This document is a module on data communication and networking topics. It contains lessons on Fiber Distributed Data Interface (FDDI) and Gigabit Ethernet. FDDI uses a dual-ring fiber optic topology to provide high bandwidth networking at 100 Mbps over long distances. It defines connection types for different devices. While FDDI is fast and reliable, its use of expensive fiber optic cable is limiting. Gigabit Ethernet improved data rates to 1 Gbps using twisted pair copper cabling, addressing cost limitations of fiber. The module provides learning objectives, directions for use, and activities to help students understand key concepts related to FDDI and high-speed network technologies.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
(1) Fiber Distributed Data Interface (FDDI) is a 100 megabit per second optical networking standard that can connect local area networks over distances up to 200 kilometers. It uses a ring-based token network topology derived from token bus protocols.
(2) FDDI networks can support thousands of users over large geographic areas using optical fiber as the underlying medium. It offers dual-attached station and single-attached station topologies.
(3) An FDDI network contains two counter-rotating rings, with one as a backup, to provide redundancy. The dual rings can extend the maximum distance to 100 km while a single ring provides up to 200 megabits per second capacity.
Provides the basic information about what is a fiber, how can it be used for transmission, features, types, applications, advantages over other medium of transfer and so on. This can be used by beginners for their seminar presentation.
The document provides information about Arjun, Rahul, Sheeba, and Tushar's internship experience at ONGC, including examining the servers and network devices at the ONGC server room in Telbhawan. It describes ONGC as India's largest oil and gas exploration company. It also discusses different networking topics like modems, FDDI, Ethernet, network topologies, network interface cards, and types of networks like LAN, WAN, MAN, and wireless networks.
This document provides an overview of computer networks. It discusses how computer networks allow independent computers to connect and share data. It then covers some history around the development of computer systems and how networking improved cost efficiency by allowing smaller, less expensive computers and centralized systems to connect. The document discusses advantages of computer networks like resource sharing, reliability, and improved communications. It also covers common networking concepts, components of networks like media and protocols, and models like OSI and TCP/IP.
Here are some key advantages and disadvantages of network virtualization:
Advantages:
- Increased flexibility and agility. Virtual networks can be quickly created and configured on demand. This allows for rapid provisioning of test/development environments and easier configuration changes.
- Improved resource utilization. Virtualization allows multiple virtual networks to utilize the same physical networking hardware, improving overall utilization of switches, routers, and other devices.
- Simplified management. Virtual networks can be centrally managed as logical entities rather than individual physical devices, reducing management overhead.
- Enhanced availability. Virtual networks and workloads can be live migrated in case of hardware failures to ensure continuity of operations.
Disadvantages:
- Performance
This document provides an overview of high speed backbone network design and routing. It discusses key elements of backbone networks including fiber optics, layer 2 and 3 switches, dense wavelength division multiplexing (DWDM), quality of service measures, and resilience. Fiber optic cables provide benefits like high bandwidth, low loss, and security. Layer 2 switches operate at the data link layer, while layer 3 switches perform both layer 2 and layer 3 functions for improved performance. DWDM combines multiple light wavelengths on a single fiber to increase bandwidth. Quality of service and resilience features ensure high throughput and network stability.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
(1) Fiber Distributed Data Interface (FDDI) is a 100 megabit per second optical networking standard that can connect local area networks over distances up to 200 kilometers. It uses a ring-based token network topology derived from token bus protocols.
(2) FDDI networks can support thousands of users over large geographic areas using optical fiber as the underlying medium. It offers dual-attached station and single-attached station topologies.
(3) An FDDI network contains two counter-rotating rings, with one as a backup, to provide redundancy. The dual rings can extend the maximum distance to 100 km while a single ring provides up to 200 megabits per second capacity.
Provides the basic information about what is a fiber, how can it be used for transmission, features, types, applications, advantages over other medium of transfer and so on. This can be used by beginners for their seminar presentation.
The document provides information about Arjun, Rahul, Sheeba, and Tushar's internship experience at ONGC, including examining the servers and network devices at the ONGC server room in Telbhawan. It describes ONGC as India's largest oil and gas exploration company. It also discusses different networking topics like modems, FDDI, Ethernet, network topologies, network interface cards, and types of networks like LAN, WAN, MAN, and wireless networks.
This document provides an overview of computer networks. It discusses how computer networks allow independent computers to connect and share data. It then covers some history around the development of computer systems and how networking improved cost efficiency by allowing smaller, less expensive computers and centralized systems to connect. The document discusses advantages of computer networks like resource sharing, reliability, and improved communications. It also covers common networking concepts, components of networks like media and protocols, and models like OSI and TCP/IP.
Here are some key advantages and disadvantages of network virtualization:
Advantages:
- Increased flexibility and agility. Virtual networks can be quickly created and configured on demand. This allows for rapid provisioning of test/development environments and easier configuration changes.
- Improved resource utilization. Virtualization allows multiple virtual networks to utilize the same physical networking hardware, improving overall utilization of switches, routers, and other devices.
- Simplified management. Virtual networks can be centrally managed as logical entities rather than individual physical devices, reducing management overhead.
- Enhanced availability. Virtual networks and workloads can be live migrated in case of hardware failures to ensure continuity of operations.
Disadvantages:
- Performance
This document provides an overview of high speed backbone network design and routing. It discusses key elements of backbone networks including fiber optics, layer 2 and 3 switches, dense wavelength division multiplexing (DWDM), quality of service measures, and resilience. Fiber optic cables provide benefits like high bandwidth, low loss, and security. Layer 2 switches operate at the data link layer, while layer 3 switches perform both layer 2 and layer 3 functions for improved performance. DWDM combines multiple light wavelengths on a single fiber to increase bandwidth. Quality of service and resilience features ensure high throughput and network stability.
This document is a laboratory manual for a Computer Networking lab course. It outlines 12 experiments for students to complete over the course of the semester related to networking concepts. The first experiment involves setting up a wired local area network (LAN) using a layer 2 switch and then an IP switch to connect a minimum of four computers. It includes preparing and testing cables, configuring machines with IP addresses, and using ping and Wireshark to test connectivity. The second experiment extends the first to implement the LAN wirelessly using an access point.
This document is a training report submitted by Ambrish Kumar Shukla to Krishna Institute of Engineering & Technology in September 2013. It provides an acknowledgement thanking his training guide Pratibha Gupta and the employees of ALTTC for organizing the vocational training program. It then outlines the objectives and scope of the training, which was to learn about various technical areas of telecommunications including fundamentals, broadband, GSM, CDMA, satellite communications and more. The report includes a table of contents covering topics like broadband, WiMAX, power line communication, free space optics, GSM and CDMA.
This document contains a series of questions and answers related to computer networking and communication technologies. It begins with 26 very short answer questions testing knowledge of topics like domain names, web hosting, packet vs message switching, protocols, cloud computing, Wi-Fi characteristics, mobile technologies, and network topologies. It then includes 17 short answer questions requiring 1-2 sentences, and 12 short answer questions requiring more explanation. The questions cover additional topics such as network cable types, IP addresses, HTTP, cookies, spam, and cyber crimes.
The document discusses various WAN technologies including the public switched telephone network (PSTN), broadband cable, and fiber. The PSTN can carry analog traffic via dial-up or digital traffic through technologies like ISDN and DSL. Broadband cable delivers voice, data, and television over the same connection to customers, with the signal being formatted at the headend and distributed through a shared network. Fiber uses light transmission over optic cables for high bandwidth and is capable of multiple gigabit transmission levels using standards like SONET and DWDM/CWDM multiplexing.
The document discusses optimizing different bands used in geostationary satellite internet, including the Ka band, Ku band, and L band. It explains that these bands can be optimized by utilizing bandwidth more efficiently, increasing the power of signals, and improving data transmission quality. It also discusses the current speeds of geostationary satellite internet provided on airlines and how portability has increased for users through technological advances.
This document provides an introduction to building a small wireless local area network (WLAN). It discusses different wireless technologies including wireless personal area networks (WPAN), WLANs, wireless metropolitan area networks (WMAN), and wireless wide area networks (WWAN). It focuses on WLAN standards including IEEE 802.11 protocols, network architectures, security aspects, advantages and disadvantages of wireless networks, and applications. The goal is to help readers understand architectural differences between wireless networks and how to build a small WLAN.
This workshop is a practical workshop devoted to two days of hands-on faultfinding and troubleshooting. After an initial familiarisation session on industrial Ethernet and TCP/IP the two days is devoted to practical hands-on exercises. The workshop has been structured to cover key issues in troubleshooting TCP/IP and Ethernet in detail, while going through the practical implementation of TCP/IP in office and industrial networks and the practical use of the Internet and Intranets. Troubleshooting and maintenance of TCP/IP networks and communication systems in an office and industrial environment are also covered.
15 practical mini-sessions expose you to typical problems that could occur with industrial Ethernet and TCP/IP networks and shows you how to fix them. Most of each day comprises practical sessions with a modicum of discussion to explain the key points. There will be a minimum of two people to a PC so that the practical component will be emphasised. At the end of this workshop you will walk away with a solid knowledge on troubleshooting industrial Ethernet and TCP/IP networks.
MORE INFORMATION: http://www.idc-online.com/content/troubleshooting-industrial-ethernet-tcpip-networks-26
Twisted copper or fiber optic cabling for the data centerAngelina Li
When planning for a long-term cabling solution for your data center, it is important to consider future transmission speeds and the infrastructure to support them.
The transport layer is responsible for host-to-host communication and provides services like reliable data transfer, flow control, and multiplexing. Common transport layer protocols include TCP and UDP, which provide connection-oriented and connectionless services respectively, and help applications exchange data over network layers. The transport layer sits above the network layer and below the application layer in network stacks.
Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
This document provides an overview of Fiber Distributed Data Interface (FDDI), including its timeline, specifications, features, frame format, and applications. FDDI is a standard for transmitting data at up to 200 Mbps using optical fiber cables in a dual ring topology. It supports up to 1000 nodes within a range of 200 km. FDDI specifications include media access control, physical layer protocol, physical layer medium, and station management. Its benefits include high bandwidth and ability to connect over large distances with low noise interference.
The document provides information about computer networks and routing & switching certification (CCNA). It discusses TCIL-IT, a company that provides computer networking education and training. It then covers topics such as network design, types of networks, network topologies, networking devices, cables, IP addresses, and basic router configuration commands. The document is intended to provide an overview of concepts relevant to the CCNA certification program for computer networking.
This document provides an introduction to computer networks module. It begins by defining networks and listing the benefits of computer networks such as file sharing, sharing devices, sharing internet access, speed, cost, security, centralized software management, and electronic mail. It then identifies common network devices like hubs, network interface cards, routers, connectors, and modems. It also discusses different types of computer networks including local area networks (LAN), metropolitan area networks (MAN), and wide area networks (WAN). The document defines different network topologies such as star, ring, and bus networks. Finally, it covers current network technologies like Wi-Fi and Bluetooth. The overall goal of the module is for students to understand computer networks at a basic
Networks allow computers to connect and share resources. The document defines networks and their benefits, as well as the devices needed for networks. It describes different types of computer networks including LANs, MANs, and WANs. Network topologies like star, ring, and bus are also explained. Current networking technologies such as Wi-Fi and Bluetooth are discussed. The document is an introductory module on networks and aims to define key terms and concepts for students.
The document presents information on Fiber Distributed Data Interface (FDDI), including:
- FDDI is a standard developed by ANSI for transmitting data at up to 200 Mbps using optical fibers in a dual ring configuration for backup.
- FDDI specifications include the Media Access Control (MAC), Physical Layer Protocol (PHY), Physical Layer Medium (PMD), and Station Management (SMT) layers.
- FDDI supports up to 1000 nodes within a range of 200 km, using fiber optic or copper cabling, and a token passing protocol to control medium access and ensure fault tolerance.
Here are the key aspects of peer-to-peer system architecture:
1. Decentralized network with no central authoritative server. Peers are both suppliers and consumers of resources.
2. Dynamic membership - peers can join and leave the network at any time.
3. Self-organizing - peers must discover each other and organize routing/searches with no central coordination.
4. Distributed hash table (DHT) - peers store and retrieve data from each other based on file hash/attribute keys in a DHT overlay network.
5. Incentive mechanisms - some systems use incentives/credits to encourage sharing and prevent free-riding.
6. Caching/replication - popular content
This document summarizes different types of computer networks. It discusses local area networks (LANs) that connect devices within a small geographic area like a home or office. Metropolitan area networks (MANs) interconnect LANs within a larger region like a city. Wide area networks (WANs) connect LANs across national and international locations using technologies like fiber optics, radio waves, and satellites. The document also describes wired and wireless connection methods, client-server and peer-to-peer network functionality, common network topologies like bus, star and ring, and protocols such as TCP/IP, IPX/SPX, and AppleTalk.
This document is a laboratory manual for a Computer Networking lab course. It outlines 12 experiments for students to complete over the course of the semester related to networking concepts. The first experiment involves setting up a wired local area network (LAN) using a layer 2 switch and then an IP switch to connect a minimum of four computers. It includes preparing and testing cables, configuring machines with IP addresses, and using ping and Wireshark to test connectivity. The second experiment extends the first to implement the LAN wirelessly using an access point.
This document is a training report submitted by Ambrish Kumar Shukla to Krishna Institute of Engineering & Technology in September 2013. It provides an acknowledgement thanking his training guide Pratibha Gupta and the employees of ALTTC for organizing the vocational training program. It then outlines the objectives and scope of the training, which was to learn about various technical areas of telecommunications including fundamentals, broadband, GSM, CDMA, satellite communications and more. The report includes a table of contents covering topics like broadband, WiMAX, power line communication, free space optics, GSM and CDMA.
This document contains a series of questions and answers related to computer networking and communication technologies. It begins with 26 very short answer questions testing knowledge of topics like domain names, web hosting, packet vs message switching, protocols, cloud computing, Wi-Fi characteristics, mobile technologies, and network topologies. It then includes 17 short answer questions requiring 1-2 sentences, and 12 short answer questions requiring more explanation. The questions cover additional topics such as network cable types, IP addresses, HTTP, cookies, spam, and cyber crimes.
The document discusses various WAN technologies including the public switched telephone network (PSTN), broadband cable, and fiber. The PSTN can carry analog traffic via dial-up or digital traffic through technologies like ISDN and DSL. Broadband cable delivers voice, data, and television over the same connection to customers, with the signal being formatted at the headend and distributed through a shared network. Fiber uses light transmission over optic cables for high bandwidth and is capable of multiple gigabit transmission levels using standards like SONET and DWDM/CWDM multiplexing.
The document discusses optimizing different bands used in geostationary satellite internet, including the Ka band, Ku band, and L band. It explains that these bands can be optimized by utilizing bandwidth more efficiently, increasing the power of signals, and improving data transmission quality. It also discusses the current speeds of geostationary satellite internet provided on airlines and how portability has increased for users through technological advances.
This document provides an introduction to building a small wireless local area network (WLAN). It discusses different wireless technologies including wireless personal area networks (WPAN), WLANs, wireless metropolitan area networks (WMAN), and wireless wide area networks (WWAN). It focuses on WLAN standards including IEEE 802.11 protocols, network architectures, security aspects, advantages and disadvantages of wireless networks, and applications. The goal is to help readers understand architectural differences between wireless networks and how to build a small WLAN.
This workshop is a practical workshop devoted to two days of hands-on faultfinding and troubleshooting. After an initial familiarisation session on industrial Ethernet and TCP/IP the two days is devoted to practical hands-on exercises. The workshop has been structured to cover key issues in troubleshooting TCP/IP and Ethernet in detail, while going through the practical implementation of TCP/IP in office and industrial networks and the practical use of the Internet and Intranets. Troubleshooting and maintenance of TCP/IP networks and communication systems in an office and industrial environment are also covered.
15 practical mini-sessions expose you to typical problems that could occur with industrial Ethernet and TCP/IP networks and shows you how to fix them. Most of each day comprises practical sessions with a modicum of discussion to explain the key points. There will be a minimum of two people to a PC so that the practical component will be emphasised. At the end of this workshop you will walk away with a solid knowledge on troubleshooting industrial Ethernet and TCP/IP networks.
MORE INFORMATION: http://www.idc-online.com/content/troubleshooting-industrial-ethernet-tcpip-networks-26
Twisted copper or fiber optic cabling for the data centerAngelina Li
When planning for a long-term cabling solution for your data center, it is important to consider future transmission speeds and the infrastructure to support them.
The transport layer is responsible for host-to-host communication and provides services like reliable data transfer, flow control, and multiplexing. Common transport layer protocols include TCP and UDP, which provide connection-oriented and connectionless services respectively, and help applications exchange data over network layers. The transport layer sits above the network layer and below the application layer in network stacks.
Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
This document provides an overview of Fiber Distributed Data Interface (FDDI), including its timeline, specifications, features, frame format, and applications. FDDI is a standard for transmitting data at up to 200 Mbps using optical fiber cables in a dual ring topology. It supports up to 1000 nodes within a range of 200 km. FDDI specifications include media access control, physical layer protocol, physical layer medium, and station management. Its benefits include high bandwidth and ability to connect over large distances with low noise interference.
The document provides information about computer networks and routing & switching certification (CCNA). It discusses TCIL-IT, a company that provides computer networking education and training. It then covers topics such as network design, types of networks, network topologies, networking devices, cables, IP addresses, and basic router configuration commands. The document is intended to provide an overview of concepts relevant to the CCNA certification program for computer networking.
This document provides an introduction to computer networks module. It begins by defining networks and listing the benefits of computer networks such as file sharing, sharing devices, sharing internet access, speed, cost, security, centralized software management, and electronic mail. It then identifies common network devices like hubs, network interface cards, routers, connectors, and modems. It also discusses different types of computer networks including local area networks (LAN), metropolitan area networks (MAN), and wide area networks (WAN). The document defines different network topologies such as star, ring, and bus networks. Finally, it covers current network technologies like Wi-Fi and Bluetooth. The overall goal of the module is for students to understand computer networks at a basic
Networks allow computers to connect and share resources. The document defines networks and their benefits, as well as the devices needed for networks. It describes different types of computer networks including LANs, MANs, and WANs. Network topologies like star, ring, and bus are also explained. Current networking technologies such as Wi-Fi and Bluetooth are discussed. The document is an introductory module on networks and aims to define key terms and concepts for students.
The document presents information on Fiber Distributed Data Interface (FDDI), including:
- FDDI is a standard developed by ANSI for transmitting data at up to 200 Mbps using optical fibers in a dual ring configuration for backup.
- FDDI specifications include the Media Access Control (MAC), Physical Layer Protocol (PHY), Physical Layer Medium (PMD), and Station Management (SMT) layers.
- FDDI supports up to 1000 nodes within a range of 200 km, using fiber optic or copper cabling, and a token passing protocol to control medium access and ensure fault tolerance.
Here are the key aspects of peer-to-peer system architecture:
1. Decentralized network with no central authoritative server. Peers are both suppliers and consumers of resources.
2. Dynamic membership - peers can join and leave the network at any time.
3. Self-organizing - peers must discover each other and organize routing/searches with no central coordination.
4. Distributed hash table (DHT) - peers store and retrieve data from each other based on file hash/attribute keys in a DHT overlay network.
5. Incentive mechanisms - some systems use incentives/credits to encourage sharing and prevent free-riding.
6. Caching/replication - popular content
This document summarizes different types of computer networks. It discusses local area networks (LANs) that connect devices within a small geographic area like a home or office. Metropolitan area networks (MANs) interconnect LANs within a larger region like a city. Wide area networks (WANs) connect LANs across national and international locations using technologies like fiber optics, radio waves, and satellites. The document also describes wired and wireless connection methods, client-server and peer-to-peer network functionality, common network topologies like bus, star and ring, and protocols such as TCP/IP, IPX/SPX, and AppleTalk.
Similar to data-communication-module-4-final.pdf (20)
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
1. Studocu is not sponsored or endorsed by any college or university
Data Communication Module 4 Final
Data Comm. & Networking I! (Negros Oriental State University)
Studocu is not sponsored or endorsed by any college or university
Data Communication Module 4 Final
Data Comm. & Networking I! (Negros Oriental State University)
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
2. D A T A
&
II.
III. Fiber Distributed Data Interface and
GigaBit Ethernet
Module 4
Fiber Distributed Data Interface and
Gigabit Ethernet
Introduction
Ethernet is a way of connecting computers together in a local area network
or LAN. It has been the most widely used method of linking computers
together in LANs since the 1990s. The basic idea of its design is that
multiple computers have access to it and can send data at any time. This
is comparatively easy to engineer.
COURSE LEARNING OUTCOMES
At the end the module, the students are expected to introduce the concepts
of Data Communication and networking:
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
3. CONTENTS OF THE MODULE
This module contains the following lessons:
Lesson 1 : Fiber Distributed Data Interface
Lesson 2 : Gigabit Ethernet
DIRECTIONS ON HOW TO USE THE MODULE PROPERLY
In order to benefit profoundly from this module, please be guided by all
the key points presented below.
1. This module contains two (2) lessons. Each lesson is explained
substantively.
Read the explanations thoroughly so that you could understand the lesson
fully.
2. Please use Microsoft Word Long Size for the answer and convert to
PDF. If you want to send your documents online, just send it to our Google
classroom account
Section B: class code: sa5aesv
E-mail: angelieaal1911@gmail.com
3. Feel free to chat, call, text or send an email message to me if you
have questions, reaction, reflections about the content or activities in the
module.
4. The deadline for the submission for this will be posted to our group
chat or google classroom.
LESSON 1
FIBER DISTRIBUTED DATA INTERFACE
Specific Learning Outcomes
At the end of this lesson, you should be able to:
● Understand the uses of FDDI
● Differentiate between different types of FDDI Architecture
● Signify the importance of Architecture of networking
ACTIVATING
Picture Interpretation Activity
Online Collaborative Work Activity
In no more than 3 sentences, give your interpretation in the picture below.
Your interpretation must consider the following questions:
Open your collaborative docs uploaded in the google classroom and
answer the questions online.
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
4. 1. What is the central message of
this picture?
Discussion
FDDI is an American National
Standards Institute (ANSI)
standard that defines a dual
Token Ring LAN operating at 100 Mbps over an optical fiber medium. It
is used primarily for corporate and carrier backbones.
Token Ring and FDDI share several characteristics including token passing
and a ring architecture which were explored in the previous section on
Token Ring. Copper Distributed Data Interface (CDDI) is the
implementation of FDDI protocols over STP and UTP cabling. CDDI
transmits over relatively short distances (about 100 meters), providing data
rates of 100 Mbps using a dual-ring architecture to provide redundancy.
While FDDI is fast, reliable, and handles a lot of data well, its major
problem is the use of expensive fiber-optic cable. CDDI addresses this
problem by using UTP or STP. However, notice that the maximum segment
length drops significantly.
FDDI was developed in the mid-1980s to fill the needs of growing high-
speed engineering workstation capacity and network reliability. Today,
FDDI is frequently used as a high-speed backbone technology because of
its support for high bandwidth and greater distances than copper.
FDDI Network Architecture FDDI uses a dual-ring architecture. Traffic on
each ring flows in opposite directions (called counter-rotating). The dual-
rings consist of a primary and a secondary ring. During normal operation,
the primary ring is used for data transmissions, and the secondary ring
remains idle. The primary purpose of the dual rings is to provide superior
reliability and robustness. One of the unique characteristics of FDDI is that
multiple ways exist to connect devices to the ring. FDDI defines three types
of devices: single-attachment station (SAS) such as PCs, dual attachment
station (DAS) such as routers and servers, and a concentrator.
– Dual-ring architecture
– Primary ring for data transmissions
– Secondary ring for reliability and robustness
Components
– Single attachment station (SAS)—PCs
– Dual attachment station (DAS)—Servers
– Concentrator
– FDDI concentrator
– Also called a dual-attached concentrator (DAC)
– Building block of an FDDI network
– Attaches directly to both rings and ensures that any SAS failure or power-down does
not bring down the ring
Summary – LAN technologies include Ethernet, Token Ring, and FDDI
Ethernet Most widely used Good balance between speed, cost, and ease of
installation 10 Mbps to 1000 Mbps Token Ring Primarily used with IBM
networks 4 Mbps to 16 Mbps FDDI Primarily used for corporate backbones
Supports longer distances 100 Mbps.
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
5. Reference
Source: https://e-tutes.com/lesson4/fiber-distributed-data-interface-fddi/
https://www.lifewire.com/definition-of-gigabit-ethernet-816338
Learning Activities / Exercises
1. Explain FDDI Network Architecture
FDDI is an American National Standards Institute (ANSI) standard that
defines a dual Token Ring LAN operating at 100 Mbps over an optical
fiber medium. It is used primarily for corporate and carrier backbones.
Token Ring and FDDI share several characteristics including token
passing and a ring architecture which were explored in the previous section
on Token Ring. Copper Distributed Data Interface (CDDI) is the
implementation of FDDI protocols over STP and UTP cabling. CDDI
transmits over relatively short distances (about 100 meters), providing data
rates of 100 Mbps using a dual-ring architecture to provide
redundancy. While FDDI is fast, reliable, and handles a lot of data well,
its major problem is the use of expensive fiber-optic cable. CDDI
addresses this problem by using UTP or STP. However, notice that the
maximum segment length drops significantly.
FDDI uses a dual-ring architecture. Traffic on each ring flows in
opposite directions (called counter-rotating). The dual-rings consist of a
primary and a secondary ring. During normal operation, the primary ring
is used for data transmissions, and the secondary ring remains idle. The
primary purpose of the dual rings is to provide superior reliability and
robustness.
An FDDI concentrator (also called a dual-attachment concentrator
[DAC]) is the building block of an FDDI network. It attaches directly to
both the primary and secondary rings and ensures that the failure or power-
down of any single attachment station (SAS) does not bring down the ring.
This is particularly useful when PCs, or similar devices that are frequently
powered on and off, connect to the ring.
Source: https://e-tutes.com/lesson4/fiber-distributed-data-interface-fddi/
Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO
standards for transmission of data in local area network (LAN) over fiber
optic cables. It is applicable in large LANs that can extend up to 200
kilometers in diameter.
2. Explain Fiber Distributed Data Interface (FDDI) and Copper
Distributed Data Interface (CDDI) uses
FDDI Network Architecture FDDI uses a dual-ring architecture.
Traffic on each ring flows in opposite directions (called counter-
rotating). The dual-rings consist of a primary and a secondary ring.
During normal operation, the primary ring is used for data
transmissions, and the secondary ring remains idle. The primary
purpose of the dual rings is to provide superior reliability and
robustness. One of the unique characteristics of FDDI is that multiple
ways exist to connect devices to the ring. FDDI defines three types of
devices: single-attachment station (SAS) such as PCs, dual attachment
station (DAS) such as routers and servers, and a concentrator.
FDDI uses optical fiber as the primary transmission medium, but
it also can run over copper cabling. As mentioned earlier, FDDI over
copper is referred to as Copper-Distributed Data Interface (CDDI).
Optical fiber has several advantages over copper media. In particular,
security, reliability, and performance all are enhanced with optical fiber
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
6. media because fiber does not emit electrical signals. A physical medium
that does emit electrical signals (copper) can be tapped and therefore
would permit unauthorized access to the data that is transiting the
medium. In addition, fiber is immune to electrical interference from
radio frequency interference (RFI) and electromagnetic interference
(EMI). Fiber historically has supported much higher bandwidth
(throughput potential) than copper, although recent technological
advances have made copper capable of transmitting at 100 Mbps.
Finally, FDDI allows two kilometers between stations using multi-
mode fiber, and even longer distances using a single mode.
Copper Distributed Data Interface (CDDI) is the implementation
of FDDI protocols over STP and UTP cabling. CDDI transmits over
relatively short distances (about 100 meters), providing data rates of
100 Mbps using a dual-ring architecture to provide redundancy.
Short for Copper Distributed Data Interface, CDDI is officially
called TP-PMD (Twisted-Pair Physical Medium Dependent) and is a data
transmission standard. CDDI uses either STP or UTP copper wire and
based on FDDI (Fiber Distributed Data Interface) which uses fiber optic
lines instead of copper wires.
Copper data distribution interface (CDDI) is an implementation of
fiber distributed data interface (FDDI) networking. CDDI supports
distances of about 100 meters from desktop to concentrator. CDDI is
defined by the ANSI X3T9.5 Committee. The CDDI standard is officially
named the Twisted-Pair Physical Medium Dependent (TP-PMD) standard.
It is also referred to as the Twisted-Pair Distributed Data Interface (TP-
DDI), consistent with the term Fiber-Distributed Data Interface (FDDI).
CDDI is consistent with the physical and media-access control layers
defined by the ANSI standard.
CDDI uses cabling, which is unshielded twisted pair cables (UTP)
made of copper. CDDI also uses the same protocols and constructs as
FDDI, but uses copper wire as the medium.
3. FDDI is an Example of which topology?
Yes, FDDI’s primary fault-tolerant feature is the dual ring. If a station on
the dual ring fails or is powered down, or if the cable is damaged, the dual
ring is automatically wrapped (doubled back onto itself) into a single ring.
When the ring is wrapped, the dual-ring topology becomes a single-ring
topology. Data continues to be transmitted on the FDDI ring without
performance impact during the wrap condition.
Fiber Distributed Data Interface (FDDI) is usually implemented as a dual
token-passing ring within a ring topology (for campus networks) or star
topology (within a building). The dual ring consists of a primary and
secondary ring. The primary ring carries data. The counter-rotating
secondary ring can carry data in the opposite direction, but is more
commonly reserved as a backup in case the primary ring goes down. This
provides FDDI with the degree of fault tolerance necessary for network
backbones. In the event of a failure on the primary ring, FDDI
automatically reconfigures itself to use the secondary ring as shown in the
illustration. Faults can be located and repaired using a fault isolation
technique called beaconing. However, the secondary ring can also be
configured for carrying data, extending the maximum potential bandwidth
to 200 Mbps.
Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO
standards for transmission of data in local area network (LAN) over fiber
optic cables. It is applicable in large LANs that can extend up to 200
kilometers in diameter.
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
7. 4. What are the main Characteristics of the FDDI?
FDDI share several characteristics including token passing and a ring
architecture which were explored in the previous section on Token Ring.
One of the unique characteristics of FDDI is that multiple ways exist to
connect devices to the ring. FDDI defines three types of devices: single-
attachment station (SAS) such as PCs, dual attachment station (DAS) such
as routers and servers, and a concentrator.
An analysis is made of the impact of various design decisions on the
error detection capability of the fiber distributed data interface (FDDI), a
100-Mb/s fiber-optic LAN standard being developed by the American
National Standards Institute (ANSI). In particular, the frame error rate,
token loss rate, and undetected error rate are quantified. Several
characteristics of the 32-b frame check sequence (FCS) polynomial, which
is also used in IEEE 802 LAN protocols, are discussed. The standard uses
a nonreturn to zero invert on ones (NRZI) signal encoding and a 4-b to 5-
b (4b/5b) symbol encoding in the physical layer. Due to the combination
of NRZI and 4b/5b encoding, many noise events are detected by code (or
symbol) violations. A large percentage of errors are detected by FCS
violations. The errors that escape these three violations remain undetected.
The probability of undetected errors due to creation of false starting
delimiters, false ending delimiters, or merging of two frames is analyzed.
It is shown that every noise event results in two code bit errors, which in
turn may result in up to four data bit errors. The FCS can detect up to two
noise events. Creation of a false starting delimiter or ending delimiter on a
symbol boundary also requires two noise events. This assumes enhanced
frame validity criteria. The author justifies the enhancements by
quantifying their effect. < >
5. What are the limitations that prevent the growth of FDDI?
CDDI transmits over relatively short distances (about 100 meters),
providing data rates of 100 Mbps using a dual-ring architecture to provide
redundancy. While FDDI is fast, reliable, and handles a lot of data well,
its major problem is the use of expensive fiber-optic cable. CDDI
addresses this problem by using UTP or STP. However, notice that the
maximum segment length drops significantly.
FDDI uses a dual-ring architecture. Traffic on each ring flows in opposite
directions (called counter-rotating). The dual-rings consist of a primary
and a secondary ring. During normal operation, the primary ring is used
for data transmissions, and the secondary ring remains idle. The primary
purpose of the dual rings is to provide superior reliability and robustness.
Assignment # 8:
1. Why is the fiber Channel spelled as “Fibre”?
There is no difference in meaning between fiber and fibre. Fiber is the
preferred spelling in American English, and fibre is preferred in all the
other main varieties of English.
Both spellings are many centuries old, and neither spelling was clearly
prevalent on either side of the Atlantic until the second half of the 18th
century. This was a period in which many British educators began to
consider it proper for English words of French and Latin origin to take their
more French and Latin forms rather than their more Anglicized
forms. Fibre is the French spelling of the word from which the English
word is derived, so it was promoted as the standard spelling despite its
being unphonetic. The belief that French and Latin should hold sway over
English never had much traction in the post-independence United States,
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
8. and while Americans also favored the French spelling through the 19th
century, the more phonetic fiber steadily gained ground through that
century until becoming the preferred form around 1910.
LESSON 2
GIGABIT ETHERNET
Specific Learning Outcomes
At the end of this lesson, you should be able to:
● Understand the how Ethernet work
● Differentiate the different connection type
● Signify the importance of Ethernet
What Is Gigabit Ethernet?
Gigabit Ethernet is part of the Ethernet family of computer networking
and communication standards. The Gigabit Ethernet standard supports
a theoretical maximum data rate of one gigabit per second (1,000
Mbps).
How Does Gigabit Ethernet Work?
It was once believed that achieving gigabit speeds with Ethernet would
require the use of fiber optic cables or other special network cable
technology. Fortunately, those are only necessary for long distances.
For most purposes, Gigabit Ethernet works well using a regular
Ethernet cable (specifically, the CAT5e and CAT6 cabling standards).
These cable types follow the 1000BASE-T cabling standard (also called
IEEE 802.3ab).
How Fast Is Gigabit Ethernet in Practice?
Because of factors like network protocol overhead and re-transmissions
due to collisions or other transient failures, devices cannot actually transfer
useful message data at the full 1 Gbps rate. Under normal conditions, the
effective data transfer might reach 900 Mbps, but the average connection
speed varies based on many factors.
For example, disk drives can limit the performance of a Gigabit Ethernet
connection on PCs. There's also the factor of bandwidth limiting the
connection. Even if a whole home network can get download speeds of 1
Gbps, two simultaneous connections immediately halve the available
bandwidth for both devices. The same is true for any number of concurrent
devices.
Some home routers with Gigabit Ethernet ports might have CPUs that
are unable to handle the load needed to support incoming or outgoing
data processing at the full rates of the network connection. The more
client devices and concurrent sources of network traffic, the harder it
will be for a router processor to support maximum speed transfers over
any connection.
How to Tell if a Network Supports Gigabit Ethernet
Network devices provide the same RJ-45 connection type whether their
Ethernet ports support 10/100 (Fast) or 10/100/1000 (Gigabit)
connections. Ethernet cables are often stamped with information about
the standards they support, but they do not indicate whether the network
is actually configured to run at that rate.
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
9. Learning Activities / Exercises
1. Explain Gigabit Ethernet.
Gigabit Ethernet (GbE or 1 GigE) is the term applied to
transmitting Ethernet frames at a rate of a gigabit per second (1 billion bits
per second). The most popular variant 1000BASE-T is defined by
the IEEE 802.3ab standard. It came into use in 1999, and has
replaced Fast Ethernet in wired local networks due to its considerable
speed improvement over Fast Ethernet, as well as its use of cables and
equipment that are widely available, economical, and similar to previous
standards.
Gigabit Ethernet is part of the Ethernet family of computer
networking and communication standards. The Gigabit Ethernet standard
supports a theoretical maximum data rate of one gigabit per second (1,000
Mbps).
2. How does gigabit Ethernet work?
It was once believed that achieving gigabit speeds with Ethernet
would require the use of fiber optic cables or other special network
cable technology. Fortunately, those are only necessary for long distances.
For most purposes, Gigabit Ethernet works well using a regular Ethernet
cable (specifically, the CAT5e and CAT6 cabling standards). These cable
types follow the 1000BASE-T cabling standard (also called IEEE
802.3ab).
3. Are there any restrictions on how Ethernet is cabled?
A single shared cable can serve as the basis for a complete Ethernet
network, which is what we discussed above. However, there are practical
limits to the size of our Ethernet network in this case. A primary concern
is the length of the shared cable.
Electrical signals propagate along a cable very quickly, but they weaken
as they travel, and electrical interference from neighboring devices
(fluorescent lights, for example) can scramble the signal. A network cable
must be short enough that devices at opposite ends can receive each other's
signals clearly and with minimal delay. This places a distance limitation
on the maximum separation between two devices (called the network
diameter) on an Ethernet network. Additionally, since in CSMA/CD only
a single device can transmit at a given time, there are practical limits to the
number of devices that can coexist in a single network. Attach too many
devices to one shared segment and contention for the medium will
increase. Every device may have to wait an inordinately long time before
getting a chance to transmit.
Engineers have developed a number of network devices that alleviate these
difficulties. Many of these devices are not specific to Ethernet, but play
roles in other network technologies as well.
4. What is a multicast, Unicast and Broadcast?
Multicast is a type of communication where multicast traffic addressed for
a group of devices on the network. IP multicast traffic are sent to a group
and only members of that group receive and/or process the Multicast
traffic.
Devices which are interested in a particular Multicast traffic must join to
that Multicast group to receive the traffic. IP Multicast Groups are
identified by Multicast IP Addresses (IPv4 Class D Addresses)
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
10. In Multicast, the sender transmit only one copy of data and it is delivered
and/or processed to many devices (Not as delivered and processed by all
devices as in Broadcast) who are interested in that traffic.
Example: Multicast Windows Deployment Services (WDS) OS
deployment traffic, IP TV etc.
Multicast is a communication method and data delivery scheme in which
a single source sends the same data to multiple receivers simultaneously.
It is similar to broadcasting but more secure because it has an added bonus
of receiver discretion, where the data is received by specific users or hosts.
The multicast process involves a single sender and multiple receivers.
versus systems that are designed to be connection-dependent, like a client-
server system. User datagram protocol (UDP) is the most common
protocol used with multicasting.
Email is the best example of multicast, where a user can choose to send
mail to many different addresses, rather than a complete contact list.
Another example is the one-to-many multicasting of a streaming video
toward many users from a single server. Another good example is Internet
protocol (IP) multicasting, where network nodes, like switches and routers,
handle data packet replication through multicast groups.
Multicast can be one-to-many or many-to-many
distribution. Multicast should not be confused with physical layer point-
to-multipoint communication. Group communication may either be
application layer multicast or network assisted multicast, where the latter
makes it possible for the source to efficiently send to the group in a single
transmission.
Unicast is communication between a single sender and a single receiver
over a network. The term exists in contradistinction.
Unicast is a type of communication where data is sent from one computer
to another computer.
In Unicast type of communication, there is only one sender, and one
receiver.
Example:
1) Browsing a website. (Webserver is the sender and your computer is the
receiver.)
2) Downloading a file from a FTP Server. (FTP Server is the sender and
your computer is the receiver.)
Broadcast is a type of communication where data is sent from one
computer once and a copy of that data will be forwarded to all the devices.
In Broadcast, there is only one sender and the data is sent only once. But
the Broadcast data is delivered to all connected devices.
Switches by design will forward the broadcast traffic and Routers by
design will drop the broadcast traffic. In other words, Routers will not
allow a broadcast from one LAN to cross the Router and reach another
Network Segment. The primary function of a Router is to divide a
big Broadcast domain to Multiple smaller Broadcast domain.
5. What does UTP, STP cabling mean?
Unshielded twisted pair (UTP) is a ubiquitous type of copper
cabling used in telephone wiring and local area networks.
unshielded twisted pair, a popular type of cable that consists of two
unshielded wires twisted around each other. Due to its low cost, UTP
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530
11. cabling is used extensively for local-area networks (LANs) and telephone
connections. UTP cabling does not offer as high bandwidth or as good
protection from interference as coaxial or fiber optic cables, but it is less
expensive and easier to work with.
STP Cabling is twisted-pair cabling with additional shielding to
reduce crosstalk and other forms of electromagnetic interference (EMI).
Shielded twisted-pair (STP) cabling is more expensive than unshielded
twisted-pair (UTP) cabling. It has an impedance of 150 ohms, has a
maximum length of 90 meters, and is used primarily in networking
environments with a high amount of EMI due to motors, air conditioners,
power lines, or other noisy electrical components. STP cabling is the
default type of cabling for IBM Token Ring networks.
Assignment # 9:
1. What do the LEDs indicate?
LED stands for "light emitting diode." A diode is an electrical component
with two terminals which conduct the electricity only in one direction.
With an electrical current, the diode emits a bright light around the small
bulb. Typically, diodes have been used in many technologies such as
radios, televisions and computers as an electrical component for
conduction.
Connecting a diode to an electrical current excites the electrons within
the diode, making them release photons, which we see as light. The color
of the light is a direct result of the energy gap in the semiconductor of the
diode. This means that LEDs produce a spectrum of colors easily and
brightly while using very little electricity to do so.
Good Luck!!!
“Live a good life. More smiling, less worrying. More
compassion, less judgment. More blessed, less stress. More
love, less hate.”
Downloaded by Delia Penoringan (dpenoringan@mohtiwpampanga.ph.education)
lOMoARcPSD|29213530