SlideShare a Scribd company logo
1 of 27
Unit 2: Underlying Technologies
      •   Transmission media (Section 3.1. Read on your own)
      •   Local Area Networks (LANs)
           – Ethernet (CSMA/CD - Carrier Sense Multiple Access/Collision Detection ,
             IEEE 802.3)
           – Token Ring (IEEE 802.5)
      •   Switching
           – Circuit switching
           – Packet switching
                • Datagram approach
                • Virtual circuit approach
      •   Wide Area Networks (WANs)
           –   PPP (Point-to-Point Protocol)
           –   X.25
           –   Frame Relay
           –   ATM (Asynchronous Transfer Mode)- cell relay
      •   Interconnecting devices – repeaters, bridges, routers and gateways
      •   Shared media v.s. switched LAN architecture

TDC 463-98-501/502, Summer II 2002                                                 2-1
IEEE 802 LAN Layers




TDC 463-98-501/502, Summer II 2002                         2-2
Ethernet LANs

     Features
     1) Widest Industry Use and Acceptance
               a)   Product Availability
               b)   Many Vendors
               c)   Low Cost
               d)   High Knowledge Base


     2) Standardized for Multiple Media Types
               a)   Twisted Pair (10Base-T)
               b)   Optical Fiber (10Base-F, FOIRL)
               c)   Coaxial Cable (10Base2, 10Base5)
               d)   Also high-speed Ethernets




TDC 463-98-501/502, Summer II 2002                     2-3
Ethernet Problems
1) Coaxial Cable Networks Hard to Troubleshoot
    a)   Faulty connections and electrical failures hard to find
    b)   Improper grounding can cause stray voltages
    c)   Static electricity
    d)   Non-standard hardware
    e)   Problems are often intermittent


2) Ethernet Lacks Built-In Network Monitoring

3) Ethernet Lacks Any Priority Mechanism

4) Station Transmission Time May Grow Large under High Loads




TDC 463-98-501/502, Summer II 2002                                 2-4
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

The basic idea:
When a station has a frame to transmit:
1) Listen for Data Transmission on Cable (Carrier Sense)
2) When Medium is Quiet (no other station transmitting):
    a) Transmit Frame, Listening for Collision
    b) If collision is heard, stop transmitting, wait random time, and transmit again.




   Frame format




                                        This portion must be at least 64 bytes
                                        for the Ethernet to work correctly
TDC 463-98-501/502, Summer II 2002                                                       2-5
Figure 3-9




TDC 463-98-501/502, Summer II 2002   2-6
Figure 3-11




TDC 463-98-501/502, Summer II 2002   2-7
Figure 3-12




TDC 463-98-501/502, Summer II 2002   2-8
Figure 3-13




TDC 463-98-501/502, Summer II 2002   2-9
Token Ring Features
1) Predictable Performance
     a) Unlike Ethernet, there is a fixed limit on how long a station must wait to
        transmit frame.
     b) Eight data priority levels ensure that important data get sent first.


2)   Ring-of -Stars Topology
     a) Star layout is well understood.
     b) Ring is easily expanded by adding additional Multistation Access Units
        (MAUs)
     c) Only point-to-point data connections used.


3)   Self-Monitoring and Reconfiguration Capabilities
     a) Active Monitor station recovers from any token operation problems.
     b) If any station goes down it will be detected and removed from the ring.
     c) Any single cable can be cut or disconnected and network will reconfigure and
        continue operation.


TDC 463-98-501/502, Summer II 2002                                                     2-10
Token Ring Features (continued.)

    4)   IBM Support
         a) IBM SNA data and LAN data can travel together on same token ring.
         b) Token Ring is an integral part of IBM future networking.


 Disadvantages of Token Ring
    1)   Higher price for NICs
    2)   Limited support for non-IBM products.
         a) Fewer products available for Token Ring than Ethernet
         b) Ethernet is still at the heart of some vendors’ future network plans.

Note: For this course, you do not need to know the details of Token Ring frame format




TDC 463-98-501/502, Summer II 2002                                                      2-11
Figure 3-14 Token Ring Operation




TDC 463-98-501/502, Summer II 2002   2-12
Figure 3-19 Circuit Switching

        • Dedicated physical connections
        • Source and destination operate at the same speed
        • Data arrive in sequence




TDC 463-98-501/502, Summer II 2002                           2-13
Packet Switching
  • Store-and-forward
  • Source and destination may operate at different rates
Figure 3-20 Packet Switching- Datagram approach




TDC 463-98-501/502, Summer II 2002                          2-14
Packet Switching- Datagram approach



   •Connectionless
        •No connection setup necessary before sending data
        •Each packet sent independently

        •Each packet may take different path to destination

   •Each packet contains complete destination address
   •Packets may arrive out-of-order (transport layer must do
   reordering)
   •Network load is completely unpredictable
   •Protocol Examples: IP, Novell IPX, AppleTalk



TDC 463-98-501/502, Summer II 2002                             2-15
Figure 3-21 Packet switching – Virtual circuit approach




TDC 463-98-501/502, Summer II 2002                        2-16
Packet switching – Virtual circuit approach


•Connection-oriented
     •Sender sends a Setup Request packet to establish a virtual circuit before sending
     data
     •Setup Request passes through all router/switches on path from source to
     destination
           •Path is assigned a Virtual Circuit Identifier (VCID)
           •Each router/switch stores information about each VC
           •Any router/switch or destination may deny the setup request (like a busy signal).
     •When finished, Sender sends Clear Request to tear down VC.
•Each data packet contains VCID, not full source and destination
addresses
•All packets follow same path and arrive in order
•Network load can be controlled through admissions control (denying
setup requests if busy)
•Protocol Examples: X.25, Frame Relay, ATM
TDC 463-98-501/502, Summer II 2002                                                         2-17
WAN


     PPP
     • commonly used for dial-up access to the internet (connect through
     a phone line to the access router)
     • can also be used in a point-to-point link between two devices such
     as routers

                    Figure 3-22 Point-to-point protocol (PPP) frame




TDC 463-98-501/502, Summer II 2002                                    2-18
Figure 3-23 X.25 (Connection-oriented)




   X.25 - An interface protocol to
   access the network




                               Not defined by X.25




TDC 463-98-501/502, Summer II 2002                   2-19
Figure 3-25




                                     Hop-by-hop error and flow
                                     control in X.25 is not necessary
                                     for newer more reliable
                                     networks.




TDC 463-98-501/502, Summer II 2002                            2-20
Figure 3-28 ATM cells (Small fixed-size data units)




TDC 463-98-501/502, Summer II 2002                    2-21
Figure 3-29




TDC 463-98-501/502, Summer II 2002   2-22
Internetworking Terms




TDC 463-98-501/502, Summer II 2002   2-23
TDC 463-98-501/502, Summer II 2002   2-24
TDC 463-98-501/502, Summer II 2002   2-25
Transparent Bridge




  DA: Destination Address
  SA: Source Address




TDC 463-98-501/502, Summer II 2002   2-26
Shared-Media vs.                                                  Shared Media Hub
                                                                                                              only one 10Mbps
                                             shared, single                                                    connection at a

   Switched LAN                              10Mbps LAN
                                               segment
                                                                                                                    time



   Architecture
                                                                                 10 Mbps




                                                       client workstations                  servers
                                                                   "10 Mbps for ALL"


                     Switch-Based LAN Architecture


                                         multiple dedicated                                                        Multiple,
                                          10Mbps LAN                   Switching Hub                         simultaneous 10Mbps
                                            segments          switching matrix                                   connections




                                                                                                     All connections at 10Mbps




                          shared media hub                                        shared media hub




                     Workgroup with shared servers with dedicated Workgroup with shared                             Workstations with
                         connection            connections            connection                                  dedicated connections
                                                                    "10 Mbps for EACH"

TDC 463-98-501/502, GOLDMAN: II 2002
                    Summer LAN                                                                                                            2-27

More Related Content

What's hot

Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relayjuliusbangaw
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Sachin Morya
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)Shweta Kumari
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Designnakomuri
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3imec.archive
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Sachin Morya
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networkszaisahil
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Designnakomuri
 
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Vishal Sharma, Ph.D.
 
Metro ethernet-services
Metro ethernet-servicesMetro ethernet-services
Metro ethernet-servicesc09271
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Sachin Morya
 
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable SwitchesIBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable SwitchesIBM India Smarter Computing
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
 

What's hot (20)

Sem 1 Ch 7
Sem 1 Ch 7Sem 1 Ch 7
Sem 1 Ch 7
 
Vpls
VplsVpls
Vpls
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
802 1ad
802 1ad802 1ad
802 1ad
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
 
IIR VPN London
IIR VPN LondonIIR VPN London
IIR VPN London
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networks
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Design
 
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
 
Metro ethernet-services
Metro ethernet-servicesMetro ethernet-services
Metro ethernet-services
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable SwitchesIBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
Wireless lecture1
Wireless lecture1Wireless lecture1
Wireless lecture1
 

Viewers also liked

Presentation
PresentationPresentation
PresentationMohd Arif
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformMohd Arif
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardwareMohd Arif
 
اخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدماخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدمTORKIALSOLAMI
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peerMohd Arif
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systemsMohd Arif
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psecMohd Arif
 
أخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتأخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتProf. Othman Alsalloum
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdpMohd Arif
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgetingMohd Arif
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management FundamentalsSolarWinds
 
Network Management
Network ManagementNetwork Management
Network Managementazura787
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
Pointers in c
Pointers in cPointers in c
Pointers in cMohd Arif
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniquesMohd Arif
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administratorguest371b1b4
 

Viewers also liked (20)

Presentation
PresentationPresentation
Presentation
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
 
اخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدماخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدم
 
Lists
ListsLists
Lists
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
أخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتأخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلومات
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Network Management
Network ManagementNetwork Management
Network Management
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Loaders
LoadersLoaders
Loaders
 
Pointers in c
Pointers in cPointers in c
Pointers in c
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administrator
 

Similar to Networing basics

Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012Samuel Dratwa
 
Lan basic
Lan basicLan basic
Lan basicOnline
 
4 Structure Cabling System Design
4 Structure Cabling System Design4 Structure Cabling System Design
4 Structure Cabling System DesignMrirfan
 
layeringanjanv1-090522005231-phpapp01.pdf
layeringanjanv1-090522005231-phpapp01.pdflayeringanjanv1-090522005231-phpapp01.pdf
layeringanjanv1-090522005231-phpapp01.pdfImXaib
 
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching PROIDEA
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
Networking Technologies02.pptx
Networking Technologies02.pptxNetworking Technologies02.pptx
Networking Technologies02.pptxANISHTP
 
Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3wilbertl
 

Similar to Networing basics (20)

NET7.PPT
NET7.PPTNET7.PPT
NET7.PPT
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 
Lan basic
Lan basicLan basic
Lan basic
 
ch5-network.ppt
ch5-network.pptch5-network.ppt
ch5-network.ppt
 
4 Structure Cabling System Design
4 Structure Cabling System Design4 Structure Cabling System Design
4 Structure Cabling System Design
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5
 
layeringanjanv1-090522005231-phpapp01.pdf
layeringanjanv1-090522005231-phpapp01.pdflayeringanjanv1-090522005231-phpapp01.pdf
layeringanjanv1-090522005231-phpapp01.pdf
 
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
 
Presentation8
Presentation8Presentation8
Presentation8
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
CCNA DUMPS 640-802
CCNA DUMPS 640-802CCNA DUMPS 640-802
CCNA DUMPS 640-802
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
Internet service
Internet serviceInternet service
Internet service
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Chapter3
Chapter3Chapter3
Chapter3
 
Networking Technologies02.pptx
Networking Technologies02.pptxNetworking Technologies02.pptx
Networking Technologies02.pptx
 
Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
 

More from Mohd Arif

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Project identification
Project identificationProject identification
Project identificationMohd Arif
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
H.323 vs. cops interworking
H.323 vs. cops interworkingH.323 vs. cops interworking
H.323 vs. cops interworkingMohd Arif
 
Google search tips advanced features
Google search tips advanced featuresGoogle search tips advanced features
Google search tips advanced featuresMohd Arif
 
Distributed databases and dbm ss
Distributed databases and dbm ssDistributed databases and dbm ss
Distributed databases and dbm ssMohd Arif
 
Dinive conquer algorithm
Dinive conquer algorithmDinive conquer algorithm
Dinive conquer algorithmMohd Arif
 
Dcom vs. corba
Dcom vs. corbaDcom vs. corba
Dcom vs. corbaMohd Arif
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and securityMohd Arif
 
Data structure
Data structureData structure
Data structureMohd Arif
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communicationMohd Arif
 

More from Mohd Arif (15)

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Project identification
Project identificationProject identification
Project identification
 
Network management
Network managementNetwork management
Network management
 
Heap sort
Heap sortHeap sort
Heap sort
 
H.323 vs. cops interworking
H.323 vs. cops interworkingH.323 vs. cops interworking
H.323 vs. cops interworking
 
H.323
H.323H.323
H.323
 
Graphs
GraphsGraphs
Graphs
 
Google search tips advanced features
Google search tips advanced featuresGoogle search tips advanced features
Google search tips advanced features
 
Google
GoogleGoogle
Google
 
Distributed databases and dbm ss
Distributed databases and dbm ssDistributed databases and dbm ss
Distributed databases and dbm ss
 
Dinive conquer algorithm
Dinive conquer algorithmDinive conquer algorithm
Dinive conquer algorithm
 
Dcom vs. corba
Dcom vs. corbaDcom vs. corba
Dcom vs. corba
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Data structure
Data structureData structure
Data structure
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Networing basics

  • 1. Unit 2: Underlying Technologies • Transmission media (Section 3.1. Read on your own) • Local Area Networks (LANs) – Ethernet (CSMA/CD - Carrier Sense Multiple Access/Collision Detection , IEEE 802.3) – Token Ring (IEEE 802.5) • Switching – Circuit switching – Packet switching • Datagram approach • Virtual circuit approach • Wide Area Networks (WANs) – PPP (Point-to-Point Protocol) – X.25 – Frame Relay – ATM (Asynchronous Transfer Mode)- cell relay • Interconnecting devices – repeaters, bridges, routers and gateways • Shared media v.s. switched LAN architecture TDC 463-98-501/502, Summer II 2002 2-1
  • 2. IEEE 802 LAN Layers TDC 463-98-501/502, Summer II 2002 2-2
  • 3. Ethernet LANs Features 1) Widest Industry Use and Acceptance a) Product Availability b) Many Vendors c) Low Cost d) High Knowledge Base 2) Standardized for Multiple Media Types a) Twisted Pair (10Base-T) b) Optical Fiber (10Base-F, FOIRL) c) Coaxial Cable (10Base2, 10Base5) d) Also high-speed Ethernets TDC 463-98-501/502, Summer II 2002 2-3
  • 4. Ethernet Problems 1) Coaxial Cable Networks Hard to Troubleshoot a) Faulty connections and electrical failures hard to find b) Improper grounding can cause stray voltages c) Static electricity d) Non-standard hardware e) Problems are often intermittent 2) Ethernet Lacks Built-In Network Monitoring 3) Ethernet Lacks Any Priority Mechanism 4) Station Transmission Time May Grow Large under High Loads TDC 463-98-501/502, Summer II 2002 2-4
  • 5. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) The basic idea: When a station has a frame to transmit: 1) Listen for Data Transmission on Cable (Carrier Sense) 2) When Medium is Quiet (no other station transmitting): a) Transmit Frame, Listening for Collision b) If collision is heard, stop transmitting, wait random time, and transmit again. Frame format This portion must be at least 64 bytes for the Ethernet to work correctly TDC 463-98-501/502, Summer II 2002 2-5
  • 6. Figure 3-9 TDC 463-98-501/502, Summer II 2002 2-6
  • 7. Figure 3-11 TDC 463-98-501/502, Summer II 2002 2-7
  • 8. Figure 3-12 TDC 463-98-501/502, Summer II 2002 2-8
  • 9. Figure 3-13 TDC 463-98-501/502, Summer II 2002 2-9
  • 10. Token Ring Features 1) Predictable Performance a) Unlike Ethernet, there is a fixed limit on how long a station must wait to transmit frame. b) Eight data priority levels ensure that important data get sent first. 2) Ring-of -Stars Topology a) Star layout is well understood. b) Ring is easily expanded by adding additional Multistation Access Units (MAUs) c) Only point-to-point data connections used. 3) Self-Monitoring and Reconfiguration Capabilities a) Active Monitor station recovers from any token operation problems. b) If any station goes down it will be detected and removed from the ring. c) Any single cable can be cut or disconnected and network will reconfigure and continue operation. TDC 463-98-501/502, Summer II 2002 2-10
  • 11. Token Ring Features (continued.) 4) IBM Support a) IBM SNA data and LAN data can travel together on same token ring. b) Token Ring is an integral part of IBM future networking. Disadvantages of Token Ring 1) Higher price for NICs 2) Limited support for non-IBM products. a) Fewer products available for Token Ring than Ethernet b) Ethernet is still at the heart of some vendors’ future network plans. Note: For this course, you do not need to know the details of Token Ring frame format TDC 463-98-501/502, Summer II 2002 2-11
  • 12. Figure 3-14 Token Ring Operation TDC 463-98-501/502, Summer II 2002 2-12
  • 13. Figure 3-19 Circuit Switching • Dedicated physical connections • Source and destination operate at the same speed • Data arrive in sequence TDC 463-98-501/502, Summer II 2002 2-13
  • 14. Packet Switching • Store-and-forward • Source and destination may operate at different rates Figure 3-20 Packet Switching- Datagram approach TDC 463-98-501/502, Summer II 2002 2-14
  • 15. Packet Switching- Datagram approach •Connectionless •No connection setup necessary before sending data •Each packet sent independently •Each packet may take different path to destination •Each packet contains complete destination address •Packets may arrive out-of-order (transport layer must do reordering) •Network load is completely unpredictable •Protocol Examples: IP, Novell IPX, AppleTalk TDC 463-98-501/502, Summer II 2002 2-15
  • 16. Figure 3-21 Packet switching – Virtual circuit approach TDC 463-98-501/502, Summer II 2002 2-16
  • 17. Packet switching – Virtual circuit approach •Connection-oriented •Sender sends a Setup Request packet to establish a virtual circuit before sending data •Setup Request passes through all router/switches on path from source to destination •Path is assigned a Virtual Circuit Identifier (VCID) •Each router/switch stores information about each VC •Any router/switch or destination may deny the setup request (like a busy signal). •When finished, Sender sends Clear Request to tear down VC. •Each data packet contains VCID, not full source and destination addresses •All packets follow same path and arrive in order •Network load can be controlled through admissions control (denying setup requests if busy) •Protocol Examples: X.25, Frame Relay, ATM TDC 463-98-501/502, Summer II 2002 2-17
  • 18. WAN PPP • commonly used for dial-up access to the internet (connect through a phone line to the access router) • can also be used in a point-to-point link between two devices such as routers Figure 3-22 Point-to-point protocol (PPP) frame TDC 463-98-501/502, Summer II 2002 2-18
  • 19. Figure 3-23 X.25 (Connection-oriented) X.25 - An interface protocol to access the network Not defined by X.25 TDC 463-98-501/502, Summer II 2002 2-19
  • 20. Figure 3-25 Hop-by-hop error and flow control in X.25 is not necessary for newer more reliable networks. TDC 463-98-501/502, Summer II 2002 2-20
  • 21. Figure 3-28 ATM cells (Small fixed-size data units) TDC 463-98-501/502, Summer II 2002 2-21
  • 22. Figure 3-29 TDC 463-98-501/502, Summer II 2002 2-22
  • 26. Transparent Bridge DA: Destination Address SA: Source Address TDC 463-98-501/502, Summer II 2002 2-26
  • 27. Shared-Media vs. Shared Media Hub only one 10Mbps shared, single connection at a Switched LAN 10Mbps LAN segment time Architecture 10 Mbps client workstations servers "10 Mbps for ALL" Switch-Based LAN Architecture multiple dedicated Multiple, 10Mbps LAN Switching Hub simultaneous 10Mbps segments switching matrix connections All connections at 10Mbps shared media hub shared media hub Workgroup with shared servers with dedicated Workgroup with shared Workstations with connection connections connection dedicated connections "10 Mbps for EACH" TDC 463-98-501/502, GOLDMAN: II 2002 Summer LAN 2-27