Beruflich Dokumente
Kultur Dokumente
Default Subnet Mask = 255.0.0.0
Class B
Possible Network Address from 128.0.0.0 to 191.255.0.0
Up to 65,534 IP Addresses =
Default Subnet Mask = 255.255.0.0
Class C
Possible Network Address from 192.0.0.0 to 223.255.255.0
Up to 254 IP addresses =
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]
8 Electronics Engineering| ITE College West
Default Subnet Mask = 255.255.255.0
Notes about Network Bits
Identify Network ID and Class of IP address
All Zero not allow
Notes about Host Bits
Identify Host ID
All Zero: reserved for network address
All Ones: reserved for broadcast address
Subnet Mask
IP Address & Subnet Mask = Network Address
IP Address Network Address = Host ID
TI Administrator uses the bits beyond the default Subnet Mask to create partitioned Network ID for
different departments, zones or area.
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]
9 Electronics Engineering| ITE College West
Chapter 16 LAN Architecture
1. Peer-to-Peer Network
a. Definition
i. Network computers are equal partners or peers.
ii. Each computer maintains their own resources.
b. Advantages
i. Easy to install
c. Disadvantages
i. It does not scale well
2. Client/Server Network
a. Definition
i. The server is a central computer that is continuously available to respond to
requests from clients for file, print, application, and other services.
b. Advantages
i. Greater security -by assigning each client a password,
ii. Easier to back up -all the network resources are on servers,
iii. Easier access -all the resources are located on servers
c. Disadvantages
i. Single point of failure
1. Without an operational server, the network cannot function at all
ii. Higher cost:
1. Servers require a trained, expert staff to administer and maintain
2. Servers require additional hardware and specialized software
3. Topology
a. Physical Topology
i. What are the various Physical Topologies?
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]
10 Electronics Engineering| ITE College West
ii. Comparison
b. Logical Topology
i. What are the various Logical Topologies?
1. Broadcast
a. means that each host sends its data to all other hosts on the
network medium.
b. There is no order the stations follow to use the network, it is
first come, first serve.
2. Token Ring
a. Token-passing controls network access by passing an
electronic token sequentially to each host.
b. When a host receives the token, it means that the host can
send data on the network.
c. If the host has no data to send, it passes the token to the
next host and the process repeats itself.
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]
11 Electronics Engineering| ITE College West
3. Fiber Distributed Data Interface (FDDI)
a. FDDI standard specifies dual channels running in opposite
directions.
b. Double-ring design provides much greater reliability and
recoverability.
c. A node can communicates on one or two of the channels.
d. If one channel fails, the node can communicate on the other
channel
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]
12 Electronics Engineering| ITE College West
Chapter 17 LAN Transmission Media
Shield Twisted Pair
(STP)
Screen Twisted
Pair (ScTP)
Unshielded Twisted Pair (UTP) Coaxial Cable Optical Fibre
Advantage
Better electromagnetic interference
immunity from within or outside cable
Easy to install
Less expensive than other
media
Small Size
Run longer distance then STP and
UTP
Less expensive than Optical Fibre
Not susceptible to
electromagnetic interference
Higher data rate than all media
Disadvanta
ge
More expensive compared to UTP
More difficult to install compared to
UTP
More prone to electrical noise
and interference
Distance between signal booster
shorter than coaxial cable and
optical fibre
More expensive to install
compared to twisted pair cable
More expensive than all media
Distance for booster shorter than
Coaxial Cable and Optical Fibre
Drawing:
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]
13 Electronics Engineering| ITE College West
Chapter 18 Internetworking Device
1. Purposes of Networking Devices
a. They allow a greater number of nodes to be connected to the network.
b. They increase the distance over which a network can extend.
c. They localize traffic on the network.
d. They isolate network problems so that the problems can be diagnosed more easily.
2. Types of Networking Devices
a. Hubs (Connectors)
i. They amplify signals.
ii. They propagate signals through the network. They do not require filtering.
iii. They do not require path determination or switching.
b. Bridges
i. They are more intelligence than hubs-that is, they can be analyze incoming
packets and forward (or drop) them based on addressing information.
ii. They collect and pass packets between two network segments.
iii. They control broadcast to the network.
iv. They maintain address tables.
c. Switches
i. Switches are similar to bridges but usually have more ports
ii. Switches provide a unique network segment on each port, thereby
separating collision domains
d. Routers
i. Routers separate broadcast domains and are used to connect different
networks.
ii. Routers direct network traffic based on the destination network layer
address (Layer 3)
e. Repeater
i. take in weakened signals, clean them up, amplify them, and send them on
their way along the network. Hence, increase network distance.
OSI Layer Internetworking component
Layer 1(Physical) Hub/repeater
Layer 2(Data link) Switch/Bridge
Layer 3 (Network) Router
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]
14 Electronics Engineering| ITE College West
Chapter 19: Ethernet
1. Data Collision
a. Data Collision occurs when more than one nodes of the network transmitted bits
both at the same time onto the transmission media/bus.
2. Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
a. Network devices with data to transmit will check the transmission media whether it
is free to transmit (listen before transmit).
b. If network is free, it will proceed to transmit.
c. If network is busy, it will wait.
d. Each device would only process data packet that is addressed to itself.
3. Ethernet
a. Advantages
i. Simplicity and ease of maintenance
ii. Protocol is straight forward especially error-handling
iii. Low cost of installation and upgrade
iv. High throughput at light load
b. Disadvantages
i. More complicated hardware as it using analogue sensing for carrier
and collisions
ii. Minimum 50 bytes of overhead frame
iii. No way to prioritize traffic
iv. Limited cable length
c. Collision Domain
i. Definition
1. Collision Domain - the network areas within which frames that
have collided are propagated.
ii. Propagate collision - Repeater and hubs (OSI Layer 1 devices)
1. Extending a network with a repeater or a hub, result in a larger
collision domain
iii. Do not propagate collision LAN switches, bridges and routers
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]
15 Electronics Engineering| ITE College West
Chapter 20 Virtual Local Area Network (VLAN)
1. Definition
a. It is technology which allows extension of LAN over WAN, breaching the
physical limitation of LAN.
2. Advantages
a. Reduced Network Traffic
b. Increased Network Security
c. Reduced management effort in creating sub-networks
d. Reduced hardware requirement
e. Increased control over multiple traffic types
f. Ability to create multiple logical switches in physical switch
g. Provide independence from physical topology of the network
3. VLAN Limitations
a. Broadcast Limitations
i. Server has limitations in number of broadcasts that may be forward
ii. Some network protocols uses extensively traffic hence limit broadcast
limits
b. Device Limitations
i. Each edge device could support 500 Ethernet address and this limits
about 20 devices per Network 21 port.
c. Port Constraints
i. Hubs do not have the capability to provide VLANs to individual ports.
This limits the extension of VLANs.
4. Assigning VLANs Membership
a. Port-Based
b. MAC- Based
c. Protocol-Based
d. Authentication-Based