1 3 Network Protocols Terms you ll need to understand: OSI Reference Model Application layer Presentation layer Session layer Transport layer Network layer Data Link layer Physical layer IEEE 802 specifications Redirectors Protocols: NetBEUI, TCP/IP, XNS, AppleTalk, APPC, X.25, and HDLC Techniques you ll need to master: Interpreting the OSI Reference Model and how it relates to protocol suites Exploring the IEEE s 802 network specifications Understanding and using redirectors Comprehending and implementing protocols 29
2 30 Chapter 3 To enable networked communications, computers must be able to transmit data among one another. Protocols, agreed-upon methods of communication, make this possible. In this chapter, we discuss the various network protocols and how they enable networked communications. In addition, we introduce you to the standards upon which network protocols are based: the Open Systems Interconnection (OSI) Reference Model and the IEEE 802 standards. The OSI Reference Model was developed by the International Standards Organization (ISO) to provide a standardized method for computers to communicate; the Institute of Electrical and Electronic Engineers (IEEE) 802 standards further expanded this model. As always, we provide pointers along the way that will assist you in preparation for the Networking Essentials exam, and give you additional resources should you need more details on the topics we discuss in this chapter. The OSI Reference Model As the concept of networking became more widespread in the business world, the idea of being able to connect networks and disparate systems became a necessity. For this type of communication to take place, however, there needed to be a standard method. The solution came in 1978 when the ISO released an architecture that would allow achieve this goal. These specifications were revised in 1984 and became international standards for networked communication. It is important for network administrators to know the history and understand the function of this specification, which is called the OSI Reference Model. The OSI model presents a layered approach to networking. Each layer of the model handles a different portion of the communications process. By separating such communications into layers, the OSI model simplified how network hardware and software work together, as well as eased troubleshooting woes by providing a specific method for how components should function. Now that we know why the model was implemented, let s move on to explore just how it works. Keep in mind that the OSI model is a completely conceptual reference. Later in the chapter, we ll discuss how protocol suites map to the model to provide network communications.
3 Network Protocols 31 Learning The Layers The OSI Reference Model divides networking into seven layers, as shown in Figure 3.1. These layers are described as follows: Application layer Provides a set of interfaces for applications to use to gain access to networked services. Presentation layer Converts data into a generic format for network transmission; for incoming messages, it converts data from this format into a format that the receiving application can understand. Session layer Enables two parties to hold ongoing communications called sessions across a network. Transport layer Manages the transmission of data across a network. Network layer Handles addressing messages for delivery, as well as translates logical network addresses and names into their physical counterparts. 7. Application Layer 6. Presentation Layer 5. Session Layer 4. Transport Layer 3. Network Layer 2. Data Link Layer 1. Physical Layer Figure 3.1 The OSI model separates networking functions into seven layers.
4 32 Chapter 3 Data Link layer Sends special data frames from the Network layer to the Physical layer. Physical layer Converts bits into signals for outgoing messages, and signals into bits for incoming messages. MEXAMEXAMEXAMEXAMEXA It is essential that you know the layers of the OSI model when you take the Networking Essentials exam. A great instructor once provided the following mnemonic, which helps you remember the order of these layers: From the bottom up, take the first letter of each layer (PDNTSPA) and assign a more approachable phrase such as Please Do Not Throw Sausage Pizza Away. In the following sections, we ll examine each layer of the OSI Reference Model in more detail. Layer 7: The Application Layer The Application layer is referred to as the top layer of the OSI Reference Model. This layer allows access to network services such as networked file transfer, message handling, and database query processing that support applications directly. This layer also controls general network access, the transmission of data from sender to receiver (called flow control), and error recovery for applications when appropriate. Layer 6: The Presentation Layer The Presentation layer manages data-format information for networked communications. Also called the network s translator, it converts outgoing messages into a generic format that can be transmitted across a network; then, it converts incoming messages from that generic format into one that makes sense to the receiving application. This layer is also responsible for protocol conversion, data encryption and decryption, and graphics commands. Information sent by the Presentation layer may sometimes be compressed to reduce the amount of data to be transferred (this also requires decompression on the receiving end). It is at this layer that a special software facility known as a redirector operates. The redirector intercepts requests for service and redirects requests that cannot be resolved locally to the networked resource that can handle them.
5 Network Protocols 33 Layer 5: The Session Layer The Session layer allows two networked resources to hold ongoing communications, called a session, across a network. In other words, applications on each end of the session are able to exchange data for the duration of the session. This layer manages session setup, information or message exchanges, and tear-down when the session ends. It is also responsible for identification so that only designated parties can participate in the session, and handles security services for controlling access to session information. The Session layer furnishes synchronization services between tasks at each end of the session. This layer places checkpoints in the data stream so if communications fail, only data after the most recent checkpoint need be retransmitted. The Session layer also manages issues such as who may transmit data at a certain time and for how long, and maintains a connection through transmission of messages that keep the connection active; these messages are designed to keep the connection to be closed down due to inactivity. Layer 4: The Transport Layer The Transport layer manages the flow control of data between parties across a network. It does this by segmenting long streams of data into chunks that adhere to the maximum packet size for the networking medium in use. The layer also provides error checks to guarantee error-free data delivery, and resequences chunks back into the original data when it is received. In addition, the Transport layer provides acknowledgment of successful transmissions and is responsible for requesting retransmission if some packets do not arrive error-free. Layer 3: The Network Layer The Network layer addresses messages for delivery, and translates logical network addresses and names into their physical equivalents. This layer also decides how to route transmissions between computers. To decide how to get data from one point to the next, the Network layer considers other factors, such as quality of service information, alternative routes, and delivery priorities. This layer also handles packet switching, data routing, and network congestion control. Layer 2: The Data Link Layer The Data Link layer handles special data frames between the Network and Physical layers. At the receiving end, this layer packages raw data from the
6 34 Chapter 3 Physical layer into data frames for delivery to the Network layer. A data frame is the basic unit for network traffic as data is sent across the network medium; the data frame is a highly structured format in which data from upper layers is placed for sending, and from which data from upper layers is taken on receipt. Layer 1: The Physical Layer The Physical layer converts bits into signals for outgoing messages, and signals into bits for incoming ones. This layer arranges the transmission of a data frame s bits when they are dispatched across the network. The Physical layer manages the interface between a computer and the network medium, and instructs the driver software and the network interface as to what needs to be sent across the medium. That concludes the layer-by-layer discussion of the OSI Reference Model. Now, let s take a look at how the IEEE 802 specifications further standardized network communication. IEEE 802 Specifications At roughly the same time the OSI model came to be, the IEEE published the 802 specifications, which defined standards for the physical components of a network. These components, namely Network Interface Cards (NICs) and network media, are also accounted for in the Physical and Data Link layers of the OSI model. The 802 specs defined how network adapters access and transmit information over the network cable. MEXAMEXAMEXAMEXAMEXA The 802 specifications fall into 12 distinct categories, each of which has its own number, as described in the following: Internetworking Logical Link Control (LLC) Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) LANs (Ethernet) Token Bus LAN Token Ring LAN Metropolitan Area Network (MAN) Broadband Technical Advisory Group Fiber Optic Technical Advisory Group
7 Network Protocols Integrated Voice and Data Networks Network Security Wireless Networks Demand Priority Access LAN, 100BaseVG-AnyLAN As previously mentioned, the 802 spec actually expanded the OSI Reference Model. This expansion is at the Physical and Data Link layers, which define how more than one computer can access the network without causing interference with other computers on the network. The 802 standards provide more detail at these layers by breaking the Data Link layer into the following sublayers (see Figure 3.2): Logical Link Control (LLC) For error correction and flow control 7. Application Layer 6. Presentation Layer 5. Session Layer 4. Transport Layer 3. Network Layer Logical Link Control OSO Model and Network Management Logical Link Control 2. Data Link Layer 1. Physical Layer Media Access Control CSMA/CD Token Bus Token Ring Demand Priority Figure 3.2 The 802 specs within the OSI model.
8 36 Chapter 3 Media Access Control (MAC) For access controlthe Logical Link sublayer (as defined by 802.2) controls data-link communication, and defines the use of logical interface points, called Service Access Points (SAPs), that other computers can use to transfer information from the LLC sublayer to the upper OSI layers. The Media Access Control sublayer provides shared access for multiple NICs with the Physical layer. The MAC has direct communication with a computer s NIC and is responsible for ensuring error-free data transmission between computers on a network. This concludes the theoretical discussion of network models. In the following section, we ll discuss how protocol suites are mapped to this model to provide networked communications. Up And Down The Protocol Stack In general, most protocols follow the guidelines established by the OSI model. A protocol suite, also called a stack, is a combination of protocols that work together to achieve network communication. These protocol suites are generally broken up into three sections that map to the OSI model: network, transport, and application. Because each layer performs a specific function and has its own rules, a protocol stack often has a different protocol for each of these layers. Network Protocols Network protocols provide the following services: addressing and routing information, error checking, requesting retransmissions, and establishing rules for communicating in a particular networking environment. These services are also called link services. Some popular network protocols are: DDP (Delivery Datagram Protocol) Apple s data transport protocol that is used in AppleTalk IP (Internet Protocol) Part of the TCP/IP protocol suite that provides addressing and routing information IPX (Internetwork Packet Exchange) and NWLink Novell s NetWare protocol (and Microsoft s implementation of this protocol, respectively) used for packet routing and forwarding NetBEUI Developed by IBM and Microsoft, it provides transport services for NetBIOS
9 Network Protocols 37 Transport Protocols In addition, protocol suites also contain transport protocols, which are responsible for ensuring reliable data delivery between computers. Some popular transport protocols are: ATP (AppleTalk Transaction Protocol) and NBP (Name Binding Protocol) AppleTalk s session and data transport protocols NetBIOS/NetBEUI NetBIOS establishes and manages communications between computers; NetBEUI provides data transport services for that communication SPX (Sequenced Packet Exchange) and NWLink Novell s connection-oriented protocol that is used to guarantee data delivery (and Microsoft s implementation of this protocol) TCP (Transmission Control Protocol) The portion of the TCP/IP protocol suite that is responsible for reliable delivery of data Application Protocols Finally, there are application protocols, which are responsible for application-to-application services. Some popular application protocols are: AFP (AppleTalk File Protocol) Apple s remote file management protocol FTP (File Transfer Protocol) Another member of the TCP/IP protocol suite that is used to provide file transfer services NCP (NetWare Core Protocol) Novell s client shells and redirectors SMTP (Simple Mail Transport Protocol) A member of the TCP/IP protocol suite that is responsible for transferring SNMP (Simple Network Management Protocol) A TCP/IP protocol that is used to manage and monitor network devices That s it for our discussion of how protocol suites map to the established network standards. We now provide a more detailed look at the protocol suites. Protocols As already mentioned, computers must agree on a protocol to be used for any type of communication to take place. The following sections provide more detail on the more common protocols in use today.
10 38 Chapter 3 NetBEUI NetBEUI is a simple network layer transport protocol that was developed to support NetBIOS networks. Like NetBIOS, NetBEUI is not routable, so it really has no place on an enterprise network. NetBEUI is the fastest transport protocol available to NT. It s great for fast transmission, but is not usable across routed networks. Benefits of NetBEUI include: speed, good error protection, ease of implementation, and low memory overhead. Some disadvantages are: it s not routable, it has very little support for crossplatform applications, and it has very few troubleshooting tools available. TCP/IP TCP/IP is the most widely used protocol suite in networking today. This is due in part to the vast growth of the global Internet. TCP/IP is able to span wide areas and is very flexible. In addition, it provides cross-platform support, routing capabilities, as well as support for the Simple Network Management Protocol (SNMP), the Dynamic Host Configuration Protocol (DHCP), the Windows Internet Name Service (WINS), the Domain Name Service (DNS), and a host of other useful protocols. However, TCP/IP s rich set of features are provided at the expense of additional overhead, which may make it too cumbersome for some networks or applications. AppleTalk It should come as no surprise that the AppleTalk protocol is used for communication with Macintosh computers. By enabling AppleTalk, you allow Mac clients to store and access files located on an NT Server, print to NT printers, and vice versa. An item of note: You must first install the NT Services For Macintosh before you can install AppleTalk. Also, Mac support is only available from an NTFS partition. APPC The Advanced Program-to-Program Communication (APPC) protocol, developed by IBM, is a peer-to-peer protocol used in IBM s Systems Network Architecture (SNA) for use on AS/400-series computers. X.25 X.25 is a set of wide-area protocols that are used in packet-switching networks. It was created to connect remote terminals to mainframes. Although many other wide-area communications types are available in the United States, X.25 is still widely used in Europe.
11 Network Protocols 39 HDLC High-level Data Link Control (HDLC) is a flexible, bit-oriented data link protocol that is based on IBM s Synchronous Data Link Control (SDLC). It has been standardized by the ISO. HDLC can support half- or fullduplex transmission, circuit- or packet-switched networks, peer-to-peer or client/server network topologies and transmission over cable or wireless media. XNS The Xerox Network System (XNS) was created by Xerox for use in Ethernet networks. XNS is the basis for Novell s IPX/SPX, but it is seldom found in today s networks.
12 40 Chapter 3 Exam Prep Questions Question 1 Which of the following IEEE 802 specifications provides details on network security? a b c d The spec details fiber optic networks. Therefore, answer a is incorrect. Answer b is incorrect because details integrated voice and data networks. The provides information on network security. Therefore, answer c is the correct choice. The specification details wireless networks. Therefore, answer d is incorrect. Question 2 Which layer of the OSI model converts data into a generic format for network transmission? a. Transport layer b. Session layer c. Presentation layer d. Application layer Answer a is incorrect because the Transport layer manages the transmission of data across a network. The Session layer maintains a session between computers Therefore, answer b is also incorrect. Answer c is the correct choice; the Presentation layer is responsible for data conversion. The Application layer provides an interface for applications to use to gain access to networked services, so answer d is incorrect.
13 Network Protocols 41 Question 3 Which layer of the OSI model manages flow control and error correction? a. Transport layer b. Session layer c. Network layer d. Physical layer Answer a is the correct choice. The Transport layer is responsible for error-handling information and flow control. The Session layer maintains a session between computers. Therefore, answer b is also incorrect. The Network layer handles packet addressing and sequencing. Therefore, answer c is incorrect. The Physical layer is responsible for communication with the network media. Therefore, answer d is incorrect. Question 4 Which layer of the ODI model establishes the route between the sending and receiving computer? a. Transport layer b. Session layer c. Network layer d. Physical layer The Transport layer is responsible for error-handling information and flow control. Therefore, answer a is incorrect. The Session layer maintains a session between computers. Therefore, answer b is also incorrect. The Network layer is responsible for determining the route from the source to destination computer. Therefore, answer c is the correct choice. The Physical layer is responsible for communication with the network media Therefore, answer d is incorrect.
14 42 Chapter 3 Question 5 In which OSI model layer does the Media Access Control sublayer reside? a. Transport layer b. Network layer c. Data Link layer d. Physical layer Only the Data Link layer was given sublayers by the IEEE 802 specifications, which defined the Media Access Control and Logical Link Control sublayers. Therefore, the only correct answer to this question is answer c. None of the other choices were given sublayers. Therefore, a, b, and d are incorrect. Question 6 Which of the following protocols is considered a network protocol? a. IPX b. Telnet c. FTP d. SPX IPX is a network protocol. Therefore, answer a is the correct choice. Telnet and FTP are both application protocols. Therefore answers b and c are incorrect. SPX is a transport protocol. Therefore, answer d. is also incorrect. Question 7 Which of the following protocols is considered a transport protocol? a. SNMP b. SMTP c. FTP d. IPX e. TCP
15 Network Protocols 43 SNMP, SMTP, and FTP are application protocols. Therefore, answers a, b, and c are incorrect. IPX is a network protocol. Therefore, answer d is also incorrect. TCP is a transport protocol. Therefore answer e is correct. Question 8 Which of the following protocols are considered application protocols? [Check all correct answers] a. TCP b. SNMP c. FTP d. SPX e. NetBEUI TCP and SPX are transport protocols. Therefore answers a and d are incorrect. SNMP and FTP are both application protocols, so both answers b and c correct. NetBEUI is a transport protocol. Therefore, answer e is incorrect. Question 9 Which of the following 802 specifications provide details on how an Ethernet network operates? a b c d defines Logical Link Control.; Therefore, answer a is incorrect. The specification defines standards for Ethernet networks. Therefore, answer b is correct defines Token Bus LANs Therefore, answer c is incorrect defines Token Ring LANs; therefore, answer d is also incorrect.
16 44 Chapter 3 Need To Know More? Chellis, James, Charles Perkins, and Matthew Strebe: MCSE: Networking Essentials Study Guide. Sybex Network Press, San Francisco, CA, ISBN Chapter 3, The Theoretical Network, discusses the OSI Reference Model at length. Microsoft Press: Networking Essentials. Redmond, Washington, ISBN Unit 3, Lesson 7, The OSI and 802 Networking Models, and Unit 3, Lesson 10 Protocols, both discuss the topics covered in this chapter in great detail.
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding
Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces
CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency
Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer
Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual
CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a
Review Questions 1. Which of the following best describes the Presentation layer? b. Translates, encrypts, or prepares data from the Application layer for network transmission c. Handles routing information
The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
[Previous] [Next] Chapter 2 Implementing TCP/IP About This Chapter This chapter gives you an overview of Transmission Control Protocol/Internet Protocol (TCP/IP). The lessons provide a brief history of
Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,
Chapter 2: Network Standards and the OSI Model TRUE/FALSE 1. Standards assist in network design. T PTS: 1 REF: 39 2. Network functions are associated with only one layer of the OSI model. F PTS: 1 REF:
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
Introduction to internetworking, OSI, TCP/IP and Addressing. Network Devices Repeater (Hub) Hubs don t break collision and broadcast domains. So any packet will be forwarded to all ports. Bridge (Switch)
CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal
Overview of Hierarchical Protocol Architecture Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Overview Concept and structure of hierarchical protocol architecture
Chapter 9 Ethernet Part 1 Introduction to Ethernet Ethernet Local Area Networks (LANs) LAN (Local Area Network) - A computer network connected through a wired or wireless medium by networking devices (s,
UNIT 1 INTRODUCTION TO COMPUTER NETWORKS Structure Page Nos. 1.0 Introduction 5 1.1 Objectives 6 1.2 What is a Computer Network? 6 1.3 Network Goals and Motivations 7 1.4 Classification of Networks 8 1.4.1
ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure
1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11
Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How
The OSI Model and the TCP/IP Protocol Suite Outline: 1. Protocol Layers 2. OSI Model 3. TCP/IP Model 4. Addressing OBJECTIVES To discuss the OSI model and its layer architecture and to show the interface
Network+ Guide to Networks, 6 th Edition 2-1 Chapter 2 Networking Standards and the OSI Model At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
CBCN4103 Open Systems Interconnection (OSI) is a standard d description or "reference model" for how messages should be transmitted between any two points in a telecommunication network. Its purpose is
1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
Guide to TCP/IP, Third Edition Chapter 1: Introducing TCP/IP 1 Objectives Understand TCP/IP s origins and history Explain the process by which TCP/IP standards and other documents, called drequests for
DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Subject Code: CS1302 Subject Name: Computer Networks Year/ Sem: III / V UNIT-I 1. What is multicast? What is the difference between unicast and multicast?
Lecture Outline 7010INT Data Communications Lecture 2 Basic Concepts Introduction to ing Models eference: Forouzan chapters 1, and 2. Types of networks: LANs WANs - MANs Switching directing traffic. Models
Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following
Packet Switching, Layer Models and Protocol Suites Course Code CCE 211 Course Title Data Communication Asst. Prof. Md Samsuzzaman, Ph.D. email@example.com http://www.cse.pstu.ac.bd/sobuzcse Computer
Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee ١ Agenda Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP
IT Essentials (ITE v5.0 & v5.02) Chapter 6 Exam Answers 100% 2016 1. Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame? Repeater hub switch*
Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking
100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
1 CHAPTER 3 : OSI MODEL OSI Layer TCP/IP Protocol Suite 7/26/200 09 CHAPTER 3 : THE OSI MODEL Established in 1947, the ISO is a multinational body dedicated to worldwide agreement on international standard
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
Local Area Networking Chapter 21 Overview In this chapter, you will learn to Explain network technologies Explain network operating systems Install and configure wired networks Install and configure wireless
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
CISCO SYSTEM ADMININSTRATION PAGE 1 OF 11 CONTESTANT ID# Time Rank CISCO SYSTEM ADMINISTRATION (41) Regional 2012 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification:
CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology
CHAPTER 21 INTRODUCTION TO DATA COMMUNICATIONS AND NETWORKING # DEFINITIONS TERMS 1) Information that is stored in digital form. Information that has been processed, organized and stored. Data 2) Knowledge
Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!
Scribe Notes -- October 31st, 2017 TCP/IP Protocol Suite Most popular protocol but was designed with fault tolerance in mind, not security. Consequences of this: People realized that errors in transmission
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
Open Systems Interconnection (OSI) By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: firstname.lastname@example.org 1 OSI The Open System Interconnection (OSI)
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
Chapter 1: Understanding Network Models Cisco CCNA (and CCDA) Study Guide By Dan DiNicolo, January 25th, 2007 Posted in General. http://www.2000trainers.com/ Dan s Free CCNA Study Guide is a collection
Configuring AppleTalk This chapter describes how to configure AppleTalk and provides configuration examples. For a complete description of the AppleTalk commands mentioned in this chapter, refer to the
The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols
Visible Networks Chapter 5 Overview In this chapter, you will learn how to Describe the basic functions of a network, including identifying common devices and connectors Discuss the differences between
Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University
Indian Institute of Technology Kharagpur Review of Network Technologies Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. I.I.T. Kharagpur, INDIA Lecture 2: Review of network technologies On completion,
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
Advantages and disadvantages Advantages Disadvantages Asynchronous transmission Simple, doesn't require synchronization of both communication sides Cheap, timing is not as critical as for synchronous transmission,
OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
Computer Networks Third Edition Andrew S. Tanenbaum 1 ; l Vrije Universiteit Amsterdam, The Netherlands For book and bookstore information Prentice Hall PTR Upper Saddle River, New Jersey 07458 CONTENTS
Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.
Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually
S n i f f e m 1. 0 1 Whiitepaper TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...2 Hardware...2 Software...2
Introduction to LAN TDC 363 Week 3 Network Protocols Book: Chapter 4 & 11 1 Outline The TCP/IP model vs. the OSI Model IP Address Address Resolution Protocol (ARP) IPX/SPX and NetBIOS Protocols on Windows
Chapter 1 Installing and Configuring Network Protocols MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Troubleshoot routing. Diagnostic utilities include the tracert command, the ping command, and the
Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,
Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.
Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into
Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are
CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching
Lecture 2 Outline Wireshark Project 1 posted, due in a week Lab from a different textbook Work through the lab and answer questions at the end Chapter 1 - Foundation 1.1 Applications 1.2 Requirements 1.3