/middle earth orbit (MEO). They provide coverage to a wide range of Earth's surface. Satellites in orbit toward the poles circle at an altitude of 700 1,400 km and cover a considerably smaller area of the Earth's surface. Data transfers to satellites require an upload from a ground station. Power from the ground base to the satellite is higher because the power to 11

12 retransmit from the satellite to Earth (downlink) has to be generated from on-board solar panels and batteries, but the power to uplink is from a commercial power generation. There are two targeting methods used to downlink data. Small aperture downlink is best correlated with point-to-point transfer. The receiving satellite stations usually have an array of dishes to receive downlinks tuned to certain frequencies. The frequencies are generated from the transponder (which is not the same frequency originally used to uplink). Data sent to a frequencytuned satellite dish (the dish is listening to a certain frequency) are connected in a line of sight logical circuit (the satellite sends data to a target receiver, the dish, which may only be a few feet across (diameter of the dish make it small aperture) [COEG2]. This is called small aperture targeting. When data are sent to a frequency tuned array, the military and government agencies usually needing a large downlink (amount of information) or large dish receivers (SETI- search for extra-terrestrial intelligence Institute), stream the information to terrestrial dishes simultaneously. Commercial use of the frequencies are leased from the government though the Federal Communications Commission (FCC). The first three bands are just slightly above microware channels ( GHZ). The upper frequency 12

13 bands were recently made available for use. The military channels are not much higher (60GHz-128GHz) (Dean, 2006). Question 10: Internet addressing works with domain designation. What is meant by domain, and how is it used? Answer 10: The Internet uses a number-base addressing system called Internet protocol (IP) addressing ( ). Additionally, it uses a hierarchal addressing designation that defines domains (a group of nodes that is managed as a single unit LAN, network cluster, Web server group.). All computers within an organization are identified as a grouping for example, OSNET or SOPRO own their computers. The computers are connected to the corporate network and managed by the system administrators that would identify those computers in the owner's domain-control. Domains can be managed locally or distributed across several LANs connected to a MAN or WAN. A university might have a single domain, but domains might have domains too. Consider the following: The University of Anywhere has student access and faculty access as well as and Web services access. Not everyone has permission to access all nodes. One would not necessarily want the students accessing the faculty work area where the exams are being developed or stored. These areas are segregated. Each would be a subdomain of the University of Anywhere's domain. As one can see, the hierarchal configuration exists. What about the university being connected to other university networks? Each university (campus) has its own domain. What are the universities connected to state networks, regional networks, or the Internet? Each layer provides a domain that controls a group of similar subdomains. A service that is available is the DNS (domain names service). DNS is a TCP/IP application that provides coordination to the network (domain) controllers. It is used to identify each node within the domain with a unique name and IP address. Each level has this ability as well. The local listing (database) names the node for a local name, and the domain name is added to the local name. Example: A node in a network is called mikesnode. If the node is part of the University of Anywhere network, the mikesnode belongs to UOA. The domain designation would be mikesnode.uoa. If the UoA network were part of a county network, Reed County, then an additional extension for that domain 13

14 would be added as well (mikesnode.uoa.reed). The concept continues if the Reed County domain was a domain in the state of California's network (mikesnode.uoa.reed.ca). Each layer adds a moniker telling the network the path needed to reach a specific node and no node can be exactly the same the node name must be unique. The domain identification tells the network application the way to an end user's computer. The same constructs support topic specified domains. Several commonly used domain identifiers have been traditionally used with the Internet. Most countries have a country domain. For example,.gb,.ru,.jp, and.us represent Great Britain, Russia, Japan, and the United States respectively; even Togo, Africa, uses.tg. Other domains used include the following:.mil for military,.gov for government,.com for U.S. commercial,.org for nonprofit organizational domains,.edu for U.S. educational, and.net for U.S. networks. Uses of the domain names are separated by a period (.) between domain levels. Domains are used by network control devices to map the layer and location of the node (Davis & Rajkumar, 2004). 14

15 References Davis, W. S., & Rajkumar, T. M. (2004). Operating systems: A systematic view (6th ed.). Boston, MA: Addison-Wesley. Dean, T. (2006). Network+ guide to networks (4th ed.). Boston, MA: Thomson. Palmer, M. (2004). Guide to operating system security. Boston, MA: Thomson. 15

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Wide Area Networks (WANs) Slide Set 6

Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) WAN Purposes Link sites (usually) within the same corporation Remote access for individuals who are off-site Internet access for individuals

More information

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model Network basics Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model Topic A Topic A: Network concepts Topic B: Network architectures

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

The Internet and the World Wide Web

The Internet and the World Wide Web Technology Briefing The Internet and the World Wide Web TB5-1 Learning Objectives TB5-2 Learning Objectives TB5-3 How Did the Internet Get Started? Internet derived from internetworking 1960s U.S. Defense

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda

More information

VoIP Dictionary, Glossary and Terminology

VoIP Dictionary, Glossary and Terminology VoIP Dictionary, Glossary and Terminology The following provides a glossary of terms and definitions that are commonly used in VoIP Solutions. We hope this will provide a good reference for you during

More information

TYPES OF COMPUTER NETWORKS

TYPES OF COMPUTER NETWORKS TYPES OF COMPUTER NETWORKS What is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications.

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing. Multiplexing: combining information streams from multiple sources for transmission over a shared medium Demultiplexing: separating a combination back into individual information streams CSIS 4222 Ch 11:

More information

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

Chapter 9 Introduction to Networks

Chapter 9 Introduction to Networks Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations

More information

Study Guide. Module Three

Study Guide. Module Three Exam Three will draw questions four content areas: our textbook, our assignments, the Rackspace Web Hosting Tutorial, and our class lectures. The purpose of this guide is to help you focus your exam preparations.

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

LAN, MAN and WAN. Basics and Comparison. University of Damascus. Computer Engineering Dept. Digital Communications. By Abdulrahman Idlbi

LAN, MAN and WAN. Basics and Comparison. University of Damascus. Computer Engineering Dept. Digital Communications. By Abdulrahman Idlbi In the name of Allah, the Most Gracious, the Most Merciful University of Damascus Computer Engineering Dept. Digital Communications LAN, MAN and WAN Basics and Comparison By Abdulrahman Idlbi Introduction

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we

More information

end systems, access networks, links 1.3 network core

end systems, access networks, links 1.3 network core Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,

More information

Module Three SG. Study Guide. Exam Three Content Areas. Module Three. Chapter Seven, Backbone Networks

Module Three SG. Study Guide. Exam Three Content Areas. Module Three. Chapter Seven, Backbone Networks SG Exam Three will draw questions from multiple content areas including: our networking textbook, our wireless electronic textbook, our assignments and our class lectures. The purpose of this guide is

More information

WAN Technology & Design. Dr. Nawaporn Wisitpongphan

WAN Technology & Design. Dr. Nawaporn Wisitpongphan WAN Technology & Design Dr. Nawaporn Wisitpongphan 1 WAN Connection Modules 2 WAN Comparison 3 Integrated Services Digital Network (ISDN) All-digital phone line connection Technology since 1980s Allow

More information

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service

More information

Chapter 1: introduction

Chapter 1: introduction Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling A+ Guide to Managing & Maintaining Your PC, Chapter 16 Networking Types, Devices, and Cabling Objectives Learn about network types and topologies Learn about the hardware used to build local networks Learn

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

Chapter 9. Introduction. Communications

Chapter 9. Introduction. Communications Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. 1 Introduction Page 247 Cell phones and other wireless technologies are allowing

More information

CHAPTER -1. Introduction to Computer Networks

CHAPTER -1. Introduction to Computer Networks CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a

More information

Introduction to Wireless Networking ECE 401WN Spring 2008

Introduction to Wireless Networking ECE 401WN Spring 2008 Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.

More information

WAN Technologies CCNA 4

WAN Technologies CCNA 4 WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Sample. Overview of WAN Connections. Objectives. Module 1

Sample. Overview of WAN Connections. Objectives. Module 1 Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this module, you should be able

More information

Internet Access Technologies

Internet Access Technologies Lecture 4: Local Loop Technologies, Internet Access and Leased Lines Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Internet Access Technologies

More information

Since enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time

Since enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time Syllabus You can go to cs.rpi.edu and then Faculty and my website from my profile Or you can go to www.cs.rpi.edu/~holzbh Or to be very direct, you can go to www.cs.rpi.edu/~holzbh/ccn18/index.php 1 Textbook

More information

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : navi@iitk.ac.in) About Myself About Myself I am Network Manager

More information

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

(Network Programming) Basic Networking Hardware

(Network Programming) Basic Networking Hardware EEE 448 Computer Networks with (Network Programming) Basic Networking Hardware Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Agenda What is a network device? Network Media

More information

Multiplexing (Recap)

Multiplexing (Recap) Multiplexing (Recap) Multiplexing How to transfer data between two sites once there is a digital link between them? Analog to Digital (A2D) conversion Human voice is a continuous signal in the range 0-4

More information

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS) Pengantar Teknologi Informasi dan Teknologi Hijau Suryo Widiantoro, ST, MMSI, M.Com(IS) 1 Topics covered 1. From analog to digital age 2. Networks 3. Wired-communication data 4. Wireless-communication

More information

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Computers Are Your Future Twelfth Edition Chapter 8: Wired and Wireless Communication Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1 Wired and Wireless Communication Copyright 2012

More information

VPNs. Communication Technologies Last Points (briefly) VPNs Technologies. Satellite Networks. Telemedicina e e-saúde 2009/2010

VPNs. Communication Technologies Last Points (briefly) VPNs Technologies. Satellite Networks. Telemedicina e e-saúde 2009/2010 Communication Technologies Last Points (briefly) VPNs Virtual Private Networks Main objective o Enable communication between two LANs as if they were together and separated. Telemedicina e e-saúde 2009/10

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

Chapter 6 The Internet

Chapter 6 The Internet Chapter The Internet Computer Concepts 2014 Chapter Contents Section A: Internet Technology Section B: Fixed Internet Access Section C: Portable and Mobile Internet Access Section D: Internet Services

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.1 Chapter 1 Introduction Text Book for this course Computer Networking:

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved. Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces Chapter 15 Computer and Multimedia Networks 15.11 Basics of Computer and Multimedia Networks 15.2 Multiplexing Technologies 15.3 LAN and WAN 15.4 Access Networks 15.5 Common Peripheral Interfaces 15.6

More information

Module 11. OSI Model, Network Devices, and Network Standards

Module 11. OSI Model, Network Devices, and Network Standards Module 11 OSI Model, Network Devices, and Network Standards Objectives 1. Networking A.Differentiate between layers of the OSI model B.2.9 Compare network devices C.Compare network standards D.2.7 Compare

More information

PPP. Point-to-Point Protocol

PPP. Point-to-Point Protocol PPP Point-to-Point Protocol 1 Introduction One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs,

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

Local Area Network(LAN)

Local Area Network(LAN) Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building

More information

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant

More information

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

1.264 Lecture 23. Telecom Enterprise networks MANs, WANs

1.264 Lecture 23. Telecom Enterprise networks MANs, WANs 1.264 Lecture 23 Telecom Enterprise networks MANs, WANs Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners

More information

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

A typical WAN structure includes the following components.

A typical WAN structure includes the following components. CBCN4103 WAN is a computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more LANs. A WAN is a network usually provided by a specialised company called a

More information

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai Data Communications and Networks Second Edition ACHYUT S GODBOLE Managing Director SoftExcel Services Limited, Mumbai ATUL KAHATE Senior Consultant Oracle Financial Services Software Limited, Pune Tata

More information

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION TO COMPUTER NETWORKS Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. LAN, MAN & WAN Network in small geographical

More information

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1 Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 How Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies DSL Cable modems

More information

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

More information

Internet. Networks. An Old Way of PC-PC Communication. global positioning system (GPS) PC A to floppy disk Then floppy disk to PC B

Internet. Networks. An Old Way of PC-PC Communication. global positioning system (GPS) PC A to floppy disk Then floppy disk to PC B global positioning system (GPS) Step 1. GPS satellites orbit Earth. Every thousandth of a second, each satellite sends a signal that indicates its current position to the GPS server. Step 2. A GPS receiver

More information

Netwoking Essentials

Netwoking Essentials Mark Sportack Walter J. Glenn Sams' Teach Yourself MCSE Netwoking Essentials SAMS PUBLISHING IN 14 DAYS Sams Publishing is an independant entity from Microsoft Corporation, and not affiliated with Microsoft

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Introduction Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and

More information

Discovering Computers Chapter 9 Communications and Networks

Discovering Computers Chapter 9 Communications and Networks Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe

More information

Communication Networks

Communication Networks Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

Data Communications. Course Design Data Communications. Pre/Post Test (80 Questions/80 Points) Upon Request None No No No

Data Communications. Course Design Data Communications. Pre/Post Test (80 Questions/80 Points) Upon Request None No No No Data Communications Course Design 2005-2006 Course Information Organization Division EASTERN ARIZONA COLLEGE Business Course Number CMP 205 Title Credits 3 Developed by Lecture/Lab Ratio Transfer Status

More information

Modems, DSL, and Multiplexing. CS158a Chris Pollett Feb 19, 2007.

Modems, DSL, and Multiplexing. CS158a Chris Pollett Feb 19, 2007. Modems, DSL, and Multiplexing CS158a Chris Pollett Feb 19, 2007. Outline Finish up Modems DSL Multiplexing The fastest modems Last day, we say the combinations and phases used to code symbols on a 2400

More information

Computer Networks and Internet

Computer Networks and Internet Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data

More information

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections Computers: Tools for an Information Age Chapter 7 Networking: Computer Connections Objectives Describe the basic components of a network Explain the methods of data transmission, including types of signals,

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet? What s the Internet? Hardware view: What s the Internet? Hardware view: PC server wireless laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication

More information

Lecture (07) Fundamentals of WANs (I)

Lecture (07) Fundamentals of WANs (I) Lecture (07) Fundamentals of WANs (I) Dr. Ahmed M. ElShafee ١ Agenda What is WAN? What is MAN? OSI layer1 of WANs Circuit switching services Packet Switching Services ٢ What is WAN? LAN standards and protocols

More information

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : BCA Semester /Year : EVEN / III Subject Name : Data

More information

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces Chapter 15 Computer and Multimedia Networks 15.11 Basics of Computer and Multimedia Networks 15.2 Multiplexing Technologies 15.3 LAN and WAN 15.4 Access Networks 15.5 Common Peripheral Interfaces 15.6

More information

Chapter 8: Multiplexing

Chapter 8: Multiplexing NET 456 High Speed Networks Chapter 8: Multiplexing Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education - Prentice

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

CSC Introduction to Computers and Their Applications. Background

CSC Introduction to Computers and Their Applications. Background CSC 170 - Introduction to Computers and Their Applications Lecture 7 The Internet Background The history of the Internet begins in 1957. In a response to the Soviet Union launching Sputnik, the first man-made

More information

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11 Types of Computer Networks ICS 614: Computer Networks Concepts and Principles 11 Types of networks Networks are categorized by distribution, size, and architecture. A network can be as simple as a single

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

Chapter. 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall

Chapter. 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall STUDENT LEARNING OBJECTIVES What are the principal components

More information

Wireless 300N ADSL2+ Modem Router For ADSL (Annex A), 300 Mbps Wireless n, MIMO, QoS, with 4-Port 10/100 Mbps LAN Switch Part No.

Wireless 300N ADSL2+ Modem Router For ADSL (Annex A), 300 Mbps Wireless n, MIMO, QoS, with 4-Port 10/100 Mbps LAN Switch Part No. Wireless 300N ADSL2+ Modem Router For ADSL (Annex A), 300 Mbps Wireless 802.11n, MIMO, QoS, with 4-Port 10/100 Mbps LAN Switch Part No.: 524780 The INTELLINET NETWORK SOLUTIONS Wireless 300N ADSL2+ Modem

More information

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn... What You Will Learn... Computers Are Your Future Chapter 3 The definition of bandwidth The bandwidth needs of a typical user How modems change digital signals into analog Transmission media and methods

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

GLOSSARY OF CELLUAR TERMS

GLOSSARY OF CELLUAR TERMS GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service

More information

Computer science..pharmacy college

Computer science..pharmacy college Is the facility to transfer data to remote locations quickly & conveniently, the data is transferred by means of a telecommunication network. Note: Data communication is the transmission of electronic

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Network Connectivity and Mobility Part 2

Network Connectivity and Mobility Part 2 Network Connectivity and Mobility Part 2 BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1.

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Data Network and Telecommunications Systems

Data Network and Telecommunications Systems 1 Department of Computer Science and Information Systems, College of Business and Technology, Morehead State University Lecture 4 CIS 311 Introduction to Management Information Systems (Spring 2017) Data

More information

T e l e c o m m u n i c a t i o n s, t h e i n t e r n e t, a n d W i r e l e s s t e c h n o l o g y

T e l e c o m m u n i c a t i o n s, t h e i n t e r n e t, a n d W i r e l e s s t e c h n o l o g y T e l e c o m m u n i c a t i o n s, t h e i n t e r n e t, a n d W i r e l e s s t e c h n o l o g y C h a p t e r 7 Jun Akizaki The Power of PowerPoint WELCOME group members: 1. Dewi Setyani 16808144017

More information

Electrical and Computer Engineering Technology

Electrical and Computer Engineering Technology ECET 3400 Spring 2012 Data Communications Southern Polytechnic State University Electrical and Computer Engineering Technology Instructor Information Instructor: Dr. Craig A. Chin, Assistant Professor

More information

Broadband Communication

Broadband Communication Broadband Communication Enjoy a Triple Play Networking Trend in xdsl Technology Several types of DSL technology have implemented nowadays and adopted by PLANET broadband solutions to fulfill customer s

More information

Part I: Introduction. 1: Introduction 1

Part I: Introduction. 1: Introduction 1 Part I: Introduction Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet what s a protocol?

More information