...INTERNETWORKING INTERNETWORKING Abstract A local area network (LAN) is a communication network that interconnects a variety of data communicating devices within a small geographic area and broadcasts data at high data transfer rates with very low error rates. Since the local area network first appeared in the 1970s, its use has become widespread in commercial and academic environments. It would be very difficult to imagine a collection of personal computers within a computing environment that does not employ some form of local area network. This chapter begins by discussing the basic layouts or topologies of the most commonly found local area networks, followed by the medium access control protocols that allow a workstation to transmit data on the network. We will then examine most of the common local area network products such as Ethernet and token ring. Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a...
Words: 1743 - Pages: 7
...C H A P T E R 43 Chapter Goals • • • • • • • • • Explain IP multicast addressing. Learn the basics of Internet Group Management Protocol (IGMP). Explain how multicast in Layer 2 switching works. Define multicast distribution trees. Learn how multicast forwarding works. Explain the basics of protocol-independent multicast (PIM). Define multiprotocol BGP. Learn how Multicast Source Discovery Protocol (MSDP) works. Explain reliable multicast: PGM. Internet Protocol Multicast Background Internet Protocol (IP) multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to thousands of corporate recipients and homes. Applications that take advantage of multicast include videoconferencing, corporate communications, distance learning, and distribution of software, stock quotes, and news. IP Multicast delivers source traffic to multiple receivers without adding any additional burden on the source or the receivers while using the least network bandwidth of any competing technology. Multicast packets are replicated in the network by Cisco routers enabled with Protocol Independent Multicast (PIM) and other supporting multicast protocols resulting in the most efficient delivery of data to multiple receivers possible. All alternatives require the source to send more than one copy of the data. Some even require the source to send an individual copy to each receiver. If there are thousands of receivers, even low-bandwidth...
Words: 6080 - Pages: 25
...Review and describe the most important criteria for selecting internetworking devices at the core, access, and distribution layer in a computer network When designing a network there are many different important criteria for selecting internetworking devices for router the number ports need for your business. The processing speed and amount of memory do you need for your business. If you need LAN or WAN support availability and quality of technical support and documentation of training and vendor. For switch and bridges you have to look at number of MAC address can learn, support of port security, support for cut through switching and support for adaptive cut through switching. Don’t forget amount of memory. The router network layer protocols supported, routing protocols support, support for multicast, support for advanced queuing switching and other optimization. These are all important of selecting internetworking. You have to look at the business and customers that you are support then you use these internetwork criteria to make your decisions. Priscilla Oppenheimer (2012). Top-Down Networking Design. (Special Edition for Strayer University) Boston, MA, Pearson Learning Solutions Describe the key criteria involved in selecting WAN technologies and WAN providers. Discuss which criteria is the most important from your perspective and state why. When selecting WAN technologies and WAN provider this will vary from company to company one of the most important factors...
Words: 514 - Pages: 3
...Review and describe the most important criteria for selecting internetworking devices at the core, access, and distribution layer in a computer network When designing a network there are many different important criteria for selecting internetworking devices for router the number ports need for your business. The processing speed and amount of memory do you need for your business. If you need LAN or WAN support availability and quality of technical support and documentation of training and vendor. For switch and bridges you have to look at number of MAC address can learn, support of port security, support for cut through switching and support for adaptive cut through switching. Don’t forget amount of memory. The router network layer protocols supported, routing protocols support, support for multicast, support for advanced queuing switching and other optimization. These are all important of selecting internetworking. You have to look at the business and customers that you are support then you use these internetwork criteria to make your decisions. Priscilla Oppenheimer (2012). Top-Down Networking Design. (Special Edition for Strayer University) Boston, MA, Pearson Learning Solutions Describe the key criteria involved in selecting WAN technologies and WAN providers. Discuss which criteria is the most important from your perspective and state why. When selecting WAN technologies and WAN provider this will vary from company to company one of the most important factors...
Words: 514 - Pages: 3
...TCP/IP Three-Way Handshake In May 1974 the Institute of Electrical and Electronic Engineers (I EEE) publish a paper entitled” A Protocol for Packet Network Intercommunication”. This document describes an Internet internetworking protocol for sharing sources using packet switching. A central control component of this model which was the Transmission Control Program that incorporated both connection – oriented links and datagram service between hosts. The monolithic Transmission Control Program was later divided into a modular architecture consisting of the Transmission Control Protocol at connection – oriented layer and the Internet Protocol at the internetworking layer. The model became known as TCP/IP. TCP/IP is the backbone of the Internet of today. Comprised of two protocols which is known as TCP and IP. The TCP/IP protocol is one of the most widely used by corporations and household today. The Internet protocol (IP as is generally known) is the network layer of the Internet. The job of IP is to route and send packets to the package destination. IP provides no guarantee for the packets try to deliver. The IP packets are usually turn datagram. The datagram go to a series of routers before they reached the destination. Since the network has variable delay, it is no guarantee that the datagram will receive in sequence. IP only tries for best-effort delivered. Transmission control protocol (TCP) runs on top of IP improvised a connection on his service between the sender and...
Words: 384 - Pages: 2
...routing; congestion control; local area networks; communications architecture and protocols; internetworking. Pre-requisites By topic: • Programming language (such as C++) • Basic understanding of probability theory and data structures • Basic understanding of the internal operations of computers By course: • STAT 230 Probability and Random Variables, and EECE 330 Data Structures and Algorithms. Instructor Ayman Kayssi Office: 404, Raymond Ghosn Building (RGB) Office Hours: Monday 2 – 3:30 pm and by appointment Extension: 3499 Email: ayman@aub.edu.lb Web: aub.edu/~ayman Messaging: +961 3 965 258 LinkedIn: lb.linkedin.com/in/aymankayssi Twitter: akayssi Facebook: akayssi Course objectives The objectives of this course are to give students: An understanding of the basic principles of computer networking An overview of the main technologies used in computer networks An overview of internetworking principles and how the Internet protocols, routing, and applications operate The basic background in computer networks that will allow them to practice in this field, and that will form the foundation for more advanced courses in networking The basic skills needed to write network applications. Topics covered in this course Introductory concepts Physical media Link layer and local area networks Packet switching Internetworking Routing Transport layer Network applications Network programming Textbook ...
Words: 1522 - Pages: 7
...Standards Research IEEE Group The IEEE 802.1 Working Group is sanctioned to fret about and improve principles and proposed follows in the accompanying territories: 802 LAN/MAN structural planning, internetworking around 802 MANs, LANs, and other wide range networks, 802 by and large network administration, 802 Security, and convention layers above the layers of LLC & MAC. The 802.1 working assembly have four animated assignment aggregations: Interworking, Security, Time Sensitive Networking and Data Center Bridging. IEEE 802.1 handles the building design, security, Metropolitan Area Networks, Wide Area Networks and Local Area Networks, institutionalized by IEEE 802. Following are the key tasks of IEEE 802.1: • Outlines and executes models that manage network administration practices • Furnishes administrations, incorporating LAN/MAN administration, media access control (MAC) connecting, information encryption/encoding and network movement administration (Hiertz, Denteneer, et al. 2010) IEEE 802.1 is contained four assemblies that keep tabs on distinctive guidelines and arrangements in the accompanying zones: • Audio/video (A/V) bridging • Internetworking • Security • Data center bridging The Internetworking assembly handles generally structural planning, connection conglomeration, convention tending to, network way identification/calculation and other specialized practices and suggestions. Need of the IEEE 802 Standard IEEE 802 alludes to a group of IEEE standards...
Words: 1026 - Pages: 5
...Instruction Plan for CSE240 Lab on Data Structure and N/Ws Term: 4th Course No: CSE240 Course Title: Lab on Data Structures and Networks L: 0 T: 0 P: 4 Textbook: 1. Data Structures – Seymour Lipschutz :India Adapted Edition 2006 2. Data communication and networks- Forouzan-4TH Edition Reference Books: 3.Data Structures & Algorithms Using C- R.S Salaria-2nd Edition 4.Data Structures,Algorithms and applications in C++ --Sartaj Sahni—2nd Edition 5.PC Hardware in a Nutshell-Robert Bruce Thomsan and Barbara Fritchman Thomsan—July2003 :Second Edition Other readings: |Sr.No. |Journal articles as compulsory readings (Complete reference) | |6. |Cisco system advanced exam guide-CISCO press | |7. |Cisco system CCNA Exam dump guide –CISCO press | Relevant websites: |S.No. |Web address |Salient Features | |8. |http://www.java2s.com/Tutorial/C/0260__Data-Structure |A web page on Data Structure| | | ...
Words: 1499 - Pages: 6
...Management and Administration, Programming in C++, Java and Visual Basic .NET, System Analysis, Networking, Computer Security and Management Science, Business Management and Economics, Management Information System, Etcetera. HND ELECTRICAL/ELECTRONIC ENGINEERING Course content includes: Network Analysis, Engineering Mathematics, Digital Electronics, Telecommunications, Power Systems, Computer Technology, Computer Literacy, Microcomputer, Computer Applications, Fault Diagnosis, Control Systems, Equipment Maintenance, Power Electronics, Etcetera. CISCO (CCNA Exploration: Network Fundamentals) at College of Engineering, KNUST Course content includes: Internetworking, Introduction to TCP/IP, Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP, Cisco’s Internetworking Operating System (IOS) and Security Device Manager (SDM) CISCO (CCNA Exploration: Routing Protocols and Concepts) at College of Engineering, KNUST Course content includes: Introduction to...
Words: 649 - Pages: 3
...M.O.P VAISHNAV COLLEGE FOR WOMEN (AUTONOMOUS) COMMON TO B.SC COMPUTER SCIENCE AND B.C.A COMPUTER NETWORKS QUESTION BANK Two Marks Questions UNIT I KNOWLEDGE OF SPECIFIC FACTS 1. What is computer network? 2. What is the difference between computer network and distributed system? 3. What is client-server model? 4. What are local area networks? 5. What are metropolitan area networks? 6. What are wide area networks? 7. What is multicasting? 8. What is broadcasting? 9. What is unicasting? 10. What are switching elements? 11. What is routing algorithm? 12. What is blue tooth? 13. What is communication subnet? 14. What are peers? 15. What is a protocol stack? 16. What is topology? 17. What is ring topology? 18. What is star topology? 19. What is bus topology? 20. What is mesh topology? 21. What is tree topology? 22. What is connection-oriented service? 23. What is connection less service? 24. What is a datagram service? 25. What is store and forward network? 26. What is a cell? KNOWLEDGE OF TERMINOLOGY 27. Define broadcast links. 28. Define point-to-point links 29. Define gateway 30. Define Internet work. 31. Define protocol. 32. Define interface. 33. Define bandwidth. KNOWLEDGE OF CLASSIFICATION AND CATEGORY 34. Give the two types of transmission technology. 35. Give the different types of services. 36. Mention the...
Words: 2997 - Pages: 12
...PARENT’S ROLE TOWARDS THE INTERNET Thesis statement: Since surfing the internet have greatly affected the lives of young people, parents should develop a new practical system to monitor their children when they’re surfing the internet. Introduction: Surfing the internet have become very famous throughout the world. A. This paper aims to show the effects of internet to the lives of young people. B. It also aims to show the new practical system to monitor children while using the internet. I. The internet, like other technologies, has also its history. A. The invention of the internet started to help people in making their research more progressive. B. Later on, the Internet started to develop and become the way it is today. II. There are many effects of using the internet. A. Internet has been very useful to everyone. B. Internet has become one of the problems of many parents. III. Parents have roles in developing their children. A. It is important that children must have a proper guidance for their parents in their early childhood. B. Even though children become teenagers and have the right to decide for themselves, they still need to be guided to prevent bad information from corrupting their minds. IV. Parents could use new practical systems to monitor their children. A. They could use manual monitoring. B. They could also use advanced technology to...
Words: 3457 - Pages: 14
...IP ADRESSES CLASSES AND SPECIAL-USE IP ADDRESS SPACE NT2640 ENRIGHT 3/19/2016 DURAZO ENRIGHT NT2640 “Class A IP addresses were used for networks that had a large number of hosts on the network. The class permitted up to 126 networks by using the first octet of the address for the network identification. The first bit in this octet was always fixed or set to be zero. The following seven bits in the octet were then set to one which would complete the network identification” (tech faq, n.d.). In class A the most significant bits begin with a zero. In class B they begin with a 10. The class C begin with a 110. Class D IP addresses were reserved for multicasting purposes. These addresses begin with an octet in the 224-239 range. They would have leading bits of 1 1 1 0 and includes addresses from 224.0.0.0 to 239.255.255.255. I. RFC 1918 address ranges are: 10.0.0.0/8 (10.0.0.0 - 10.255.255.255) 172.16.0.0/12 (172.16.0.0 - 172.31.255.255) 192.168.0.0/16 (192.168.0.0 - 192.168.255.255) As required by RFC 1918, these addresses will never be routed outside the campus network. II. RFC 1918 addresses that IST will not route inside campus are: 10.0.0.0/12 (10.0.0.0 - 10.15.255.255) 192.168.0.0/16 (192.168.0.0 - 192.168.255.255) Campus computer users can use addresses in those two ranges however they like, confident that these addresses will not be routed by IST. ENRIGHT ...
Words: 1317 - Pages: 6
...You are a $10 million consulting company responding to a Request for Proposal for a prospective client. The client seeks an analysis of its existing network in anticipation of a large merger. This engagement would be worth over $5 million in revenue to your $10 million company. The client seeks to ensure that your small organization has the technical acumen to prepare, guide, and assess merging the two company networks. Write a two to three (2-3) page paper in which you: Prepare an opening statement that specifies your organization’s capabilities to manage a deployment of this size. Graphically depict and effectively promote your company’s structured development and services using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. Explain what the client can expect from your services. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or Dia. The completed diagrams...
Words: 316 - Pages: 2
...the network. The most challenges designers face when designing for scalability is usually expansion. 2) 100-99.80= 0.2% 0.2% * 365= 0.73 days 0.73*24= 17.52% hrs/day 17.52*7= 122.64% = 1 hrs and 22 mins downtime /per day Hr/week = 8 hrs 58 mins downtime/ per week Down time for minutes per day will be = 82 minutes Downtime for second per day will be = 4920 second 3) For this question number 3 I do not have significant answer for it so I just going to try my best to answer it usually the technical problem with this issues is could be packet switching delay. Because the latency accrued when switches and routers forward data. The latency depends on the speed of internal circuitry and CPU, and the switching architecture of the internetworking device. or the problems could accrued from serialization delay. The time to put digital data onto a transmission line, which depends on the data volume and the speed of the line. 4) The two tools that I research on that attacker use are attacking on your password , access attacks or DoS attack. Access attacks: first they will try to bait people go into get information from their own access and hack their way into it. Then find the way to get on to authentication services, then FTP service Password attacks: password attack usually refers to repeated attempts to identify a user account, password or both. These repeated attempts are called brute force...
Words: 313 - Pages: 2
...Table of Contents Introduction 2-4 Reasons 4-5 Advantages 5 Disadvantages 5 Summary 6 Reference 7 Introduction The Ethernet is a system used in the connection between a number of computers to form a Local Area Network(LAN), which consist of the physical and data link layer. During the 1980s, one of the first widely deployed Ethernet supported a theoretical data rate of 10Megabit per second(Mbps). Over the years through the advancement of technology, the maximum data rates were increased to 100Mbps to todays peak performing a whopping 1Terabit per second(Tbps), but only active in area of research. As workplaces slowly become a more computerised and network based, with the rise of emails and the internet, Ethernet has become more prevalent. Every computer that requires a connection to another or link to systems uses the Ethernet. The computers you use at home, in your office at work, in school that accesses the internet through the use of the Ethernet. Ethernet LANs consist of network nodes and interconnecting media. The network nodes fall into two major classes: Data terminal equipment (DTE) - Devices that are either the source or the destination of data frames. DTEs are typically devices such as PCs, workstations, file servers, or print servers that, as a group, are all often referred to as end stations. Data communication equipment (DCE) - intermediate network devices that receive and forward...
Words: 1657 - Pages: 7