...Building TCP/IP Networks This chapter will allow you to explore the common models of networking from the physical media connection to the application that displays the information, including how these layers interact and how they map to real networking devices. The labs in this chapter are designed to reinforce concepts from Chapter 3 of your Introduction to Networking textbook and allow you to explore some of the more important ideas with greater depth. You will explore the different types of network reference models available and analyze how each one applies to real network technology. You will also use packet capturing to look at real network traffic and explore the data link layer of networking. At the end of this chapter, you should be able to ■ Explain the purpose of network reference models ■ Describe the layers of the OSI reference model and explain what each layer provides ■ Describe the layers of the TCP/IP model and relate it to the OSI model and real networking equipment ■ Capture live packet information on a network and explain the data link layer portion of the packets captured ■ Enable network resources such as shared printers and file sharing on your own PC Lab 3.1: Network Reference Models approximate Lab Time: 10–15 min. Materials Needed: paper/pencil, Textbook, and Internet research This lab reviews the importance of modeling communication on a network. This will include a review of the state of networking before standardized reference models existed and...
Words: 270 - Pages: 2
...Paper When dealing with network management systems, reference models are developed to ensure that all aspects of network management have been taken care of during the management process. In other words, the models exist as a conceptual way of looking at, and breaking the network down into smaller, more manageable pieces. One of the most popular, and widely used and accepted network management reference models today is the FCAPS reference model. FCAPS stands Fault management, Configuration management, Accounting management, Performance management, and Security management. This paper will go into some detail to explain these management concepts as they relate to network management. The first management concept in the FCAPS model is fault management. Implementation of fault management ensures that the network continues to operate in the way that it was intended, and that corrective measures react appropriately when it does not. Faults can be described as any event that has a negative effect on or to the network. According to the Network Management Systems web site, “The goal of the fault management is to recognize the fault, isolate the fault, correct the fault and log the faults that occur in the network. Usually when a fault occurs, a network component will send a notification to the network operator so the process can be started to determine what the fault is and what caused it.” (Network Management Systems Nms). The second concept in the FCAPS model is configuration management...
Words: 747 - Pages: 3
...NTC 415 Week 1 Individual Enterprise Network Architectures To Buy this Class Copy & paste below link in your Brower https://homeworklance.com/downloads/ntc-415-week-1-individual-enterprise-network-architectures/ Or Visit Our Website Visit : http://homeworklance.com Email Us : lancehomework@gmail.com NTC 415 Week 1 Individual Enterprise Network Architectures Resources: SkillSoft (2012). CISA Domain: IS Operations, Maintenance, and Support – Part 2. Complete Enterprise Network Architectures Model module in Skillport. Prepare a 2- to 3-page paper describing the types of networks commonly found in enterprises. Describe the five types of networks and how they differ based on organizational requirements, interconnected devices and geographical area served. Describe the uses of directory services, DNS, DHCP, network management and remote access services. Generally, what do network services provide? What are the characteristics of wireless LAN or WLAN in terms of their use in a wired Ethernet Lan environment? Format your paper consistent with APA guidelines. A minimum of two outside academic references are required in addition to using course texts and SkillSoft course materials. NTC 415 Week 1 Individual Enterprise Network Architectures To Buy this Class Copy & paste below link in your Brower https://homeworklance.com/downloads/ntc-415-week-1-individual-enterprise-network-architectures/ Or Visit Our Website Visit : http://homeworklance.com Email Us : lancehomework@gmail...
Words: 3133 - Pages: 13
...THE OSI REFERENCE MODEL The concept of how a modern day network operates can be understood by dissecting it into seven layers. This seven layer model is known as the OSI Reference Model and defines how the vast majority of the digital networks on earth function. OSI is the acronym for Open Systems Interconnection, which was an effort formed by the International Organization for Standardization in 1982 with the goal of producing a standard reference model for the hardware and software connection of digital equipment. The important concept to realize about the OSI Reference Model is that it does not define a network standard, but rather provides guidelines for the creation of network standards. The OSI has become so accurate a concept that almost all major network standards in use today conform entirely to it's seven layer model. Though seven layers may at first appear to make a network seem overly complex, the seven layer OSI Model has been proven over the past twenty years to be the most efficient and effective way to understand this extremely complex subject. OSI LAYER 1: THE PHYSICAL LAYER The first and foundational layer of a network is the Physical Layer. The Physical Layer is literally what it's name implies: the physical infrastructure of a network. This includes the cabling or other transmission medium and the network interface hardware placed inside of computers and other devices which enable them to connect to the transmission medium. The purpose of the Physical...
Words: 2651 - Pages: 11
...Describe the OSI Model and how it relates to a network. The OSI Reference Model is becoming more popular everyday because it is a useful tool for learning about networks. The OSI Reference Model is where the communication system (network) is broken down into seven layers, where each layer serves a purpose. The OSI Reference Model defines what each layer’s function is but does not specify actual services in the layers. So that the vendors can write device drivers for a device; and not be concerned about the higher layers, this speeds up the process. The seven layers are divided into three groups: 1) Application (upper) layer, 2) Intermediate layer, 3) and Network oriented (lower) layer. With this system the OSI Reference Model is convenient because you’re able to communicate with a different computer network. The WAN Network operates on the Physical and data link layer of the OSI Reference Model. What are some Protocols? The purpose of the OSI Reference Model is to determine how data should be transmitted between two points in a network. Its job is to consistently work with other products. On which layer do switches and routers operate? Layer two, three, and four the Presentation layer, Session, and Transport Layer is where the witches and routers will operate. If Routers operate on more than one layer, what is the difference? Routers operate on layer three then apply on layer two and the switch the packets. Layer two would be Ethernet and layer three is the operating...
Words: 254 - Pages: 2
...Cristina Ortega Week 3 Lab 1/09/2015 Professor Yang Lab 3.1 Network Reference Models 3.1.1 1. What would happen if wireless devices were not governed by the WIFI Alliance and each vendor had its own standards and protocol? What impact would this have on your personal life or business communications? If the governed was not WIFI Alliance then each company will lose it customers because if you set a standard in just buying your product then you’re not going to go any farther than just a couple of months in selling them. This will lose interest in buying the product because then I would not know if it is safe or not. Lab 3.1 Review 1 1. Why would a three- layer model of communication that has the layers physical, network, and application be insufficient to adequately describe network communication? 2. What is the history of the OSI reference model? How did it come about and why was it created? ` 3. What is the history of the TCP/ IP model? Why was it created? TCP/IP has two different names that come from. These key protocols two are usually considered the most important. The internet Protocol is the primary OSI network layer protocol that provides addressing, Datagram routing and other functions in a network. They were developed together with TCP/IP providing the mechanism for implanting the internet. Lab 3.2 the OSI Reference Model 3.2.1 Using Figure 3- 1, define each layer of the OSI model in your own words and state what each layer provides. Use your...
Words: 609 - Pages: 3
...JOHN KOTELAWALA DEFENCE UNIVERsity | Assignment 01 | Advanced Network and Security | | ICT/12/0121 WMIL Wasalage | 9/23/2013 | | Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Table of Contents Abstract 01 Acknowledgement 02 Table of Content 03 List of Figures 04 1.0 Introduction to ISO OSI Reference Model 05 1.1 Physical Layer 07 1.2 Data Link Layer 08 1.3 Network Layer 10 1.4 Transport Layer 11 1.5 Session Layer...
Words: 5991 - Pages: 24
...NTC 415 Week 1 Individual Enterprise Network Architectures To Buy this Class Copy & paste below link in your Brower http://homeworklance.com/downloads/ntc-415-week-1-individual-enterprise-network-architectures/ Or Visit Our Website Visit : http://homeworklance.com Email Us : lancehomework@gmail.com NTC 415 Week 1 Individual Enterprise Network Architectures Resources: SkillSoft (2012). CISA Domain: IS Operations, Maintenance, and Support – Part 2. Complete Enterprise Network Architectures Model module in Skillport. Prepare a 2- to 3-page paper describing the types of networks commonly found in enterprises. Describe the five types of networks and how they differ based on organizational requirements, interconnected devices and geographical area served. Describe the uses of directory services, DNS, DHCP, network management and remote access services. Generally, what do network services provide? What are the characteristics of wireless LAN or WLAN in terms of their use in a wired Ethernet Lan environment? Format your paper consistent with APA guidelines. A minimum of two outside academic references are required in addition to using course texts and SkillSoft course materials. NTC 415 Week 1 Individual Enterprise Network Architectures To Buy this Class Copy & paste below link in your Brower http://homeworklance.com/downloads/ntc-415-week-1-individual-enterprise-network-architectures/ Or Visit Our Website Visit : http://homeworklance.com Email Us : lancehomework@gmail...
Words: 1741 - Pages: 7
...ETSI TR 101 984 V1.2.1 (2007-12) Technical Report Satellite Earth Stations and Systems (SES); Broadband Satellite Multimedia (BSM); Services and architectures 2 ETSI TR 101 984 V1.2.1 (2007-12) Reference RTR/SES-00274 Keywords architecture, broadband, IP, multimedia, satellite ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission...
Words: 13830 - Pages: 56
...Issue: Scalability Issues in Wireless Networks— Architectures, Protocols and Services By Amitabh Mishra, Guest Editor Scalability of computer-communication networks has been an important topic for quite some time. Internet community examined the services and protocols for scalability, and switching and routing researchers looked at the scalability of the switches and routers. Service providers studied the application architectures of the services for the scalable performance that they need to provide to subscribers and, the maintenance folks paid attention to scalability of service provisioning algorithms, protocols and software. Similarly, the wireless networking community has also started to look at the scalability issues that are relevant to wireless cellular, wireless local, as well as wireless personal area networks besides the emerging area of infrastructure-less networks such as ad-hoc and sensor networks. Surprisingly there is significant scope for research in the wireless scalability area as it relates to the ad hoc and sensor networks and this is one of the reasons why this topic was chosen for a special issue. A wireless sensor network is likely to have a large number of nodes perhaps in thousands to millions and that may create, potentially, numerous scaling problems in the networking protocols, addressing schemes, hardware architectures etc. The key questions that people are asking in this area are: whether wireless networks are scalable? And if they are, what are...
Words: 2043 - Pages: 9
...has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology. This protocol is also designed to run over major LAN types, notably Ethernet and Token...
Words: 1711 - Pages: 7
...Cover Page 1 2 Table Content 2 3 Question 1 3-7 4 Question 2 8 5 Question 3 9 6 Question 4 10-11 7 References 12 Database Question 1: Data Model/Database Model Flat file Flat file data model is model where data was store as a plain text file in a single table. Each line of the table hold each record with field and it is separated by commas or tabs. It cannot contain multiple tables like relational database. All the data stored by flat file, a computer file system will be store in a single...
Words: 2185 - Pages: 9
...NT 1210 Lab 3.1.1, 3.2.1, 3.3.1 The Purpose of Reference Models Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? The process of marketing the wireless devices would be much slower than if the Wi-Fi Alliance wasn’t governing them. This would impact my personal life or business communications in a big way. The reason is Wi-Fi Alliance certifies the products through pre-standard rules thus insuring the speed of product market and quality. The OSI Reference Model Exercise 3.2.1 Define each layer of the OSI Model and state what each layer provides. Physical – transmission and reception of the unstructured raw bit stream over a physical medium. Carries signals for higher layers and describes the electrical /optical , mechanical and functional interfaces. Data link – Error free transfer of data frames from node to node over the physical layer , allowing the higher layers to assume virtually error –free transmission over the link. Network - is the third layer, which controls the subnet operation by deciding which physical path data should take based on network conditions and priority of service with other factors. Transport - is the fourth layer, which ensures the error-free delivery of messages in sequence and with no losses or duplications. Higher layer protocols are relieved from concerns with data...
Words: 473 - Pages: 2
...IT331-CNS Capstone 6/28/12 OSI Model 1. Explain in detail the functions of each layer of the 7-layer OSI model. a. Layer 1 – Physical Layer – To establish and terminate the connection to a media source, it also does the conversions of data from one form to another. b. Layer 2 – Data-Link Layer – Transmits data from one point to another. c. Layer 3 – Network Layer – Transmits data from one host to another on another network. d. Layer 4 – Transport Layer – Controls the end-to-end connections, reliability, flow control of data in a network. e. Layer 5 – Session Layer – Controls connections between computers and manages application sessions in a network. f. Layer 6 – Presentation layer – This layer controls data representation and the encryption and decryption of data in a network. g. Layer 7 – Application Layer – This layer interacts with software applications that implement a communicating component. The application layer decides whether sufficient network or the requested communication exists. 2. Using the OSI model as a reference, describe how you would troubleshoot connectivity problems. h. To troubleshoot connectivity problems using the OSI model you should answer the following questions: i. Is your network cable plugged in? ii. Is there a link light on the Ethernet switch and Ethernet NIC? iii. Do you have an IP address? iv. Can you ping your default gateway? ...
Words: 693 - Pages: 3
...Lovely Professional University,Punjab Format For Instruction Plan [for Courses with Lectures and Labs Course No CAP510 Cours Title COMPUTER NETWORKS Course Planner 15946 :: Gunit Kaur Lectures Tutorial Practical Credits 4 0 0 4 Text Book: 1 Behrouz A. Forouzan, Data Communication and networking, 4th Ed., Tata McGraw Hills year of publication 2006 Other Specific Book: 2 Andrew S. Tanenbaum,Computer Network 2nd Edition, PHI, Third Edition 1997 3 Comer E. Doughlas,Computer Networks and Internets, 2nd Ed., Pearson, 2000 4 W. Stallings,Data and Computer Communications, 7th Ed., Pearson, 2002. 5 Black U,Computer Networks-Protocols, Standards and Interfaces, PHI 1996 Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 6 http://authors.phptr.com/tanenbaumcn4/ 7 http://williamstallings.com/DCC6e.html 8 http://www.mhhe.com/forouzan/dcn4sie 9 http://en.wikipedia.org/wiki/Computer_network Salient Features Website on reference book Website on reference book website on text book Provides information on basic concepts of networking 10 http://compnetworking.about.com/od/basicnetworkingconcepts Networking Basics - Key Concepts in Computer Networking /Networking_Basics_Key_Concepts_in_Computer_Networking .htm 1 Approved for Spring Session 2011-12 11 http://www.cisco.com/web/learning/netacad/course_catalog/P Tools required to understand...
Words: 1513 - Pages: 7