Lesson 02 - This lesson explores design issues related to overall network topology. The following sections discuss the traditional issues of bandwidth, delay, and reliability; as well as the often overlooked issues of operational simplicity and scalability, particularly as they pertain to routing.
Layer 3 provides services to exchange the individual pieces of data over the network between identified end devices.
Understanding L3 addressing, encapsulation, routing and decapsulation.
Routed protocols, routing protocols and other supporting protocols such as ICMP and ARP.
IP v4 Characteristics:
1. Connectionless
2. Media independent
3. Best effort
IP v4 Header:
1. Packet length
2. Type of Service
3. Time to Live
4. Protocol
5. Header checksum
6. Source address
7. Destination address
8. Fragment offset.
9. IHL
10. Type of Service
This presentation contains and will let you know about the various types of network and devices which are being used in the daily life. These devices are used as per the requirements in Office, Educational Institution, etc. This will help you in learning easily.
Tutorial at IEEE 802 LMSC Plenary Session, Dallas, TX, USA, Nov. 13, 2006 (with W. Steven Conner, Intel Corp., Jan Kruys, Cisco Systems, and Juan Carlos Zuniga, InterDigital Comm. Corp.).
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
thourighly explained working and types of network switches a very good ready to present presentation aesthetically pleasing as well best for university or college use click like if u lyk it thanks
Layer 3 provides services to exchange the individual pieces of data over the network between identified end devices.
Understanding L3 addressing, encapsulation, routing and decapsulation.
Routed protocols, routing protocols and other supporting protocols such as ICMP and ARP.
IP v4 Characteristics:
1. Connectionless
2. Media independent
3. Best effort
IP v4 Header:
1. Packet length
2. Type of Service
3. Time to Live
4. Protocol
5. Header checksum
6. Source address
7. Destination address
8. Fragment offset.
9. IHL
10. Type of Service
This presentation contains and will let you know about the various types of network and devices which are being used in the daily life. These devices are used as per the requirements in Office, Educational Institution, etc. This will help you in learning easily.
Tutorial at IEEE 802 LMSC Plenary Session, Dallas, TX, USA, Nov. 13, 2006 (with W. Steven Conner, Intel Corp., Jan Kruys, Cisco Systems, and Juan Carlos Zuniga, InterDigital Comm. Corp.).
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
thourighly explained working and types of network switches a very good ready to present presentation aesthetically pleasing as well best for university or college use click like if u lyk it thanks
This presentation is about the introduction to network switch layer technology. A network switch is a device tha is used to connect different segments over the network.This ppt includes introduction to switch,types of switches or layer specification,advantages and disadvantages of switch..
I hope it will be very helpful for the engineering students and the others who are interested to search in deep about network switch.
Computer Security and Intrusion Detection(IDS/IPS)LJ PROJECTS
This ppt explain you various type of possible attack, security property, Traffic Analysis, Security mechanism Intrusion detection system, vulnerability, Attack framework etc.
Its about the need for standard in networking, and caters to IEEE 802 standard in detail. FI you want to listen to this lecture
https://www.youtube.com/watch?v=IVD5sOpA0lc
Paper sharing_resource optimization scheduling and allocation for hierarchica...YOU SHENG CHEN
From Future Generation Computer Systems 107
Author:Jing Li (2020)
Declaration:There are some problems in this paper. I have tried my best to explain that the experimental data are not from the data of this paper.
Software-defined Networking (SDN)
It is an approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via:
open interfaces
abstraction of lower-level functionality
SDN is meant to address the fact that the static architecture of traditional networks doesn't support the dynamic, scalable computing and storage needs of more modern computing environments such as data centers.
This is done by decoupling or disassociating the system that makes decisions about where traffic is sent (the SDN controller, or control plane) from the underlying systems that forward traffic to the selected destination (the data plane).
Subject: Software Architecture Design
Topic: Distributed Architecture
In this presentation, you will learn about design pattern, softawre architecture, distributed architecture, basis of distributed architecture, why distributed architecture, need of distributed architecture, advantages and disadvantages of DA and much more.
Rate my presentation, It's designed graphically.
This proposal incorporated a vision for the network architecture of a new platform Milliman was creating. It was based on research into what was then new technologies like SQL Server Failover and Catalyst (now Cisco) 6500 series switching.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. Systems Development Life Cycle
Every business has a number of goals.
System planners and management personnel within a company
try to generate a set of questions, or problems, to help the
company achieve those goals.
To properly understand a problem, analyze all possible
solutions, select the best solution, and implement and maintain
the solution, you need to follow a well-defined plan.
SDLC is a methodology, or plan, for a structured approach to
the development of a business system.
2
3. Systems Development Life Cycle
SDLC involves several phases. These phases are often:
• Planning
• Analysis
• Design
• Implementation
• Maintenance
These phases are cyclical and usually never ending.
3
5. Systems Development Life Cycle
A systems analyst is typically responsible for managing a
project and following the SDLC phases.
Anyone, however, may be called upon to assist a systems
analyst.
Or anyone may have to assume some of the duties of a systems
analyst.
Individuals that are called upon to support a computer network
should understand the basic phases of SDLC.
5
6. Systems Development Life Cycle
Planning Phase - Identify problems, opportunities, and objectives.
Analysis Phase - Determine information requirements. Information
requirements can be gathered by sampling and collecting hard data,
interviewing, questionnaires, observing environments, and prototyping.
Design Phase - Design the system that was recommended and approved at
the end of the analysis phase.
Implementation Phase - The system is installed and preparations are made to
move from the old system to the new.
Maintenance Phase - The longest phase, involves the ongoing maintenance of
the project.
Maintenance may require personnel to return to an earlier phase to perform
an update.
6
7. Network Modeling
When updating or creating a new computer system, the analyst will create a
set of models for both the existing system (if there is one) and the proposed
system.
Network models can either demonstrate the current state of the network or
can model the desired computer network.
A series of connectivity maps are network modeling tools that depict the
various locations involved over a wide and local areas and the
interconnections between those locations.
An wide area connectivity map shows the big picture of geographic locations
of network facilities.
External users and mobile users can be identified, as well as the locations
primary to a business.
7
8. Network Modeling
To identify each connection between sites:
d = distance of the connection (usually shown in either miles or kilometers)
s = security level (high, medium, low, or none)
du = duplexity (full duplex, half duplex, or simplex)
dr = data rate desired (in bps)
l = latency, or acceptable delay time across the network (usually in milliseconds, or
ms)
QoS = Quality of Service (CBR - constant bit rate, VBR - variable bit rate, ABR -
available bit rate, UBR - unreliable bit rate, or none)
de = delivery rate (sometimes called throughput percentage)
8
12. Network Modeling
An metropolitan area connectivity map shows the design of a
metropolitan area and its network facilities.
QoS = VBR
dr = 100 Mpbs
s = high
d = 5 km
failover = 50 ms
de = 99.9%
12
14. Network Modeling
An local area overview connectivity map shows the design of a
big picture design of a local area network.
QoS = none
dr = 100 Mpbs
s = none
d = 85 m
du = full
thru = 50%
14
16. Network Modeling
An local area detailed connectivity map shows the close-up
design of a local area network, including switches, routers,
hubs, and servers.
Much like the homework we did earlier showing LAN
connections.
16
18. Feasibility Studies
There are a number of ways to determine if a proposed system is going to be feasible.
Technically feasible means the proposed system can be created and implemented
using currently existing technology.
Financially feasible means the proposed system can be built given the company’s
current financial ability.
Operationally feasible means the system operates as designed and implemented.
Time feasible means the system can be constructed in an agreed upon time frame.
Payback analysis is a good technique to use to determine financial feasibility.
To calculate payback analysis, you must know all the expenses that will be incurred
to create and maintain the system, as well as all possible income derived from the
system.
You must also be aware of the time value of money (a dollar today is worth more than
one dollar promised a year from now because the dollar can be invested).
18
21. Capacity Planning
Capacity planning involves trying to determine the amount of network bandwidth
necessary to support an application or a set of applications.
A number of techniques exist for performing capacity planning, including linear
projection, computer simulation, benchmarking, and analytical modeling.
Linear projection involves predicting one or more network capacities based on the
current network parameters and multiplying by some constant.
A computer simulation involves modeling an existing system or proposed system
using a computer-based simulation tool.
Benchmarking involves generating system statistics under a controlled environment
and then comparing those statistics against known measurements.
Analytical modeling involves the creation of mathematical equations to calculate
various network values.
21
22. Creating a Baseline
Involves the measurement and recording of a network’s state of operation
over a given period of time.
A baseline can be used to determine current network performance and to help
determine future network needs.
Baseline studies should be ongoing projects, and not something started and
stopped every so many years. To perform a baseline study, you should:
• Collect information on number and type of system nodes, including
workstations, routers, bridges, switches, hubs, and servers.
• Create an up-to-date roadmap of all nodes along with model numbers, serial
numbers and any address information such as IP or Ethernet addresses.
• Collect information on operational protocols used throughout the system.
22
23. Creating a Baseline
To perform a baseline study, you should:
• List all network applications, including the number, type and
utilization level.
• Create a fairly extensive list of statistics to help meet your
goals. These statistics can include average network utilization,
peak network utilization, average frame size, peak frame size,
average frames per second, peak frames per second, total
network collisions, network collisions per second, total runts,
total jabbers, total CRC errors, and nodes with highest
percentage of utilization.
23
25. Network Manager Skills
A good network manager will possess many skills:
• Computer skills
• People skills
• Management skills
• Financial planning skills
• Knowledge of statistics
• Speaking and writing skills
25
26. Generating Useable Statistics
Statistics, properly generated, can be an invaluable aid to
demonstrating current system demands and predicting future
needs.
Mean time between failures (MTBF) is the average time a
device or system will operate before it fails.
Mean time to repair (MTTR) is the average time necessary to
repair a failure within the computer system.
Availability is the probability that a particular component or
system will be available during a fixed time period.
Availability % = (Total available time – Downtime) / Total
available time
26
27. Generating Useable Statistics
Suppose we want to calculate the availability of a modem that for
one month (24 hours per day for 30 days, or 720 hours), knowing
the modem will be down for two hours during that period:
Availability % = (720 – 2) / 720
= 0.997
Reliability is defined by the equation:
R(t) = e -bt
in which: b = 1/MTBF
t = the time interval of the operation
27
28. Generating Useable Statistics
What is the reliability of a modem if the MTBF is 3000 hours
and a transaction takes 20 minutes, or 1/3 of an hour (0.333
hours):
R(0.333 hours) = e -(1/3000)(0.333) = e -0.000111 = 0.99989
28
29. Managing Operations
There are many services and functions available to assist an individual in managing
computer network operations.
One of the more useful is Simple Network Management Protocol (SNMP).
SNMP is an industry standard designed to manage network components from a
remote location.
Currently in version 3, SNMP supports agents, managers, and the Management
Information Base (MIB).
A managed element has management software, called an agent, running in it.
A second object, the SNMP manager, controls the operations of a managed element
and maintains a database of information about all managed elements.
A manager can query an agent to return current operating values, or can instruct an
agent to perform a particular action.
The Management Information Base (MIB) is a collection of information that is
organized hierarchically and describes the operating parameters of all managed
agents.
29
30. Network Diagnostic Tools
To assist a network support person, a number of diagnostic tools
are available:
• Electrical testers
• Cable testers
• Network testers
• Protocol analyzers
30
31. Capacity Planning and Network Design In
Action: Sample Corporation
Sample Corporation complete design, including e-mail and
Internet access for each of the four sites.
A linear projection can be used to estimate the amount of
Internet traffic at each site.
An wide area connectivity map gives us a big picture of the
network interconnections.
31
33. Capacity Planning and Network Design In
Action: Sample Corporation
A second linear projection can be used to determine the amount
of local area network traffic within each site.
33
36. Why Interconnect?
To separate / connect one corporate division with another.
To connect two LANs with different protocols.
To connect a LAN to the Internet.
To break a LAN into segments to relieve traffic congestion.
To provide a security wall between two different types of users.
36
37. Hubs
As seen earlier, a hub interconnects two or more workstations
into a local area network.
When a workstation transmits to a hub, the hub immediately
resends the data frame out all connecting links.
A hub can be managed or unmanaged. A managed hub
possesses enough processing power that it can be managed from
a remote location.
37
38. Bridges
A bridge (or bridge-like device) can be used to connect two
similar LANs, such as two CSMA/CD LANs.
A bridge can also be used to connect two closely similar LANs,
such as a CSMA/CD LAN and a token ring LAN.
The bridge examines the destination address in a frame and
either forwards this frame onto the next LAN or does not.
The bridge examines the source address in a frame and places
this address in a routing table, to be used for future routing
decisions.
38
40. Transparent Bridges
A transparent bridge does not need programming but observes
all traffic and builds routing tables from this observation.
This observation is called backward learning.
Each bridge has two connections (ports) and there is a routing
table associated with each port.
A bridge observes each frame that arrives at a port, extracts the
source address from the frame, and places that address in the
port’s routing table.
A transparent bridge is found with CSMA/CD LANs.
40
43. Transparent Bridges
A transparent bridge can also convert one frame format to
another, but this does not happen too often anymore since most
networks are CSMA/CD.
Note that some people / manufacturers call a bridge such as this
a gateway or sometimes a router.
The bridge removes the headers and trailers from one frame
format and inserts (encapsulates) the headers and trailers for the
second frame format.
43
44. Remote Bridges
A remote bridge is capable of passing a data frame from one
local area network to another when the two LANs are separated
by a long distance and there is a wide area network connecting
the two LANs.
A remote bridge takes the frame before it leaves the first LAN
and encapsulates the WAN headers and trailers.
When the packet arrives at the destination remote bridge, that
bridge removes the WAN headers and trailers leaving the
original frame.
44
46. Spanning Tree Algorithm
What happens if you have many LANs interconnected with
multiple bridges, such as shown in the next slide?
Data that leaves one workstation could travel to a bridge, across
the next network, into the next bridge, and back onto the first
network.
A packet may continue to cycle like this forever!
46
49. Spanning Tree Algorithm
How do we stop this from happening?
Disconnect one of the bridges? Maybe we want bridge
redundancy in case one bridge fails.
How about applying the spanning tree algorithm.
How is the algorithm applied?
49
50. Spanning Tree Algorithm
Step 1: Designate a Root Bridge
Step 2: Mark one port of each bridge as the Root Port. The root port is the
port with the least-cost path from that bridge to the root bridge. The root ports
are denoted with an asterisk.
Step 3: The next step is to select a designated bridge for each LAN. A
designated bridge has the least-cost path between that LAN and the root
bridge. Mark the corresponding port that connects that LAN to its designated
bridge with two asterisks.
Step 4: If a port has no asterisks, that port is redundant and can be “removed”.
Keep all ports with one or two asterisks. The resulting configuration is shown
in Figure 8-7c.
Note there is now only one way to get to any LAN or bridge from any other
LAN or bridge.
50
52. Switches
A switch is a combination of a hub and a bridge.
It can interconnect two or more workstations, but like a bridge, it observes traffic flow
and learns.
When a frame arrives at a switch, the switch examines the destination address and
forwards the frame out the one necessary connection.
Workstations that connect to a hub are on a shared segment.
Workstations that connect to a switch are on a switched segment.
The backplane of a switch is fast enough to support multiple data transfers at one time.
A switch that employs cut-through architecture is passing on the frame before the
entire frame has arrived at the switch.
Multiple workstations connected to a switch use dedicated segments. This is a very
efficient way to isolate heavy users from the network.
A switch can allow simultaneous access to multiple servers, or multiple simultaneous
connections to a single server.
52
55. Virtual LANs
A virtual LAN, or VLAN, is a logical subgroup within a local area network
that is created via switches and software rather than by manually moving
wiring from one network device to another
Even though the employees and their actual computer workstations may be
scattered throughout the building, LAN switches and VLAN software can be
used to create a “network within a network.”
A relatively new standard, IEEE 802.1Q, was designed to allow multiple
devices to intercommunicate and work together to create a virtual LAN
Instead of sending a technician to a wiring closet to move a workstation cable
from one switch to another, an 802.1Q-compliant switch can be remotely
configured by a network administrator
55
56. Isolating Traffic Patterns with Switches
Whether shared or dedicated segments are involved, the primary
goal of a switch is to isolate a particular pattern of traffic from
other patterns of traffic or from the remainder of the network
Switches, because of their backplane, can also allow multiple
paths of communications to simultaneously occur
56
59. Isolating Traffic Patterns with Switches
Using a pair of routers, it is possible to interconnect to switched
segments, essentially creating one large local area network
59
61. Full Duplex Switches
A full duplex switch allows for simultaneous transmission and
reception of data to and from a workstation.
This full duplex connection helps to eliminate collisions.
To support a full duplex connection to a switch, at least two pairs
of wires are necessary - one for the receive operation and one for
the transmit operation. Most people install four pairs today, so
wiring is not the problem.
61
63. Network Servers
Network servers provide the storage necessary for LAN
software.
They are usually the focal point for the network operating
system.
Increasingly, network servers are functioning as bridges,
switches, and routers. By adding the appropriate card, a server
can assume multiple functions.
63
64. Routers
The device that connects a LAN to a WAN or a WAN to a WAN.
A router accepts an outgoing packet, removes any LAN headers and trailers, and
encapsulates the necessary WAN headers and trailers.
Because a router has to make wide area network routing decisions, the router has to
dig down into the network layer of the packet to retrieve the network destination
address.
Thus, routers are often called “layer 3 devices”. They operate at the third layer, or OSI
network layer, of the packet.
Routers often incorporate firewall functions.
An example of a router’s operation is shown on the next slide.
64
66. A Small Office Sample
A small office with 20 workstations in one room and 15
workstations in another room were connected to a server via
100BaseTX.
One hub was kept in a closet near the 20 workstations while a
second hub was near the server.
66
68. A Small Office Sample
Now the owner wants to connect the LAN to the Internet.
He adds a router next to the server and connects it to the hub.
He connects the router to a high-speed telephone line such as a
T-1 service.
He will also have to program the router to perform IP addressing
and firewall functions.
68
70. A Small Office Sample
Now network usage is so high that he must consider segmenting
the network.
He decides to install a database server near the original server
and replace both hubs with switches.
70