Professional Documents
Culture Documents
Wireless and Wan Reviewer
Wireless and Wan Reviewer
jcirabagon@nvsu.edu.ph
Networks - allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages,
talk using IP telephones, participate in video conferences, compete in interactive gaming, shop using the Internet,
complete online coursework, and more.
Ethernet switches - function at the data link layer, Layer 2, and are used to forward Ethernet frames between devices
within the same network.
Router - connects one network to another network. The router is responsible for the delivery of packets across different
networks.
Gateway - is a combination of hardware and software that connects dissimilar network environments.
Firewall - is a system or group of systems that manages access between two or more networks.
IP Address - IP is a standard that defines the manner in which the network layers of two hosts interact. IP addresses are
32 bit long, hierarchical addressing scheme.
MAC Address - called the hardware address, is protocol-independent and is usually assigned at the factory. This address
is technically called the media access control address (MAC) because it is found on the MAC sub layer of the Data Link
layer.
Characteristics of a Network
Topology—There are physical and logical topologies.
The physical topology is the arrangement of the cables, network devices, and end systems. It describes how the
network devices are actually interconnected with wires and cables.
The logical topology is the path over which the data is transferred in a network. It describes how the network
devices appear connected to network users.
Speed—is a measure of the data rate in bits per second (b/s) of a given link in the network.
Cost—indicates the general expense for purchasing of network components, and installation and maintenance of
the network.
Security—indicates how protected the network is, including the information that is transmitted over the network.
The subject of security is important, and techniques and practices are constantly evolving. Consider security
whenever actions are taken that affect the network.
Availability— is the likelihood that the network is available for use when it is required.
Scalability—indicates how easily the network can accommodate more users and data transmission requirements.
If a network design is optimized to only meet current requirements, it can be very difficult and expensive to meet
new needs when the network grows.
Reliability—indicates the dependability of the components that make up the network, such as the routers,
switches, PCs, and servers. Reliability is often measured as a probability of failure or as the mean time between
failures (MTBF).
Types of Networks
o LAN - is a computer network that interconnects computers within a limited area such as a residence,
school, laboratory, university campus or office building.
o MAN - A metropolitan area network is a computer network that interconnects users with computer
resources in a geographic region of the size of a metropolitan area
o WAN - is a telecommunications network that extends over a large geographical area for the primary
purpose of computer networking. Wide area networks are often established with leased
telecommunication circuits.
Leased Line – synchronous serial
Circuit-Switched – Asynchronous serial, ISDN Layer 1
Frame Relay - synchronous serial
Broadband Access – Cable, DSL, Wireless WAN
LAN Topologies
Logical Topology – determines how the hosts access the medium to communicate across the network.
Broadcast Topology – messages are sent FIFO
Token Passing – controls network access sequentially by passing a token to each hosts.
Physical Topology – the physical layout of the components on the network.
Bus – uses a common cable to connect each hosts. The ends of the cables use terminators to
prevent signal reflections.
Ring – Host are connected in a physical ring. Uses a token to allow data transmission.
Single and Dual Ring
Star – uses a central connection point (hub, switch, router). Easy to troubleshoot
Extended/Hierarchical Star – a typical star topology with an additional networking device used to
extend/increase the size of the network.
Mesh – connects all devices to each other. Internet is a best example.
Hybrid – combines two or more basic network topologies.
Router Memory
Memory Description
RAM - Volatile memory that provides temporary storage for various applications and processes including the following:
Running IOS Running configuration file IP routing and ARP tables Packet buffer
ROM - Nonvolatile memory that provides permanent storage for the following:
Boot-up instructions Basic diagnostic software Limited IOS in case the router cannot load the full-featured IOS
NVRAM - Nonvolatile memory that provides permanent storage for the following:
Startup configuration file (startup-config)
Flash - Nonvolatile memory that provides permanent storage for the following:
IOS Other system-related files
Ethernet Technologies
10BASE-T – uses star topology. 10 represents the speed of 10Mbps, the base represents baseband
transmission and T represents twisted pair cabling.
ISO/OSI Reference Model – an industry standard framework that is used to divide network communication into 7 layers.
Multi-layer Switching