This document provides an overview of chapter 6 from the textbook "Fundamentals of Business Data Communications". The chapter discusses wired and wireless local area networks (LANs). It covers LAN components such as network interface cards, cables, hubs, switches, and access points. It also discusses wired Ethernet standards and technologies, including shared Ethernet using hubs and switched Ethernet using switches. Wireless Ethernet and considerations for LAN design and performance are also covered. The chapter concludes by discussing implications for network management.
The chapter discusses different components and architectures for backbone networks. It describes switches, routers, and gateways that can be used in backbone networks. It outlines common backbone architectures including switched, routed, and virtual LAN (VLAN) backbones. Switched backbones are most popular and use switches to interconnect local area networks (LANs) instead of routers. VLANs assign computers to network segments through software rather than hardware. The chapter provides examples of how different backbone designs are implemented in organizations and their advantages.
The document summarizes key concepts about data link layer protocols from Chapter 4 of the textbook. It discusses media access control using contention-based and controlled access methods. It also covers error control techniques like error detection using parity checks, checksums, and cyclic redundancy checks. Error correction is achieved using retransmission-based automatic repeat request and forward error correction methods. Asynchronous and synchronous transmission protocols are compared, along with common file transfer protocols for asynchronous lines.
The document is a chapter from a textbook on business data communications. It discusses the history and architecture of the Internet, how it works, and various technologies used for Internet access such as DSL, cable modems, fiber networks, and WiMAX. It also covers governance and standards bodies that guide the Internet's development, as well as projects to develop next generation Internet technologies with faster speeds and new capabilities. The chapter concludes by discussing implications for management, such as concerns about Internet traffic and evaluating which broadband access technologies may dominate.
This chapter discusses the process of designing computer networks. It describes both traditional network design approaches as well as more modern building block network design. The building block approach involves cyclically refining needs analysis, technology design, and cost assessment phases. Needs analysis involves understanding user and application requirements, technology design specifies the necessary hardware and software components, and cost assessment evaluates design alternatives. Simulation tools can be used to test network designs. Requests for proposals may be issued to vendors to obtain pricing for components. The goal is to design a network that can meet current and future needs in a cost-effective manner.
This document provides an overview of network operating systems and their components. It describes how network OSs allow computers to perform tasks like file sharing, email, and web browsing. It distinguishes between client OSs, which are optimized for end users, and server OSs, which provide infrastructure services and centralized resources. Server OSs incorporate features like user management, security policies, file storage, DHCP, DNS, and fault tolerance. The document also introduces virtualization and how it allows multiple guest operating systems to run simultaneously on a single physical computer.
This document provides an overview of chapter 1 from the Network+ Guide to Networks, 6th Edition. It introduces networking concepts such as peer-to-peer and client/server networks. Peer-to-peer networks allow direct communication between equal nodes, while client/server networks use a centralized server to manage shared resources. The document also discusses common network types like LANs, MANs, and WANs and elements of client/server networks including clients, servers, network cards, and protocols. Finally, it outlines several common uses for networks such as file and print sharing, remote access services, and email communication.
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
The document describes various network hardware components. It explains that repeaters and hubs receive and retransmit signals to extend network reach, while switches determine destination ports by reading addresses. Wireless access points function similarly to hubs to connect wireless devices. Network interface cards mediate the connection between computers and networks by assembling and transmitting signals. Routers connect local area networks and forward packets between networks using IP addresses and routing tables.
The chapter discusses different components and architectures for backbone networks. It describes switches, routers, and gateways that can be used in backbone networks. It outlines common backbone architectures including switched, routed, and virtual LAN (VLAN) backbones. Switched backbones are most popular and use switches to interconnect local area networks (LANs) instead of routers. VLANs assign computers to network segments through software rather than hardware. The chapter provides examples of how different backbone designs are implemented in organizations and their advantages.
The document summarizes key concepts about data link layer protocols from Chapter 4 of the textbook. It discusses media access control using contention-based and controlled access methods. It also covers error control techniques like error detection using parity checks, checksums, and cyclic redundancy checks. Error correction is achieved using retransmission-based automatic repeat request and forward error correction methods. Asynchronous and synchronous transmission protocols are compared, along with common file transfer protocols for asynchronous lines.
The document is a chapter from a textbook on business data communications. It discusses the history and architecture of the Internet, how it works, and various technologies used for Internet access such as DSL, cable modems, fiber networks, and WiMAX. It also covers governance and standards bodies that guide the Internet's development, as well as projects to develop next generation Internet technologies with faster speeds and new capabilities. The chapter concludes by discussing implications for management, such as concerns about Internet traffic and evaluating which broadband access technologies may dominate.
This chapter discusses the process of designing computer networks. It describes both traditional network design approaches as well as more modern building block network design. The building block approach involves cyclically refining needs analysis, technology design, and cost assessment phases. Needs analysis involves understanding user and application requirements, technology design specifies the necessary hardware and software components, and cost assessment evaluates design alternatives. Simulation tools can be used to test network designs. Requests for proposals may be issued to vendors to obtain pricing for components. The goal is to design a network that can meet current and future needs in a cost-effective manner.
This document provides an overview of network operating systems and their components. It describes how network OSs allow computers to perform tasks like file sharing, email, and web browsing. It distinguishes between client OSs, which are optimized for end users, and server OSs, which provide infrastructure services and centralized resources. Server OSs incorporate features like user management, security policies, file storage, DHCP, DNS, and fault tolerance. The document also introduces virtualization and how it allows multiple guest operating systems to run simultaneously on a single physical computer.
This document provides an overview of chapter 1 from the Network+ Guide to Networks, 6th Edition. It introduces networking concepts such as peer-to-peer and client/server networks. Peer-to-peer networks allow direct communication between equal nodes, while client/server networks use a centralized server to manage shared resources. The document also discusses common network types like LANs, MANs, and WANs and elements of client/server networks including clients, servers, network cards, and protocols. Finally, it outlines several common uses for networks such as file and print sharing, remote access services, and email communication.
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
The document describes various network hardware components. It explains that repeaters and hubs receive and retransmit signals to extend network reach, while switches determine destination ports by reading addresses. Wireless access points function similarly to hubs to connect wireless devices. Network interface cards mediate the connection between computers and networks by assembling and transmitting signals. Routers connect local area networks and forward packets between networks using IP addresses and routing tables.
This chapter discusses supporting small business networks. It explains that small business networks typically have less than 200 computers across one or two locations with modest technology needs. The chapter covers selecting network equipment for small businesses, including servers, desktops, switches, wireless access points and routers. It also discusses options for sharing files and other resources like printers for small business networks using Windows HomeGroups, Windows domains, Linux, and network attached storage devices.
The document provides an overview of network reference models and standards, specifically explaining the OSI reference model and IEEE 802 networking model. The OSI model is a seven-layer framework for networking that separates functions into the physical, data link, network, transport, session, presentation, and application layers. The IEEE 802 standards define networking interfaces and cabling to ensure compatibility between devices.
The document discusses security threats to business networks and methods for ensuring continuity of operations. It covers topics such as risk assessment, preventing disruption through controls like antivirus software and redundancy, and developing disaster recovery plans. Effective security requires identifying valuable network assets, potential threats, and controls to mitigate risks from viruses, hacking, device failure and natural disasters. A risk assessment matches threats to controls through a control spreadsheet. Ensuring continuity involves both preventative controls and disaster recovery plans for restoring operations after an outage or disaster.
This document provides an overview of server management and administration topics, including:
1) Managing user and group accounts, including creating accounts in Windows domains and Linux. Groups are used to organize users and assign permissions.
2) Configuring storage and file systems, such as volumes, partitions, and different file system types (FAT, NTFS, Linux). Permissions are set on files, folders and shares to control access.
3) Monitoring system performance and reliability using tools in Windows Server like Event Viewer, Performance Monitor, and Windows System Resource Manager.
This document provides an overview of network protocols and the TCP/IP model. It describes the purpose of network protocols and the layered architecture of TCP/IP, with protocols operating at different layers to enable communication. The layers include the network access, internet, transport and application layers. Key protocols discussed include IP, ARP, ICMP, TCP and UDP, with explanations of their functions in routing packets, resolving addresses, error checking, and reliable vs. connectionless delivery.
This document provides an overview of key concepts in IT infrastructure architecture related to networking. It discusses the presentation and application layers, protocols like SSL/TLS, HTTP, and email protocols. It also covers infrastructure services like DHCP, DNS, NTP, and IPAM systems. Additionally, it summarizes network virtualization techniques like VLANs, VXLANs, virtual NICs, and virtual switches. Finally, it discusses software defined networking, network function virtualization, layered network topologies, spine-leaf architectures, network teaming, and the spanning tree protocol.
This chapter discusses network hardware in depth, including switches, routers, wireless access points, and network interface cards. It describes the operation and advanced features of switches, such as creating the switching table, frame forwarding methods, and features like VLANs and port security. For routers, it explains routing tables, routing protocols, and access control lists. It also covers wireless security options, advanced wireless settings, and bus and feature options for network interface cards.
The document provides an overview of chapter 1 in a networking essentials textbook. It covers basic computer components and operations, networking fundamentals such as packets and frames, and common network terms. The chapter objectives are listed and the presentation slides cover input/output components, storage, processing, how the operating system interfaces with hardware, and examples of local area networks, wide area networks, and internetworks.
This document discusses network media for wired and wireless networking. It describes the primary types of wired network media, including copper-based twisted-pair cable and fiber-optic cables. Characteristics like bandwidth, maximum segment length, interference susceptibility, cable grade, and cost are important criteria for choosing network media. The document focuses on unshielded twisted-pair cable, describing cable categories and components of a structured UTP cable plant.
This chapter discusses data communication networks and their components. It describes local area networks (LANs) that connect computers within an office and their typical components like switches, routers, and cables. Wide area networks (WANs) connect multiple LANs across large areas using technologies like leased lines, virtual private networks, and public switched data networks. The chapter also covers internet connectivity options like dial-up, DSL, and cable modems and how encryption works to secure network communications.
The document discusses troubleshooting and support for computer networks. It describes the benefits of documenting a network, including making equipment changes easier and aiding troubleshooting. It outlines the problem-solving process, including defining the problem, gathering information, considering causes, testing solutions, and preventing future issues. Common troubleshooting tools are also described, such as ping, trace route, network monitors, and cable testers.
A network connects computer systems together to share computing power and storage facilities. Computers connect through cables or phone lines and may be in the same building or across different locations. Common examples include computer networks in offices and the global Internet. Networks allow for sharing of resources like printers and files as well as easy communication. While they provide advantages, networks also involve costs and security risks. The document describes different types of computer networks including LANs, WANs, and MANs as well as various network topologies, hardware, software, and security measures used in computer networking.
Wide area networks connect local area networks over long distances using transmission technologies and devices. Common WAN connection methods include circuit-switched networks like ISDN, leased lines using T-carrier or SONET technologies, packet-switched networks like Frame Relay and ATM, and VPNs over the public Internet. Remote access allows connections from outside the LAN using dial-up, VPNs, or remote desktop applications. Cloud computing provides hosted applications, platforms, and infrastructure over the Internet on a pay-as-you-go basis.
This chapter discusses network security and introduces key concepts such as developing a network security policy, securing physical access to network equipment, and securing network data. It covers determining elements of a security policy, developing password requirements, restricting user access, implementing authentication and authorization, and using tools like encryption, firewalls, and virtual private networks to enhance security. The goal is to help readers understand how to secure a network from both physical and digital threats.
This document outlines the course DCN 330 which covers data communication and network interconnectivity, including distinguishing network devices, analyzing network designs, quality of service, cloud computing, and gaining hands-on experience through lectures, labs, and a course project using tools like Cisco Packet Tracer and lab equipment. Students will be evaluated through exams, quizzes, lab assignments, and a course project presentation and report.
This document provides an overview of network topologies and technologies. It describes common physical topologies including bus, star, ring, and point-to-point. Logical topologies determine how data travels between devices and can mimic the physical topology or operate differently using switches. Popular network technologies are also examined, particularly Ethernet, wireless LANs, and Token Ring. Ethernet remains the most widely used LAN technology and comes in various speeds and media types.
The sole purpose to study Enterprise Network is to create business simplicity across worldwide. The side arms of successful networking are scalability, robustness, fault identification, communication, modularity, security and maintaining privacy. The key for making a network is to provide the essential tools and techniques that will offer the quality of a private/public network.
As I discussed earlier the key purpose is to create business simplicity that means creating IT/Infrastructure simplicity across the cities where an Enterprise Network is connected. Obtaining success in failure/break-down conditions is the main purpose of a network. So to achieve that requirement network designing involves certain topologies, protocols, bandwidth allocation. Topology requirement can be described as maintaining two adjacent networks against any failure in a single link or node. Protocol requirement can be described as using dynamic/static routing protocol to provide routes must be congestion free in a network. Bandwidth allocation is needed to actively allocate extra bandwidth just to maintain the working condition in a network. Design and Modification criteria is all over handed to a person called Network Administrator, who maintains and solely responsible for anything(wanted or unwanted) happens in a network.
The document discusses computer networks and networking. It describes the advantages of networks such as resource sharing, high speed communication, and reliability. It discusses different network models including peer-to-peer and client-server models. It also covers network devices, operating systems, cabling standards, and network topologies.
Networking involves planning, implementing, configuring, monitoring and maintaining interconnected computers that communicate and share resources. The main types of networks are LANs (covering a small area like a building), WANs (spanning large areas like countries) and hybrid networks. Networks provide benefits like sharing information, hardware and software, but also have disadvantages like security issues, virus risks and high costs. Common network topologies include bus, star and ring configurations of connected devices. Wired media include twisted pair, coaxial and fiber optic cables, while wireless uses radio waves, microwaves or infrared signals without wires.
This document defines and compares the two major types of network operating systems (NOS): peer-to-peer and client/server. A NOS is an operating system designed to support sharing of resources like files, printers, and applications between computers in a network. In a peer-to-peer NOS, all computers have equal abilities to access shared resources without a central server. In a client/server NOS, functions are centralized on dedicated file servers that provide resources to individual workstations or clients. Examples of each type and their relative advantages and disadvantages are provided.
This document summarizes different network operating systems (NOS) including Microsoft Windows Server, Novell NetWare, UNIX/Linux, and Apple Mac. It describes key features of each like how Windows Server uses domains and trusts, how Novell NetWare uses its file system and directory services, how UNIX/Linux uses TCP/IP and X Windows, and how Apple Mac used AppleTalk and file/printer sharing between clients. The document also provides overviews of common server utilities, client applications, and networking models associated with each NOS.
This chapter discusses supporting small business networks. It explains that small business networks typically have less than 200 computers across one or two locations with modest technology needs. The chapter covers selecting network equipment for small businesses, including servers, desktops, switches, wireless access points and routers. It also discusses options for sharing files and other resources like printers for small business networks using Windows HomeGroups, Windows domains, Linux, and network attached storage devices.
The document provides an overview of network reference models and standards, specifically explaining the OSI reference model and IEEE 802 networking model. The OSI model is a seven-layer framework for networking that separates functions into the physical, data link, network, transport, session, presentation, and application layers. The IEEE 802 standards define networking interfaces and cabling to ensure compatibility between devices.
The document discusses security threats to business networks and methods for ensuring continuity of operations. It covers topics such as risk assessment, preventing disruption through controls like antivirus software and redundancy, and developing disaster recovery plans. Effective security requires identifying valuable network assets, potential threats, and controls to mitigate risks from viruses, hacking, device failure and natural disasters. A risk assessment matches threats to controls through a control spreadsheet. Ensuring continuity involves both preventative controls and disaster recovery plans for restoring operations after an outage or disaster.
This document provides an overview of server management and administration topics, including:
1) Managing user and group accounts, including creating accounts in Windows domains and Linux. Groups are used to organize users and assign permissions.
2) Configuring storage and file systems, such as volumes, partitions, and different file system types (FAT, NTFS, Linux). Permissions are set on files, folders and shares to control access.
3) Monitoring system performance and reliability using tools in Windows Server like Event Viewer, Performance Monitor, and Windows System Resource Manager.
This document provides an overview of network protocols and the TCP/IP model. It describes the purpose of network protocols and the layered architecture of TCP/IP, with protocols operating at different layers to enable communication. The layers include the network access, internet, transport and application layers. Key protocols discussed include IP, ARP, ICMP, TCP and UDP, with explanations of their functions in routing packets, resolving addresses, error checking, and reliable vs. connectionless delivery.
This document provides an overview of key concepts in IT infrastructure architecture related to networking. It discusses the presentation and application layers, protocols like SSL/TLS, HTTP, and email protocols. It also covers infrastructure services like DHCP, DNS, NTP, and IPAM systems. Additionally, it summarizes network virtualization techniques like VLANs, VXLANs, virtual NICs, and virtual switches. Finally, it discusses software defined networking, network function virtualization, layered network topologies, spine-leaf architectures, network teaming, and the spanning tree protocol.
This chapter discusses network hardware in depth, including switches, routers, wireless access points, and network interface cards. It describes the operation and advanced features of switches, such as creating the switching table, frame forwarding methods, and features like VLANs and port security. For routers, it explains routing tables, routing protocols, and access control lists. It also covers wireless security options, advanced wireless settings, and bus and feature options for network interface cards.
The document provides an overview of chapter 1 in a networking essentials textbook. It covers basic computer components and operations, networking fundamentals such as packets and frames, and common network terms. The chapter objectives are listed and the presentation slides cover input/output components, storage, processing, how the operating system interfaces with hardware, and examples of local area networks, wide area networks, and internetworks.
This document discusses network media for wired and wireless networking. It describes the primary types of wired network media, including copper-based twisted-pair cable and fiber-optic cables. Characteristics like bandwidth, maximum segment length, interference susceptibility, cable grade, and cost are important criteria for choosing network media. The document focuses on unshielded twisted-pair cable, describing cable categories and components of a structured UTP cable plant.
This chapter discusses data communication networks and their components. It describes local area networks (LANs) that connect computers within an office and their typical components like switches, routers, and cables. Wide area networks (WANs) connect multiple LANs across large areas using technologies like leased lines, virtual private networks, and public switched data networks. The chapter also covers internet connectivity options like dial-up, DSL, and cable modems and how encryption works to secure network communications.
The document discusses troubleshooting and support for computer networks. It describes the benefits of documenting a network, including making equipment changes easier and aiding troubleshooting. It outlines the problem-solving process, including defining the problem, gathering information, considering causes, testing solutions, and preventing future issues. Common troubleshooting tools are also described, such as ping, trace route, network monitors, and cable testers.
A network connects computer systems together to share computing power and storage facilities. Computers connect through cables or phone lines and may be in the same building or across different locations. Common examples include computer networks in offices and the global Internet. Networks allow for sharing of resources like printers and files as well as easy communication. While they provide advantages, networks also involve costs and security risks. The document describes different types of computer networks including LANs, WANs, and MANs as well as various network topologies, hardware, software, and security measures used in computer networking.
Wide area networks connect local area networks over long distances using transmission technologies and devices. Common WAN connection methods include circuit-switched networks like ISDN, leased lines using T-carrier or SONET technologies, packet-switched networks like Frame Relay and ATM, and VPNs over the public Internet. Remote access allows connections from outside the LAN using dial-up, VPNs, or remote desktop applications. Cloud computing provides hosted applications, platforms, and infrastructure over the Internet on a pay-as-you-go basis.
This chapter discusses network security and introduces key concepts such as developing a network security policy, securing physical access to network equipment, and securing network data. It covers determining elements of a security policy, developing password requirements, restricting user access, implementing authentication and authorization, and using tools like encryption, firewalls, and virtual private networks to enhance security. The goal is to help readers understand how to secure a network from both physical and digital threats.
This document outlines the course DCN 330 which covers data communication and network interconnectivity, including distinguishing network devices, analyzing network designs, quality of service, cloud computing, and gaining hands-on experience through lectures, labs, and a course project using tools like Cisco Packet Tracer and lab equipment. Students will be evaluated through exams, quizzes, lab assignments, and a course project presentation and report.
This document provides an overview of network topologies and technologies. It describes common physical topologies including bus, star, ring, and point-to-point. Logical topologies determine how data travels between devices and can mimic the physical topology or operate differently using switches. Popular network technologies are also examined, particularly Ethernet, wireless LANs, and Token Ring. Ethernet remains the most widely used LAN technology and comes in various speeds and media types.
The sole purpose to study Enterprise Network is to create business simplicity across worldwide. The side arms of successful networking are scalability, robustness, fault identification, communication, modularity, security and maintaining privacy. The key for making a network is to provide the essential tools and techniques that will offer the quality of a private/public network.
As I discussed earlier the key purpose is to create business simplicity that means creating IT/Infrastructure simplicity across the cities where an Enterprise Network is connected. Obtaining success in failure/break-down conditions is the main purpose of a network. So to achieve that requirement network designing involves certain topologies, protocols, bandwidth allocation. Topology requirement can be described as maintaining two adjacent networks against any failure in a single link or node. Protocol requirement can be described as using dynamic/static routing protocol to provide routes must be congestion free in a network. Bandwidth allocation is needed to actively allocate extra bandwidth just to maintain the working condition in a network. Design and Modification criteria is all over handed to a person called Network Administrator, who maintains and solely responsible for anything(wanted or unwanted) happens in a network.
The document discusses computer networks and networking. It describes the advantages of networks such as resource sharing, high speed communication, and reliability. It discusses different network models including peer-to-peer and client-server models. It also covers network devices, operating systems, cabling standards, and network topologies.
Networking involves planning, implementing, configuring, monitoring and maintaining interconnected computers that communicate and share resources. The main types of networks are LANs (covering a small area like a building), WANs (spanning large areas like countries) and hybrid networks. Networks provide benefits like sharing information, hardware and software, but also have disadvantages like security issues, virus risks and high costs. Common network topologies include bus, star and ring configurations of connected devices. Wired media include twisted pair, coaxial and fiber optic cables, while wireless uses radio waves, microwaves or infrared signals without wires.
This document defines and compares the two major types of network operating systems (NOS): peer-to-peer and client/server. A NOS is an operating system designed to support sharing of resources like files, printers, and applications between computers in a network. In a peer-to-peer NOS, all computers have equal abilities to access shared resources without a central server. In a client/server NOS, functions are centralized on dedicated file servers that provide resources to individual workstations or clients. Examples of each type and their relative advantages and disadvantages are provided.
This document summarizes different network operating systems (NOS) including Microsoft Windows Server, Novell NetWare, UNIX/Linux, and Apple Mac. It describes key features of each like how Windows Server uses domains and trusts, how Novell NetWare uses its file system and directory services, how UNIX/Linux uses TCP/IP and X Windows, and how Apple Mac used AppleTalk and file/printer sharing between clients. The document also provides overviews of common server utilities, client applications, and networking models associated with each NOS.
This document discusses advanced networking devices and concepts. It covers four logical network topologies: client/server, peer-to-peer, virtual private network (VPN), and virtual local area network (VLAN). It also discusses trunking between switches and quality of service (QoS) policies for prioritizing network traffic. Home routers are highlighted as combining switch and router functionality into one advanced device that can operate at multiple layers of the OSI model.
This chapter discusses wide area network (WAN) architectures and technologies. It covers circuit-switched networks, dedicated-circuit networks, packet-switched networks, and virtual private networks. The key WAN technologies discussed include T-carrier services, SONET, Frame Relay, ATM, Ethernet services, MPLS, and various VPN types. The chapter also addresses best practices for WAN design and improving WAN performance.
The document discusses various network applications and their architectures. It begins by defining application architecture and describing host-based, client-based, and client-server architectures. It then examines specific applications like the World Wide Web, email, file transfer, videoconferencing and instant messaging. For each application it outlines how it works, common standards used, and examples. The document concludes by discussing implications for management.
Introduction to computer networking chapter 2binakasehun2026
This document provides an overview of computer networks, including their components, applications, types, and topologies. Key points:
- A computer network connects devices like computers and printers to share resources and exchange information. Nodes can be any device that can send or receive data.
- Networks provide advantages like resource sharing, information exchange via email/FTP, information sharing via web/internet, interaction via dynamic web pages, video conferences, and parallel computing.
- Networks are classified by geographical span (LAN, MAN, WAN), administration (private, public), and architecture (client-server, peer-to-peer). Common topologies include bus, star, ring, mesh, and hybrid combinations.
This document provides an overview of basic network concepts. It defines what a network is and describes the hardware and software used to build networks. It explains the roles of servers, workstations, and hosts and discusses peer-to-peer versus server-based networks. Specific network types like LANs, WANs, and MANs are defined. The document also covers topics like internet, intranet, and extranet applications as well as network topologies.
This document provides an overview of networking fundamentals including defining computer networks, types of networks like peer-to-peer and client/server, local and wide area networks, network interface cards, physical components like cabling and devices, and network architectures like Ethernet and Token Ring. Key points covered include how networks allow file sharing, printing, and communication between devices, examples of networking media and common devices, and standards for networking protocols and architectures.
The document discusses the Open Data Plane (ODP) project, which aims to create an open source framework for data plane applications. ODP provides a standardized API to enable networking applications across different architectures like ARM, Intel and PowerPC. It is based on the Event Machine model of work-driven processing. ODP implementations optimize the API for different hardware platforms while providing application portability. The project aims to support functions like dynamic load balancing, power management, and virtual switch integration.
A network operating system (NOS) is software that enhances a basic operating system with networking features to support workstations and PCs on a local area network. Examples include Novell Netware, Microsoft Windows Server, and Linux servers. A NOS provides features for security, file/print sharing, directories, and remote access. Common tasks involve user administration, backups, and security monitoring. A client accesses services from a server. Windows Server is designed for enterprise management while Linux servers offer flexibility and cost advantages. Peer-to-peer networks allow direct sharing while client/server uses centralized file servers.
The document is a chapter from a textbook on network administration. It discusses the key areas of network management, including organizing the management function, configuration management, performance and fault management, and end user support. Specifically, it covers integrating different network types, documenting hardware and software configurations, monitoring network performance and addressing faults through trouble tickets and logs, and collecting failure statistics. The goal is to ensure efficient network operations through proper planning, organization and issue resolution.
A network connects computers together to share resources like files, printers, and internet access. A local area network (LAN) connects computers within a small area like a school or office building, while a wide area network (WAN) connects computers further apart, such as the Internet. The Internet uses telecommunications links to connect networks globally and provides services like the World Wide Web, email, and file sharing. Cloud computing allows users to access powerful network resources over the Internet without having to set up their own local network hardware.
This document provides an overview of computer communication networks. It discusses what a computer network is, the advantages of computer networks like sharing resources and files, and the communication cycle involved. It also covers some key aspects of computer networks like performance, reliability, security, and the goals of sharing resources, high reliability, and cost savings. The document summarizes different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also discusses transmission modes in computer networks like simplex, half duplex, and full duplex modes.
This document provides an overview of a student project to build a network attached storage (NAS) device using a Raspberry Pi. It will use the OpenMediaVault operating system and include services like Docker and Portainer for container management. The project is being completed by three students - Arnab Majumdar, Subham Bharti, and Mohit Manu. They provide background on NAS systems and how the Raspberry Pi and OpenMediaVault can be used to create a simple and easy-to-use NAS solution.
The document discusses telecommunications and networking concepts including:
1. It defines networks and their value, identifies trends in telecommunications industries and technologies.
2. It explains components of telecommunications networks like hardware, software, and services. The concepts of client/server networking are also introduced.
3. Major developments in digital network technologies, internet networking, and wireless technologies are described. These trends have increased transmission speeds and network capacity.
This document summarizes key points from Chapter 1 of the Network+ Guide to Networks 6th Edition. It defines a network and the advantages of networking over stand-alone computing. It distinguishes between peer-to-peer and client/server networks and describes their characteristics. It also defines LANs, MANs and WANs and discusses common network services like file sharing, printing, and communications services.
The document provides an overview of computer networking basics including definitions, elements, and concepts. It discusses:
- The basic elements of computer networking including nodes, links, protocols, IP addresses, DNS, and firewalls.
- Network topologies like star, bus, ring, mesh and their advantages/disadvantages.
- Reference models including OSI model with its 7 layers and TCP/IP model with its 4 layers.
- Types of computer networks including LAN, MAN, WAN, VLAN, VPN, and PAN.
- Issues around networking standards and critiques of OSI and TCP/IP models.
This document provides a summary of general approaches to communication within a network, classifications of networks, and modern networking technologies. It discusses peer-to-peer and client-server models, defines local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also outlines current technologies including software defined networking, multi-cloud, edge computing, the internet of things, artificial intelligence, and 5G networks.
This document is a lecture on computer networks that covers network addressing basics like IP addresses, domain names, and public vs private IP addresses. It also defines different types of networks like local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs) based on geographical coverage size. Additionally, it describes two methods for managing LANs using workgroups and domains and provides examples of different network setups.
This document provides an overview of key concepts related to network organization, including different network topologies (star, ring, bus, tree, hybrid), types of networks (LAN, MAN, WAN, wireless LAN), and basic networking terminology such as nodes, hosts, and distributed operating systems. It describes common network configurations and components, such as bridges, gateways, and transmission media.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Ch06
1. Fundamentals of Business Data
Communications
11th Edition
Alan Dennis & Alexandra Durcikova
John Wiley & Sons, Inc
Dwayne Whitten, D.B.A
Mays Business School
Texas A&M University
Copyright 2011 John Wiley & Sons, Inc 6-1
2. Chapter 6
Wired and Wireless
Local Area Networks
Copyright 2011 John Wiley & Sons, Inc 6-2
3. Chapter 6: Outline
6.1 - Introduction
6.2 - LAN Components
6.3 - Wired Ethernet
6.4 - Wireless Ethernet
6.5 - Best Practice LAN design
6.6 - Improving LAN Performance
6.7 - Implications for Management
Copyright 2011 John Wiley & Sons, Inc 6-3
5. Why Use a LAN?
• Information sharing
– Having users access the same files, exchange
information via email, or use Internet
• Ex: single purchase order database accessed by all
users on the LAN
– Results in improved decision making
• Resource sharing
– Having hardware devices shared by all users
• Printers, Internet connections
– Having software packages shared by all users on a LAN
– Results in reduced cost
Copyright 2011 John Wiley & Sons, Inc 6-5
6. Sharing Software on a LAN
• Purchase software on a per seat basis
– Install software on a server for all to use
– No need to have a copy on every computer on the LAN
– Reduces cost
– Simplifies maintenance and upgrades
– Example
• LAN: a 30 client network
• Purchase only a 10-seat license for a software
program (instead of purchasing 30 copies of the
same program)
• Assumes that only 10 users would simultaneously
use the software
Copyright 2011 John Wiley & Sons, Inc 6-6
7. Sharing Software on a LAN
• LAN Metering
– Used to control the number of copies of
software used on a LAN
– Available for many software packages
– Keeps track of the users
– Prohibits using more copies of the package
than the licensed number
– Helps to minimize copyright violations
• 40% of software used in the world is illegal,
$40B loss
Copyright 2011 John Wiley & Sons, Inc 6-7
8. Dedicated Servers vs. Peer-to-Peer
• Dedicated server network
– A server is permanently assigned a specific task
– Most popular network type
• 90+% of all LANs
• Peer-to-peer network
– No dedicated servers used
– All computers act as both clients and servers
– Cheaper than dedicated, but less capability
Copyright 2011 John Wiley & Sons, Inc 6-8
9. Dedicated Server Networks
• Requires one or more dedicated computers
– Permanently assigned a specific task
– Enable users to share files, printers, etc.,
– May form a powerful enterprise network replacing
mainframes
– May form a server farm
– Runs a server network operating system (NOS)
• Windows Server 2003/8, Linux (Red Hat, CentOS)
– Also requires a special communication software to
enable communications with client computers
Copyright 2011 John Wiley & Sons, Inc 6-9
10. Types of Dedicated Servers
• Common Types:
– Web servers, e-mail servers, database servers
• Others
– File servers
• Allows many users to share the same files on a
common disk drive
• Typically with restricted access
– Print servers
• Handle print requests
• Could be a separate computer or a “black box”
Copyright 2011 John Wiley & Sons, Inc 6 - 10
11. Peer-to-Peer Networks
• More appropriate for small networks
• Advantage:
– Lower cost
• No dedicated server, generally the most expensive
network component
• Disadvantage:
– Generally slower than dedicated server networks
• Each computer may be in use as a client and a
server at the same time
– Difficult to manage
Copyright 2011 John Wiley & Sons, Inc 6 - 11
13. Network Interface Cards (NICs)
• Also called network cards and network adapters
• Contains physical and data link layer protocols
– Includes a unique data link layer address (called a MAC
address), placed in them by their manufacturer
– Includes a socket allowing computers to be connected
to the network
– Organizes data into frames and then sends them out on
the network
• Mostly built into motherboards today
• Can be plugged into the USB port
Copyright 2011 John Wiley & Sons, Inc 6 - 13
14. Network Circuits
• Used to connect a computer physically to the
network
• Types of cables
– Untwisted wire pairs (UTP) – leading LAN cable type
– Shielded twisted pair (STP)
– Optical fiber – high capacity, just beginning in LANs
Copyright 2011 John Wiley & Sons, Inc 6 - 14
15. Hubs & Switches
Functions:
1)Act as junction boxes, linking cables from several
computers on a network
1) Usually sold with
4, 8, 16 or 24 ports
2) May allow connection of more than one kind
of cabling, such as UTP and coax.
2)Repeat (reconstruct and strengthen) incoming
signals
– Important since all signals become weaker with
distance
– Extends the maximum LAN segment distance
Copyright 2011 John Wiley & Sons, Inc 6 - 15
17. Access Points
• APs are used instead of hubs/switches in
a wireless environment
• Act as a repeater
– They must be able to hear all computers on a
WLAN
Copyright 2011 John Wiley & Sons, Inc 6 - 17
19. Access Points
• Power over Ethernet (POE)
– Used to supply power to some APs
– No external power is needed
– Power flows over unused Cat5 wires
Copyright 2011 John Wiley & Sons, Inc 6 - 19
20. Antennas used in WLANs
• Omni directional antennas
– Transmit in all directions simultaneously
– Used on most WLANs
• Dipole antenna (rubber duck)
– Transmits in all direction (vertical, horizontal, up, down)
• Directional antennas
– Project signal only in one direction
• Focused area; stronger signal; farther ranges
– Most often used on inside of an exterior wall
• To reduce the security issue
– A potential problem with WLANs
– Antennas can be made from Pringles, etc. cans and are
called “Cantennas” (www.cantenna.com)
Copyright 2011 John Wiley & Sons, Inc 7 - 20
22. Network Operating Systems
• Software that controls the LAN
• Parts of NOS
– Server version of NOS
• Runs on the network servers
– Client version of NOS
• Runs on the client computers
• Directory Service
• Provide information about resources on the LAN
• Network Profiles
• Indicate the resources available in the network and
authorized users
Copyright 2011 John Wiley & Sons, Inc 6 - 22
23. NOS Server Software
• Enables servers to operate
– Handles all network functions
• Performs data link, network, and application layer
functions
– Acts as the application software by executing and
responding to the requests sent to them by clients
• Replaces the normal OS on the server
– Optimized to provide better performance and faster
response time (for its limited number of operations)
• Examples
– Microsoft Windows Server 2003/8
– Linux (Red Hat, Debian, etc)
Copyright 2011 John Wiley & Sons, Inc 6 - 23
24. NOS Client Software
• Provides data link and network layer
functions
• Interacts with application software and
computer’s own operating system
• Included in most OS packages such as
Windows XP and Vista
• Allows client to view and access available
network resources
Copyright 2011 John Wiley & Sons, Inc 6 - 24
25. NOS Directory Service
• Provides information about resources on the LAN
• Example is Active Directory Service (ADS) by
Microsoft
– ADS servers, or domain servers, act as Domain Name
Server (DNS)
• Resources organized into a tree, each branch contains
a domain (a group of resources)
– A domain has a server (domain controller)
» Responsible for resolving address information
(textual name of resource network address)
» Responsible for managing authorization
• A tree can be linked to other trees creating “forest”
– Uses Lightweight Directory Service Protocol (LDAP) to
interact with client computers
Copyright 2011 John Wiley & Sons, Inc 6 - 25
26. Profiles
• Network Profiles
– Kept by servers
– Specify resources available for use by other computers
• Include data files, printers, etc.
– Configured when the LAN is established, and updated
• User profiles
– One profile for each user, used for security reasons
– Describe what each user on a LAN has access to
– Includes access codes assigned to devices and users
• Only the user with a correct code can use a specific
device
Copyright 2011 John Wiley & Sons, Inc 6 - 26
27. 6.3 Wired Ethernet
• Used by almost all LANs today
• Originally developed by a consortium of
Digital Equipment Corp., Intel and Xerox
• Standardized as IEEE 802.3
• Types of Ethernet
– Shared Ethernet
• Uses hubs
– Switched Ethernet
• Uses switches
Copyright 2011 John Wiley & Sons, Inc 6 - 27
28. Topology
• Basic geometric layout of the network
– The way computers on the network
interconnected
• Logical Topology
– How the network works conceptually
– Like a logical data flow diagram (DFD) or
– Like a logical entity relation diagram (ERD)
• Physical Topology
– How the network is physically installed
– Like physical DFD or physical ERD
Copyright 2011 John Wiley & Sons, Inc 6 - 28
29. Shared Ethernet’s Logical Topology
• Viewed logically as a bus topology
• All messages from any computer flow onto the
central cable (bus)
• A computer receive messages from all other
computers, whether the message is intended for it
or not
• When a frame is received by a computer, the first
task is to read the frame’s destination address to
see if the message is meant for it or not
Copyright 2011 John Wiley & Sons, Inc 6 - 29
32. Switched Ethernet Topology
• Uses workgroup switches
– Designed to support a small set
of computers (16 to 24) in one LAN
– Looks similar to a hub, but very different inside
– Designed to support a group of point-to-point circuits
• No sharing of circuits
• Logical and physical topology of the network
becomes a star topology via switch
• Switch reads destination address of the frame
and only sends it to the corresponding port
– While a hub broadcasts frames to all ports
Copyright 2011 John Wiley & Sons, Inc 6 - 32
33. Forwarding Tables
• Similar to routing tables
• Lists the Ethernet address of computers
connected to each port
• When a frame is received, the switch
reads its Layer 2 data link layer
destination address and sends the frame
out of the corresponding port in its
forwarding table.
Copyright 2011 John Wiley & Sons, Inc 6 - 33
34. Basic Switch Operation
Forwarding Table
MAC Port
Layer 2
Port 1
Po 00-22-69-13-EA-3E 1
Port 3
2 rt
rt 4 00-22-69-13-EA-3A 2
00-22-69-13-EA-3E Po 00-22-69-13-EA-01 3
00-22-69-13-EA-6C 4
00-22-69-13-EA-3A 00-22-69-13-EA-6C
00-22-69-13-EA-01
Copyright 2011 John Wiley & Sons, Inc 6 - 34
35. Learning Switch Operation
• Switch starts by working like a simple hub
Forwarding Table
– With an empty forwarding table
MAC Port
• It gradually fills its forwarding 00-22-69-13-EA-3E 1
table by learning about the 00-22-69-13-EA-3A 2
00-22-69-13-EA-01 3
nodes 00-22-69-13-EA-6C 4
– Reads the source MAC address of the incoming frame
and records it to the corresponding port number
– Reads the destination MAC address. If not in the Table
then it broadcasts the frame to all ports
– Waits for the destination computers to respond, and
repeats the first step
Copyright 2011 John Wiley & Sons, Inc 6 - 35
36. Modes of Switch Operations
1. Cut through switching
– Reads destination address and starts transmitting without
waiting for the entire message to be received
– Low latency; but may waste capacity (errored messages)
– Only on the same speed incoming and outgoing circuits
1. Store and forward switching
– Waits until the entire frame is received, perform error control,
and then transmit it
– Less wasted capacity; slower network
– Circuit speeds may be different
1. Fragment free switching
– Reads the first 64 bytes (contains the header)
– Performs error checking; if it is OK then begins transmitting
– It is a compromise between previous two modes
Copyright 2011 John Wiley & Sons, Inc 6 - 36
37. Media Access Control (MAC)
with Shared Ethernet
• Uses a contention-based protocol called
CSMA/CD (Carrier Sense Multiple Access /
Collision Detect)
• Frames can be sent by two computers on
the same network at the same time
• They will collide and destroy each other
• Can be termed as “ordered chaos”
• Tolerates, rather than avoids, collisions
Copyright 2011 John Wiley & Sons, Inc 6 - 37
38. CSMA/CD
• Carrier Sense (CS):
– A computer listens to the bus to determine if another
computer is transmitting before sending anything
– Transmit when no other computer is transmitting
• Multiple Access (MA):
– All computers have access to the network medium
• Collision Detect (CD):
– Declared when any signal other than its own detected
– If a collision is detected
• To avoid a collision, both wait a random amount of
time and then resend message
Copyright 2011 John Wiley & Sons, Inc 6 - 38
39. Media Access Control (MAC)
with Switched Ethernet
• Each circuit shared by a computer and the switch
• Still uses CSMA/CD media access control
– Each device (computer or switch) listens before
transmitting
• Multiple messages can be sent at the same time.
– Computer A can send a message to computer B at the
same time that computer C sends one to computer D
– Two computers send frames to the same destination at
the same time
– Switch stores the second frame in memory until it
finishes sending the first, then forwards the second
Copyright 2011 John Wiley & Sons, Inc 6 - 39
40. Performance Comparison
Capable of using about only Runs at up to 95% capacity on
50% of capacity (10BaseT) 100Base-T
before collisions become a
problem
Copyright 2011 John Wiley & Sons, Inc 6 - 40
41. Twisted Pair Ethernets
• 10Base-T
– Uses Cat 3 and Cat 5 UTP, very inexpensive
– Runs up to 100 meters
– Rapidly losing ground to 100Base-T
• 100Base-T
– Uses Cat 5 UTP
– Also called Fast Ethernet, replaced 10Base-T in sales
volume
– More common format today
• Combined 10/100 Ethernet
– Some segments run 10Base-T and some run 100Base-T
Copyright 2011 John Wiley & Sons, Inc 6 - 41
42. Fiber Optic based Ethernets
• 1000Base-T (1 GbE)
– Gigabit Ethernet.
– Maximum cable length is only 100 m for UTP cat5
– Fiber Optic based (1000Base-LX) runs up to 440 meters
• 1000Base-F
– 1 Gbps fiber
• 10 GbE
– 10 Gbps Ethernet. Uses fiber and is typically full duplex
• 40 GbE
– 40 Gbps Ethernet. Uses fiber and is typically full duplex.
Copyright 2011 John Wiley & Sons, Inc 6 - 42
43. Summary - Ethernet Media Types
Copyright 2011 John Wiley & Sons, Inc 6 - 43
44. 6.4 Wireless Ethernet
• Use radio frequencies to transmit signals through
the air (instead of cables)
– 802.1x family of standards (aka, Wi-Fi)
• Wi-Fi grown in popularity
– Eliminates cabling
– Facilitates network access from a variety of locations
– Facilitates for mobile workers (as in a hospital)
– Used in 90 percent of companies
Copyright 2011 John Wiley & Sons, Inc 7 - 44
45. WLAN Topology
Same as Ethernet
• Physical star
• Logical bus
Copyright 2011 John Wiley & Sons, Inc 7 - 45
46. WLAN Media Access Control
• Uses CSMA/CA
– CA collision avoidance
– A station waits until another station is finished
transmitting plus an additional random period of time
before sending anything
Copyright 2011 John Wiley & Sons, Inc 7 - 46
47. Association with an AP
• Scanning- searching for available Aps
• Two types
– Active
• NIC transmits probe frame on all active
channels
• AP responds with info to associate with it
– Passive
• NIC listens on all channel for beacon frame
• NIC can use info in beacon frame to
associate with AP
Copyright 2011 John Wiley & Sons, Inc 6 - 47
48. MAC Techniques
• May use two MAC techniques simultaneously
– Distributed Coordination Function (DCF)
• Also called “Physical Carrier Sense Method”
– Point Coordination Function (PCF)
• Also called “Virtual Carrier Sense Method”
• Optional: (can be set as “always”, “never”, or “just
for certain frame sizes”)
Copyright 2011 John Wiley & Sons, Inc 6 - 48
49. Distributed Coordination Function
• Relies on the ability of computers to physically
listen before they transmit
– When a node wants to send a message:
• First listens to make sure that the transmitting node
has finished, then
• Waits a period of time longer
• Each frame is sent using stop-and-wait ARQ
– By waiting, the listening node can detect that the
sending node has finished and
– Can then begin sending its transmission
– ACK/NAK sent a short time after a frame is received,
– Message frames are sent a somewhat longer time after
(ensuring that no collision will occur)
Copyright 2011 John Wiley & Sons, Inc 7 - 49
50. Point Coordination Function
• Solves Hidden Node problem
– Two computers can not detect each other’s signals
• A computer is near the transmission limits of the AP
at one end and another computer is near the
transmission limits at the other end of the AP’s
range
– Physical carrier sense method will not work
• Solution
– First send a Request To Send (RTS) signal to the AP
• Request to reserve the circuit and duration
– AP responds with a Clear To Send (CTS) signal,
• Also indicates duration that the channel is reserved
– Computer wishing to send begins transmitting
Copyright 2011 John Wiley & Sons, Inc 7 - 50
51. Wireless Ethernet Frame Layout
• Add Figure 6.7
• Two major differences between 802.3 and
802.11
– .11 frame has 4 address fields
– .11 has new field for sequence control
• Indicates how large frame is fragmented
– Wired networks – segmentation at transport layer
– Wireless- at data link layer
Copyright 2011 John Wiley & Sons, Inc 6 - 51
52. WLAN Characteristics
• Two frequency ranges
– 2.4 GHz
– 5 GHz
• Distance range of 100-150 meters
• Channels are used to reduce interference
Copyright 2011 John Wiley & Sons, Inc 6 - 52
53. Types of Wireless Ethernet
Channels Max Max range
bandwidth
802.11a 8 54 Mbps 50 meters Legacy
802.11b 3 11 Mbps 150 meters Legacy
802.11g 3 54 Mbps 150 meters Legacy
3 -or- 200 Mbps -or- Latest
802.11n 1 600 Mbps 150 meters version
Copyright 2011 John Wiley & Sons, Inc 6 - 53
54. IEEE 802.11n
• Backward compatible with a, b, and g
• Disadvantage: one laptop using a, b, or g
slows down access by all other laptops
(even when they are using n)
Copyright 2011 John Wiley & Sons, Inc 7 - 54
55. WLAN Security
• Especially important for wireless network
– Anyone within the range can use the WLAN
• Finding a WLAN
– Move around with WLAN equipped device and
try to pick up the signal
– Use special purpose software tools to learn
about WLAN you discovered
• Wardriving – this type reconnaissance
• Warchalking – writing symbols on walls to
indicate presence of an unsecure WLAN
Copyright 2011 John Wiley & Sons, Inc 7 - 55
56. Types of WLAN Security
• Service Set Identifier (SSID)
– Required by all clients to include this in every packet
– Included as plain text Easy to break
• Wired Equivalent Privacy (WEP)
– Requires that user enter a key manually (to NIC and AP)
– Communications encrypted using this key
– Short key (40-128 bits) Easy to break by “brute force”
• Extensible Authentication Protocol (EAP)
– One time WEP keys created dynamically after login
– Requires a login (with password) to a server
Copyright 2011 John Wiley & Sons, Inc 7 - 56
57. Types of WLAN Security, cont’d
• Wi-Fi Protected Access (WPA)
– new standard
– longer key, changed for every packet
• 802.11i (WPA2)
– EAP login used to get session key
– uses AES encryption
• MAC address filtering
– Allows computers to connect to AP only if
their MAC address is entered in the “accepted”
list
Copyright 2011 John Wiley & Sons, Inc 7 - 57
58. 6.5 The Best Practice LAN Design
• Recently costs have dropped while
speeds have increased
• WI-FI rates approaching that of wired
• WI-FI cheaper b/c of no wires to install
– $150-400 per wire in retrofitted building
– $50-$100 per wire in new building
• Best practice today: Wired Ethernet for
primary LAN and WI-FI as overlay
Copyright 2011 John Wiley & Sons, Inc 6 - 58
59. Best Practice Recommendations:
Wired
• Switched 100Base-T over Cat5e
– Relatively low cost and fast
• Category 5e cables
– Costs decreasing
– Provides room for upgrades to 100Base-T or 1000Base-T
Copyright 2011 John Wiley & Sons, Inc 6 - 59
60. Best Practice Recommendations:
Wireless
• Pick newest one, cost permitting
– 802.11n (in 2011)
• Placement of APs should be considered
Copyright 2011 John Wiley & Sons, Inc 6 - 60
61. Physical WLAN Design
• More challenging than designing a traditional LAN
– Use a temporary AP and laptop to evaluate placement of
APs
– Locations are chosen to provide coverage as well as to
minimize potential interference
• Begin design with a site survey, used to determine:
– Feasibility of desired coverage
• Measuring the signal strength from temporary APs
– Potential sources of interference
• Most common source: Number and type of walls
– Locations of wired LAN and power sources
– Estimate of number of APs required
Copyright 2011 John Wiley & Sons, Inc 7 - 61
62. Physical WLAN Design
• Begin locating APs
– Place an AP in one corner
– Move around measuring the signal strength
– Place another AP to the farthest point of coverage
• AP may be moved around to find best possible spot
• Also depends on environment and type of antenna
– Repeat these steps several times until the corners are
covered
– Then begin the empty coverage areas in the middle
• Allow about 15% overlap in coverage between APs
– To provide smooth and transparent roaming
• Set each AP to transmit on a different channel
Copyright 2011 John Wiley & Sons, Inc 7 - 62
68. Multistory WLAN Design
• Must include
– Usual horizontal mapping, and
– Vertical mapping to minimize interference from APs on
different floors
Copyright 2011 John Wiley & Sons, Inc 7 - 68
69. Designing for SOHO Environments
• Small Office / Home Office
• Typically use AP, switch, and router
– -or- cable modem and wireless router
– -or- all could be in one device
Copyright 2011 John Wiley & Sons, Inc 6 - 69
70. Designing for SOHO Environments
Copyright 2011 John Wiley & Sons, Inc 6 - 70
71. 6.6 Improving LAN Performance
• Throughput:
– Used often as a measure of LAN performance
– Total amount of user data transmitted in a given period
of time
• To improve throughput and LAN performance,
identify and eliminate bottlenecks
– Bottlenecks are points in the network where congestion
is occurring
– Congestion is when the network or device can’t handle
all of the demand it is experiencing
Copyright 2011 John Wiley & Sons, Inc 6 - 71
72. Identifying Network Bottlenecks
• Potential places are server vs. circuit
– Network server
– Network circuit (especially LAN-BN connection)
– Client’s computer (highly unlikely, unless too old)
• How to find it
– Check the server utilization during poor performance
• If high >60%, then the server is the bottleneck
• If low <40%, then the network circuit is the
bottleneck
• If between 40% - 60%, both the server and circuits
are the bottlenecks
Copyright 2011 John Wiley & Sons, Inc 6 - 72
73. Improving Server Performance
• Software improvements
– Choose a faster NOS
– Fine tune network and NOS parameters such as
• Amount of memory used for disk cache
• Number of simultaneously open files
• Amount of buffer space
• Hardware improvements
– Add a second server
– Upgrade the server’s CPU
– Increase its memory space
– Add more hard disks
– Add a second NIC to the server
Copyright 2011 John Wiley & Sons, Inc 6 - 73
74. Improving Disk Drive Performance
• Especially important, since disk reads are
the slowest task the server needs to do
• Consider Redundant Array of Inexpensive
Disks (RAID)
– Replacing one large drive with many small
ones
– Can be used to both improve performance and
increase reliability
– Building redundancy into the hard drives so
drive failure does not result in any loss of data
Copyright 2011 John Wiley & Sons, Inc 6 - 74
75. Improving Circuit Capacity
• Upgrade to a faster protocol
– Means upgrading the NICs and possible cables
– Examples:
• Upgrading the network from 100Base-T to 1000Base-T
• Upgrading the segment to the server from 100Base-T to
1000Base-T
• Increase number of circuits
– Network segmentation
• Wired
– Add NICs to server that connect to multiple switches
• Wireless
– Add more APs on different channels
Copyright 2011 John Wiley & Sons, Inc 6 - 75
77. Reducing Network Demand
• Move files to client computers
– Such as heavily used software packages
• Encourage balancing of wired and wireless
network usage by users
• Move user demands to off peak times
– Encourage users to not use the network as heavily
during peak usage times such as early morning or after
lunch
– Delay some network intensive jobs to off-peak times,
such as run heavy printing jobs at night
Copyright 2011 John Wiley & Sons, Inc 6 - 77
78. 6.7 Implications for Management
• Cost of LAN equipment dropping quickly
– Commodity market
• Flood of vendors into the market
• Varying quality of products
– Hard to justify the purchase of high quality LAN
equipment with cheap alternatives
• Wired Ethernet now a legacy technology
– Few new products developed for it so prices increasing
– Move towards wireless
Copyright 2011 John Wiley & Sons, Inc 6 - 78
79. Copyright 2011 John Wiley & Sons, Inc.
All rights reserved. Reproduction or translation of
this work beyond that permitted in section 117 of
the 1976 United States Copyright Act without
express permission of the copyright owner is
unlawful. Request for further information should
be addressed to the Permissions Department,
John Wiley & Sons, Inc. The purchaser may make
back-up copies for his/her own use only and not
for distribution or resale. The Publisher assumes
no responsibility for errors, omissions, or
damages caused by the use of these programs or
from the use of the information herein.
Copyright 2011 John Wiley & Sons, Inc 6 - 79