...OSI Physical Layer Network Fundamentals – Chapter 8 ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of physical layer protocols and services in supporting communication across data networks. Describe the role of signals used to represent bits as a frame as the frame is transported across the local media. Describe the purpose of physical layer signaling and encoding as they are used in networks. Identify the basic characteristics of copper, fiber and wireless network media. Describe common uses of copper, fiber and wireless network media. ITE PC v4.0 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Outline Physical layer: Communication signals –Purpose of the physical layer –Physical layer standards –Physical layer fundamental principles Physical signaling and encoding: Representing bits –Signaling bits for the media –Encoding: Grouping bits –Data-carrying capacity Physical media: Connecting communication –Types of physical media ITE PC v4.0 Chapter 1 –Media connectors © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Purpose of the Physical Layer The roles of the OSI physical layer: –To encode the binary digits that represent data link layer frames into signals. –To transmit and receive these signals across the physical media. There are various types of physical media and they carry different types...
Words: 3652 - Pages: 15
...B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP For two routers to exchange IGRP routes they must be configured with the same autonomous system number. The correct answer(s): C The following is partial output from a routing table, identify the 2 numbers in the square brackets; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' A.) 100 = metric, 1300 = administrative distance B.) 100 = administrative distance, 1300 = hop count C.) 100 = administrative distance, 1300 = metric D.) 100 = hop count, 1300 = metric The first number is the Administrative distance and the seconds number is the metric. In this case it is an IGRP metric. The correct answer(s): A B C Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's Routing loops can be prevented by split horizon, poison reverse and holddown times. The other two choices relate to Link State. The correct answer(s): A Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time Full duplex is just the opposite of half duplex. It handles traffice in both directions simultaneously. The correct answer(s): C Identify the switching method that...
Words: 23850 - Pages: 96
...IP Networking Assignment 1.1 Chapter 1 1. The TCP/IP networking model is a model of networking functions that are separated into different layers. Each layer performs a specific function that effects the layer above and below it. We use the TCP/IP model to troubleshoot a computer that is experiencing network issues. 2. There are seven different layers in an OSI model. Layer 1 (Physical layer): the physical characteristics of a computer such as connectors and pins. Layer 2 (Data Link): defines the internet protocols and the format of a header and trailer that allows devices to send and receive data successfully. Layer 3 (Network): routing IP packets and IP addressing. Layer 4 (Transport): data delivery from one computer to another. Layer 5 (Session): User communicating with the computer. Layer 6 (Presentation): defining data formats such as text files (.txt) and picture files (JPEG). Layer 7 (Application): support for applications such email and internet explorer. 3. The difference between same layer and adjacent layer interactions is that same layer deals with two computers, while adjacent with just one computer. 4. Encapsulation is the process of placing data into a header and footer. Decapsulation is the process of removing data from a header and footer. Chapter 2 1. There are five different types of Ethernet which are 10Base2, 10Base5, 10Base-T, 100Base-TX, and 1000Base-T. Also there are many different types of topologies such as bus, star, mesh, extended star...
Words: 726 - Pages: 3
...Network layer protocol used in the packet. See Chapter 16 for more information. 2. B. Each field in an IPv6 address is 16 bits long. An IPv6 address is a total of 128 bits. See Chapter 15 for more information. 3. C. The port roles used within RSTP include discarding, learning, and forwarding. The difference between 802.1d and RSTP is the discarding role. See Chapter 10 for more information. 4. C. The command line console 0 places you at a prompt where you can then set your console user-mode password. See Chapter 6 for more information. 5. D. An IPv6 address is 128 bits long, whereas an IPv4 address is only 32 bits long. See Chapter 15 for more information. 6. C. Link Control Protocol in the PPP stack provides negotiation of dynamic addressing, authentication, and multilink. See Chapter 16 for more information. 7. B. The show interface command shows the line, protocol, DLCI, and LMI information of an interface. See Chapter 16 for more information. 8. A. 256 – 192 = 64, so 64 is our block size. Just count in increments of 64 to find our subnet: 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 4 for more information. 9. B. The passive command, short for passive-interface, stops regular updates from being sent out an interface. However, the interface can still receive updates. See Chapter 8 for more information. 10. C. ICMP is the protocol at the Network layer that...
Words: 946 - Pages: 4
... IT245-1404B-01: INTRODUCTUCTION TO NETWORK MANAGEMENT INSTRUCTOR: RODNEY BROWN 1 DECEMBER 2014 TABLE OF CONTENTS CHAPTER 1 2 1.1 ORGANIZATION DESCRIPTION 2 1.2 NETWORK SERVERS 2 1.3 NETWORK PERSONNEL RESPONSIBILITIES 2 CHAPTER 2 4 2.1 NETWORK ARCHITECTURE 4 2.2 NETWORK DIAGRAM 5 CHAPTER 3 6 3.1 ORGANIZATION DESCRIPTION 2 3.2 NETWORK SERVERS 2 3.3 NETWORK PERSONNEL RESPONSIBILITIES 2 CHAPTER 4 # CHAPTER 5 # CHAPTER 6 # . 1.2 NETWORK SERVERS Main Server: Centos operating system and act as host running Virtual Box for the other servers Guest Server: Centos operating system used for project manager and Apache http web server. Web Server: Windows sever 2008 operating system functions as the Domain Name System (DNS) and Active Directory servers. 1.3 NETWORK PERSONNEL RESPONSIBLITIES Network personnel maintain and setup network equipment, servers, routers, and switches. Image computers, install software, and manage users’ accounts. CHAPTER 2 2.1 NETWORK ARCHITECTURE Network Components • satellite modem (that is also the router) • 5 switches (1- Cisco 24 port switch, 4- Linksys router configured to be switches, 3 configured to be wireless access points • 3 servers • Several work stations • Several peripheral devices The network is configured in a Star topology with 2 LAN segments. This was chosen for its cost, ease...
Words: 384 - Pages: 2
...Assignment Instructions: Please answer the following End of Chapter Exercises from Chapters 1-4 of your text. Chapter 1 - Introduction and Overview 1.3 According to the text, is it possible to develop Internet applications without understanding the architecture of the Internet and the technologies? Support your answer. According to the text, it is possible but understanding the architecture will allow the developer to produce a better application. Having an understanding will result in “a programmer creat[ing] more reliable, correct, and efficient programs.” 1.11 List the layers in the TCP/IP model, and give a brief explanation of each. Layer 1: Physical, this layer deals with the physical aspects, particularly the hardware involved. Layer 2: Network Interface/Data Link, this layer deals with communication between higher layers of protocols, involving both software and hardware, including packet sizes. Layer 3: Internet, this layer deals with communication between computers across the internet. Other packet details are included in this layer. Layer 4: Transport, this layer deals with communication between applications between different computers. Flow of internet traffic is included in this layer. Layer 5: Application, this layer deals with the interaction of applications once they begin communicating. Formats and ways of applications communicating are in this layer. Chapter - 2 Internet Trends 2.9 What Internet technology is the telephone...
Words: 583 - Pages: 3
...Chapter 10- 13 Exam 3 Chapter 10 Introduction Interface Design defines how the system will interact with external entities (e.g., customers, users, other systems) * User interfaces- part of the system with which users interact. * Based on our layers based design approach, the user interface of the human- computer interaction layer is independent of the data management layer. * But it is dependent on both the problem and domain and physical architecture layers. * System interfaces- exchange information with other systems. * Typically designed as a part of a systems integration effort. * Physical architecture and data management layers. * Defines the way in which the users interact with the system and the nature of the inputs and outputs that the system accepts and produces. * Depending on the type of device that the human-computer interaction layer is deployed on will set both opportunities and constraints as to what user interface features can be included. * Ex. Deploying the human computer interaction layer on both a smartphone and a desktop computer will cause two different Chapter 10 6 principles-summarized ““design priniples are” what are the steps of the user interface -what is the process “step 1?” 1st -scenario development 2nd -navigation structure design “whats the purpose” -shows the screens reports, etc 3rd -interface standard design -decided things like interface metaphors, templates, objects...
Words: 460 - Pages: 2
...will find a wide variety of resources available at the Online Learning Center, www.mhhe.comlforouzan Instructor Resources Instructors can access the following resources by contacting their McGraw-Hill Representative for a secure password. PowerPoint Slides. Contain figures, tables, highlighted points, and brief descriptions of each section. Complete Solutions Manual. Password-protected solutions to all end-of-chapter problems are provided. a Pageout. A free tool that helps you create your own course website. D Instructor Message Board. Allows you to share ideas with other instructors using the text. a o Student Resources The student resources are available to those students using the book. Once you have accessed the Online Learning Center, click on "Student Resources," then select a chapter from the drop down menu that appears. Each chapter has a wealth of materials to help you review communications and networking concepts. Included are: Chapter Summaries. Bulleted summary points provide an essential review of major ideas and concepts covered in each chapter. a Student Solutions Manual. Contains answers for odd-numbered problems. Glossary. Defines key terms presented in the book. Flashcards. Facilitate learning through practice and review. a Animated Figures. Visual representations model key networking concepts, bringing them to life. D Automated Quizzes. Easy-to-use quizzes strengthen learning and emphasize important ideas from the book. Web links. Connect students...
Words: 59848 - Pages: 240
...Types 1.3. The OSI Model 1.3.1. The Physical Layer 1.3.2. The Data Link Layer 1.3.3. The Network Layer 1.3.4. The Transport Layer 1.3.5. The Session Layer 1.3.6. The Presentation Layer 1.3.7. The Application Layer 1.4. Protocol Notations 1.4.1. Service Primitives 1.4.2. Sequence Diagrams 1.4.3. State Transition Diagrams 1.5. Standards 1.6. Further Reading 1.7. Summary 1.8. Exercises 2. The Physical Layer 2.1. Equipment 2.1.1. Equipment Types 2.1.2. Connection Types 2.2. Transmission 2.2.1. Signal Types 2.2.2. Modulation 2.2.3. Digitization 2.2.4. Synchronization 2.2.5. Transmission Media 2.3. Multiplexing 2.3.1. Space Division Multiplexing (SDM) vi Communication Networks 6 10 1 2 2 4 7 7 8 9 9 10 10 11 11 12 12 13 14 15 16 18 19 19 19 20 20 21 22 23 24 27 28 Copyright © 2005 PragSoft 2.3.2. Frequency Division Multiplexing (FDM) 2.3.3. Time Division Multiplexing (TDM) 2.3.4. Concentration 2.4. Physical Layer Standards 2.4.1. RS-232 2.4.2. CCITT X.21 2.5. Further Reading 2.6. Summary 2.7. Exercises 3. The Data Link Layer 3.1 Link Protocol Types 3.1.1. Synchronous Protocols 3.1.2. Asynchronous Protocols 3.1.3. Master-Slave Protocols 3.1.4. Peer-to-Peer Protocols 3.2. Link Protocol Functions 3.2.1. Acknowledgments 3.2.2. Timers 3.2.3. Error Checking 3.2.4. Retransmission 3.2.5. Flow Control 3.3. Sliding Window Protocol 3.4. Data Link Layer Standards 3.4.1. BSC 3.4.2. HDLC 3.5. Further Reading 3.6. Summary 3.7. Exercises 4. The Network Layer 4.1. Network Services 4.2. Switching...
Words: 60074 - Pages: 241
...environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...
Words: 4400 - Pages: 18
...Chapter 12 WLAN Troubleshooting IN ThIs chApTer, you WILL LeArN AbouT The foLLoWINg: ÛÛ Layer 2 retransmissions NÛ RF interference Multipath Adjacent cell interference Low SNR Mismatched power settings Near/far Hidden node NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ 802.11 coverage considerations NÛ Dynamic rate switching Roaming Layer 3 roaming Co-channel interference Channel reuse/multiple channel architecture Single channel architecture Capacity vs. coverage Oversized coverage cells Physical environment NÛ NÛ NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ Voice vs. data ÛÛ Performance ÛÛ Weather Copyright © 2009 John Wiley & Sons, Inc. Diagnostic methods that are used to troubleshoot wired 802.3 networks should also be applied when troubleshooting a wireless local area network (WLAN). A bottoms-up approach to analyzing the OSI reference model layers also applies to wireless networking. A wireless networking administrator should always try to first determine whether problems exist at layer 1 and layer 2. As with most networking technologies, most problems usually exist at the Physical layer. Simple layer 1 problems such as nonpowered access points or client card driver problems are often the root cause of connectivity or performance issues. Because WLANs use radio frequencies to deliver data, troubleshooting a WLAN offers many unique layer 1 challenges not found in a typical wired environment. The bulk of this chapter discusses the numerous potential problems...
Words: 16450 - Pages: 66
...environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...
Words: 4400 - Pages: 18
...CHAPTER 1 – Introduction To Networking • Connection to the internet can be broken down into: 1. Physical connection – to a network is made by inserting a specialised expansion card 2. Logical connection – uses standards called protocols. (TCP/IP) 3. Applications – the application that interprets the data & displays the information in an understandable format is the last part of the connection. (FTP) • When selecting a NIC for a network, consider the following: 1. Type of network 2. Type of medium 3. Type of system bus • TCP/IP – set of protocols or rules developed to allow co-operating computers to share resources across a network • Ping – a program that is useful for verifying a successful TCP/IP installation. The ping command works by sending internet Control Message Protocol (ICMP) datagram to request a reply • PCMCIA slots are slots used primary in Laptops for expansion cards CHAPTER 2 – Networking Fundamentals • There are 2 types of Networking Devices: 1. End User Devices – PC, Printer, MAC File Server, Laptop, IBM Mainframe 2. Network Devices – provides transport data between end user devices, Network Devices include Repeater, 10BASE-T-Hub, 100BASE-T-Hub, Hub, Bridge, Workgroup Switch, Router, Network Cloud • Repeaters – Layer 1, Physical Layer device. Similar to a hub. • Hubs – Layer 1, Physical Layer device. Used to regenerate & retime network...
Words: 4073 - Pages: 17
...and step by step within the OSI model Scope The purpose of this essay is to break down the seven layers of the OSI model. The seven layer model defines a standard by which to computer share data over a network space starting with application layer. It will break each modeling section to lay out a more detailed explanation of how each layer is operated and how they all work together. Also, it will discuss which level this packet filtering routers and firewalls reside at, how packet filtering routers and firewalls protect the network and the concepts of cryptography. The seven layers of the OSI model are: 1. Physical layer 2. Data link layer 3. Network layer 4. Transport layer 5. Session layer 6. Presentation layer 7. Application layer Application Layer (Layer 7) The application layer is the most directly related to computer user because it is the top of the layer hierarchy. This layer provides several application services such as file transfer, resource allocation and whether the identification and verification of the computer is available. This layer is most familiar to us because it is what we commonly use to interact with the computer from a user standpoint. A good example of this layer is Outlook express. Presentation Layer (Layer 6) The purpose of the presentation layer is to translate or "presents" data. This layer is also known by the operating system to ensure that information is delivered to the receiving machine...
Words: 1254 - Pages: 6
...Michael S Murphy | NET 125 Chapter 7: OSI Data Link Layer Vocabulary Exercise: Matching Term | Definition | a. Frame | a. Two or more devices connected to a common medium | b. Node | d. A layer of the Open Systems Interconnection (OSI) model that frames upper-layer data and controls how data is placed on a medium | c. Media | b. A device on a network | d. Network | e. The physical means used to carry data signals | e. Data Link | c. The protocol data unit (PDU) used in Layer 2 of the OSI model | Concept Questions 1. What are the two main jobs of the data link layer? * Allows the upper layers to access the media using techniques such as framing. * Controls how data is placed onto the media and is received from the media using techniques such as media access control (MAC) and error detection. 2. What is the difference between a logical network and a physical network? * Logical network refers a group of devices that associated by the arrangement of a hierarchical addressing scheme. * Physical network refers the connection of devices on a common media. 3. If the data link layer didn’t exist, what changes would be required of a network layer protocol such as Internet Protocol (IP)? Without the data link layer, a network layer protocol, like IP, would require provisions for connecting to every type of media that could exist along a delivery path. Vocabulary Exercise: Completion 1. The technique for getting a frame on and off a medium is called...
Words: 1757 - Pages: 8