Complete description of Ethernet Protocol - Used to show technicians how to troubleshoot Ethernet issues. This slide show is part of a large program available for purchase and my not be copied.
The IEEE 802 is a family of IEEE standards dealing with Local Area Networks and Metropolitan Area Networks. The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Bridging and Virtual Bridged LANs (802.1), Ethernet family (802.3), Token Ring (802.5) and Wireless LAN (802.11).
Ethernet is a family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3, and has since been refined to support higher bit rates and longer link distances.
A network switch (sometimes known as a switching hub) is a computer networking device that is used to connect devices together on a computer network by performing a form of packet switching. A switch is considered more advanced than a hub because a switch will only send a message to the device that needs or requests it, rather than broadcasting the same message out of each of its ports
The IEEE 802 is a family of IEEE standards dealing with Local Area Networks and Metropolitan Area Networks. The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Bridging and Virtual Bridged LANs (802.1), Ethernet family (802.3), Token Ring (802.5) and Wireless LAN (802.11).
Ethernet is a family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs). It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3, and has since been refined to support higher bit rates and longer link distances.
A network switch (sometimes known as a switching hub) is a computer networking device that is used to connect devices together on a computer network by performing a form of packet switching. A switch is considered more advanced than a hub because a switch will only send a message to the device that needs or requests it, rather than broadcasting the same message out of each of its ports
[SCRIPT INCLUDED]
To be viewed in Microsoft power point.
This PPT describes the Difference between the TCP and UDP layer in the Transport layer of the OSI Model
Ideal for a team of 4 people.
Please edit the first page as per number of team members and their names.
The script includes when to click what to speak and whcih person will speak what.Please edit the team member names as required.
You can find link for script below.
LINK:
https://docs.google.com/document/d/1m2Ef8p9VNQCh4MLKvfb4sWINMdQPi4PEnpcq-KbY600/edit?usp=sharing
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
1. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet
2. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet 02 60 8C 01 02 04 Card Vendor Node ID 3COM 02 60 8C 01 02 04 The Node that will receive the packet
3. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet 02 60 8C 04 05 06 Card Vendor Node ID 3COM 02 60 8C 01 02 04 The Node that is transmitting the packet 02 60 8C 04 05 06
4. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet 08 00 02 60 8C 01 02 04 ID of Protocol (TCP/IP) 02 60 8C 04 05 06 08 00
5. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Breaking Down the Packet The Data Field is an area that contains both the header and the user data 02 60 8C 01 02 04 The first 30 bytes of the IPX Structure is referred to as the header 02 60 8C 04 05 06 08 00
6. The IPX Data Field User Data 546 Bytes Header = 30 Bytes Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) Source Network (4 BYTES) Source Node (6 BYTES) Source Socket (2 BYTES)
7. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) The checksum contains 16 bits which check the integrity of the packet If the feature is disabled, the contents will read FFFF Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
8. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Note: With LAN communication the number may be as high as the transmission medium allows. 1500 - Ethernet 1496 - 802.3 4472 - 4 Mbs Token Ring Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
9. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) The Transport Control Initially set to 0 Provides the maximum number of hops Note: As the data traverses through the network the number of hops from router to router is counted. If the number goes higher than 15 the packet is discarded Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
10. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) The Packet Type Provides a description about the data within the data field Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
11. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
12. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
13. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
14. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) Source Network (4 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
15. The Ethernet Packet 802.3 Breaking Down the Packet Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) Source Network (4 BYTES) Source Node (6 BYTES) The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00
16. The Ethernet Packet 802.3 Breaking Down the Packet The length Min 30 Bytes Max 576 - 30 bytes Destination Address Source Address Type Data Field CRC - 32 02 60 8C 01 02 04 02 60 8C 04 05 06 08 00 Checksum (2 BYTES) Length (2 BYTES) Transport Control (1 BYTE) Packet Type = 1 (1 BYTE) Destination Network (4 BYTES) Destination Node (6 BYTES) Destination Socket = 0453 (2 BYTES) Source Network (4 BYTES) Source Node (6 BYTES) Source Socket (2 BYTES)
17. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32
18. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 The address of the immediate recipient of the message
19. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 The address of the sender of the packet
20. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 The type of data within the packet TCP/IP, Apple Talk, XNS etc.
21. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Contains the upper layer of software headers and the user data
22. The Ethernet Packet 802.3 Destination Address Source Address Type Data Field CRC - 32 Contains the CRC so packet integrity can be analyzed by the algorithm
25. Ethernet Mediums Wiring Categories for UTP = Unshielded Twisted Pair Category 3 up to 10 Mbps Category 4 up to 20 Mbps Category 5 up to 100 Mbps UTP = 10 BASE T
26. Ethernet WS-B WS-A Both stations listen for the carrier. After detecting that the line is clear:
27. Ethernet Collision Both Packets A&B try to contend for the line at the same time resulting in: WS-B WS-A A B
28. The Seven Layer OSI Application Presentation Session Transport Network Data Physical
29. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Protocol describing the transmission method over the physical media Ethernet over 10BaseT
30. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Construction and Reconstruction of the Packet
31. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Finds the most efficient route SPX/IPX & TCP/IP
32. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Performs Error Checking
33. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Establishes the logical communication between two nodes on the network
34. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Reformats, Decodes or Compresses the information for presentation to the Session or Application Layer
35. The Seven Layer OSI Application Presentation Session Transport Network Data Physical Communication and interface to the network segment of the Application Program Excel, Word, Etc.
36. Workstation 1 Workstation 2 T S P A N D T S P A N D Cable Physical T S P A N D Datalink T S P A N Network T S P A Transport S P A Session P A Presentation A Application T S P A N D Cable Physical T S P A N D Datalink T S P A N Network T S P A Transport S P A Session P A Presentation A Application T S P A N D
37. Bridges The function of a bridge is to join two networks and pass only packets that belong on a specific network. In other words the bridge acts a packet Filtering device. A B
42. Token Ring The packet circulates around the ring until it finds its destination station The Information is placed in the packet and sent from the originating to the destination station Station 1 Station 2 Station 3 Station 4