Sie sind auf Seite 1von 15

February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

1 Electronics Engineering| ITE College West



Chapter 10 Introduction to Computer Networking
1. Definition of LAN
Local Area Networks (LANs) connect computers, peripherals, terminals, and other devices in a single
building or a define area.

2. Definition of WAN
Wide Area Networks (WANs) connect user networks over large geographic areas.

3. What is NIC?
Network Interface Cards.
a. Factors to consider when selecting NIC
i. Type of Network: Ethernet, Token Ring, FDDI
ii. Type of media: Twisted-pair, Coaxial, Fiber-optic cable
iii. Type of system bus: PCI, ISA

4. Definition of Digital Bandwidth
Digital Bandwidth is the measure of how much digital information can flow from one place to another
in a given amount of time.
Bits per second is the unit of bandwidth.
a. Calculation Best Download Time
Best Download Time = (Size in Bits) / (Bandwidth)

5. Definition of Throughput
Throughput refers to actual, measured bandwidth at a specific time of day that uses specific Internet
routes, while downloading a specific file.

a. Calculate Typical Download Time
Typical Download Time = (Size in Bits) / (Throughput)

6. Factors affect Network Performance (Bandwidth and Throughput)
a. Internetworking devices
b. Type of data being transferred
c. Topology
d. Number of users
e. User's computer
f. Server computer
g. Power and weather-induced outages

7. List advantages and disadvantages of using a Wireless LAN compared to Cable Network.
Two Disadvantages over Cable Network:
i) high-speed transfers
ii) security
iii) uptime reliability of cabled networks.
Advantage over Cable Network
i) flexibility
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

2 Electronics Engineering| ITE College West


8. Draw suitable diagrams to illustrate the following types of network topology.

February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

3 Electronics Engineering| ITE College West

Chapter 11: Layered Network Model
1. What is Protocol?
Defined as a set of rules, or an agreement, that determines the format and transmission of data.

2. Advantages of OSI Model.
structured to reduce the complexity of hardware and software developments
it defined the standard interface for both the hardware and software so as to ensure
interoperable (work with each other properly) between different vendors.
simplified the learning process and hence accelerates the evolution of computer networking
technology.

3. What is Open System Interconnection (OSI) Reference Model? What is each OSI layer?



4. Examples of Protocol in OSI layers
Application, Presentation and Session Layers used the following protocols:
a. FTP (File Transfer Protocol)
b. HTTP (Hypertext Transfer Protocol)
c. SMTP (Simple Mail Transfer Protocol)
d. DNS (Domain Name Service)
e. TFTP (Trivial File Transfer Protocol)
Transport Layer used:
a. TCP (Transmission Control Protocol) and
b. UDP (User Datagram Protocol).
Network Layer used:
a. IP (Internet Protocol).
Data Link and Physical Layers used:
a. WAN and LAN technologies.


February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

4 Electronics Engineering| ITE College West

Chapter 12 TCP/IP Layered Model

1. What is TCP/IP Layered Model












2. Similarities and Differences of OSI and TCP/IP Model
a. Similarities
i. Both have layers.
ii. Both have application layers, though they include very different services.
iii. Both have comparable transport and network layers.
iv. Packet-switched (not circuit-switched) technology is assumed.
b. Differences
i. TCP/IP combines the presentation and session layer issues into its
application layer.
ii. TCP/IP combines the OSI data link and physical layers into one layer.

3. Advantages and Disadvantages of TCP/IP
a. Advantages
i. Open protocol.
ii. Contains a set of utilities for connecting dissimilar operating systems
iii. Uses scalable, cross-platform client-server architecture TCP/IP can expand
(or shrink) to meet future needs and circumstances.
iv. Designed to be routable, robust, and functionally efficient.

b. Disadvantages
i. TCP/IP is a relatively large protocol stack that can cause problems in MSDOS
based clients

application layer
that handles high
level protocols,
issues of
representation,
deals with the quality of service issues
of reliability, flow control, and error
correction.
Connection-oriented Protocol: TCP
o It dialogues between source and
destination while packaging
application layer information into
units called segments.
is to send source packets from any
network on the internetwork and have
them arrive at the destination
independent of the path and networks
they took to get there.
Best path determination and packet
switching
Protocol: Internet protocol (IP).
It concerns with all of the
issues that an IP packet
requires to actually make a
physical link.

WAN technology details,


and all the details in the OSI
physical and data link layers.
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

5 Electronics Engineering| ITE College West

Chapter 13 Networking Protocol

1. Protocols
a. Protocols are the system of rules and procedures that govern communication between two or more devices.

2. Protocol Stack
a. A protocol stack is a combination of protocols.

3. Binding Process
a. It is the process by which protocols become connected to each other and the NIC.

4. OSI Reference Model and Protocols



















Physical Layer
IEEE802.3 (Ethernet)
IEEE802.4 (Token
Passing)
IEEE802.5 (Token Ring)
February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

6 Electronics Engineering| ITE College West

Chapter 14 TCP/IP Data Flow Connection-oriented Network

1. Connection-oriented Network
a. Definition
i. Requires a dedicated physical circuit path to exist between sender and
receiver for the duration of the call.
b. Advantage
i. Guarantees that all packets in the same transmission will sequentially travel
over the same physical transmission path
c. Disadvantage
i. Each transmission is limited to one path, hence cannot achieve greater
transfer speed by using multiple parallel paths.
d. Example Protocol
i. TCP/IP

2. Connectionless Network
a. Definition
i. Packet switching divides a continuous stream of data into packets, and
enable data from multiple devices on the network to share the same
communication channel simultaneously with precise routing information.

3. Data Encapsulation
a. Steps of Data Encapsulation
i. Build the data;
ii. Package the data for end-to-end transport;
iii. Add the network IP address to the header;
iv. Add the data link layer header and trailer;
v. Convert to bits for transmission.

February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

7 Electronics Engineering| ITE College West

Chapter 15 IP Addressing

IP Address Format known as Dotted Decimal Notation.

Class A


Possible Network Address from 1.0.0.0 to 127.0.0.0
Up to 16,777,214 IP addresses = (


Default Subnet Mask = 255.0.0.0

Class B


Possible Network Address from 128.0.0.0 to 191.255.0.0
Up to 65,534 IP Addresses =


Default Subnet Mask = 255.255.0.0

Class C


Possible Network Address from 192.0.0.0 to 223.255.255.0
Up to 254 IP addresses =


February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

8 Electronics Engineering| ITE College West

Default Subnet Mask = 255.255.255.0

Notes about Network Bits
Identify Network ID and Class of IP address
All Zero not allow

Notes about Host Bits
Identify Host ID
All Zero: reserved for network address
All Ones: reserved for broadcast address

Subnet Mask
IP Address & Subnet Mask = Network Address
IP Address Network Address = Host ID

TI Administrator uses the bits beyond the default Subnet Mask to create partitioned Network ID for
different departments, zones or area.

February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

9 Electronics Engineering| ITE College West

Chapter 16 LAN Architecture

1. Peer-to-Peer Network
a. Definition
i. Network computers are equal partners or peers.
ii. Each computer maintains their own resources.
b. Advantages
i. Easy to install
c. Disadvantages
i. It does not scale well

2. Client/Server Network
a. Definition
i. The server is a central computer that is continuously available to respond to
requests from clients for file, print, application, and other services.
b. Advantages
i. Greater security -by assigning each client a password,
ii. Easier to back up -all the network resources are on servers,
iii. Easier access -all the resources are located on servers
c. Disadvantages
i. Single point of failure
1. Without an operational server, the network cannot function at all
ii. Higher cost:
1. Servers require a trained, expert staff to administer and maintain
2. Servers require additional hardware and specialized software
3. Topology
a. Physical Topology
i. What are the various Physical Topologies?


February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

10 Electronics Engineering| ITE College West

ii. Comparison


b. Logical Topology
i. What are the various Logical Topologies?
1. Broadcast
a. means that each host sends its data to all other hosts on the
network medium.
b. There is no order the stations follow to use the network, it is
first come, first serve.

2. Token Ring
a. Token-passing controls network access by passing an
electronic token sequentially to each host.
b. When a host receives the token, it means that the host can
send data on the network.
c. If the host has no data to send, it passes the token to the
next host and the process repeats itself.


February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

11 Electronics Engineering| ITE College West

3. Fiber Distributed Data Interface (FDDI)

a. FDDI standard specifies dual channels running in opposite
directions.
b. Double-ring design provides much greater reliability and
recoverability.
c. A node can communicates on one or two of the channels.
d. If one channel fails, the node can communicate on the other
channel


February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

12 Electronics Engineering| ITE College West

Chapter 17 LAN Transmission Media

Shield Twisted Pair
(STP)
Screen Twisted
Pair (ScTP)
Unshielded Twisted Pair (UTP) Coaxial Cable Optical Fibre
Advantage




Better electromagnetic interference
immunity from within or outside cable
Easy to install
Less expensive than other
media
Small Size
Run longer distance then STP and
UTP
Less expensive than Optical Fibre
Not susceptible to
electromagnetic interference
Higher data rate than all media
Disadvanta
ge




More expensive compared to UTP
More difficult to install compared to
UTP
More prone to electrical noise
and interference
Distance between signal booster
shorter than coaxial cable and
optical fibre
More expensive to install
compared to twisted pair cable
More expensive than all media
Distance for booster shorter than
Coaxial Cable and Optical Fibre

Drawing:










February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

13 Electronics Engineering| ITE College West

Chapter 18 Internetworking Device
1. Purposes of Networking Devices
a. They allow a greater number of nodes to be connected to the network.
b. They increase the distance over which a network can extend.
c. They localize traffic on the network.
d. They isolate network problems so that the problems can be diagnosed more easily.

2. Types of Networking Devices
a. Hubs (Connectors)
i. They amplify signals.
ii. They propagate signals through the network. They do not require filtering.
iii. They do not require path determination or switching.

b. Bridges
i. They are more intelligence than hubs-that is, they can be analyze incoming
packets and forward (or drop) them based on addressing information.
ii. They collect and pass packets between two network segments.
iii. They control broadcast to the network.
iv. They maintain address tables.

c. Switches
i. Switches are similar to bridges but usually have more ports
ii. Switches provide a unique network segment on each port, thereby
separating collision domains

d. Routers
i. Routers separate broadcast domains and are used to connect different
networks.
ii. Routers direct network traffic based on the destination network layer
address (Layer 3)

e. Repeater
i. take in weakened signals, clean them up, amplify them, and send them on
their way along the network. Hence, increase network distance.


OSI Layer Internetworking component
Layer 1(Physical) Hub/repeater
Layer 2(Data link) Switch/Bridge
Layer 3 (Network) Router


February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

14 Electronics Engineering| ITE College West

Chapter 19: Ethernet

1. Data Collision
a. Data Collision occurs when more than one nodes of the network transmitted bits
both at the same time onto the transmission media/bus.

2. Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
a. Network devices with data to transmit will check the transmission media whether it
is free to transmit (listen before transmit).
b. If network is free, it will proceed to transmit.
c. If network is busy, it will wait.
d. Each device would only process data packet that is addressed to itself.

3. Ethernet
a. Advantages
i. Simplicity and ease of maintenance
ii. Protocol is straight forward especially error-handling
iii. Low cost of installation and upgrade
iv. High throughput at light load
b. Disadvantages
i. More complicated hardware as it using analogue sensing for carrier
and collisions
ii. Minimum 50 bytes of overhead frame
iii. No way to prioritize traffic
iv. Limited cable length

c. Collision Domain
i. Definition
1. Collision Domain - the network areas within which frames that
have collided are propagated.
ii. Propagate collision - Repeater and hubs (OSI Layer 1 devices)
1. Extending a network with a repeater or a hub, result in a larger
collision domain
iii. Do not propagate collision LAN switches, bridges and routers

February 27, 2012 [COMMUNICATION & NETWORKING STUDY NOTES CHAPT 10-20]

15 Electronics Engineering| ITE College West

Chapter 20 Virtual Local Area Network (VLAN)

1. Definition
a. It is technology which allows extension of LAN over WAN, breaching the
physical limitation of LAN.

2. Advantages
a. Reduced Network Traffic
b. Increased Network Security
c. Reduced management effort in creating sub-networks
d. Reduced hardware requirement
e. Increased control over multiple traffic types
f. Ability to create multiple logical switches in physical switch
g. Provide independence from physical topology of the network

3. VLAN Limitations
a. Broadcast Limitations
i. Server has limitations in number of broadcasts that may be forward
ii. Some network protocols uses extensively traffic hence limit broadcast
limits

b. Device Limitations
i. Each edge device could support 500 Ethernet address and this limits
about 20 devices per Network 21 port.

c. Port Constraints
i. Hubs do not have the capability to provide VLANs to individual ports.
This limits the extension of VLANs.

4. Assigning VLANs Membership
a. Port-Based
b. MAC- Based
c. Protocol-Based
d. Authentication-Based

Das könnte Ihnen auch gefallen