You are on page 1of 8

Midterm Exam Lecture Reviewer: ITEC 90 1

What is network? Local area network (LAN)


 A set of hardware devices connected  a group of computers connected to one
together, either physically or logically to another in a single building.
allow them to exchange information.
People expect interoperability from Wide area network (WAN)
electronic devices for their convenience.  spans multiple geographic areas and is
usually connected by common
History of the Interneting telecommunication carriers.
 the term that describes the processes
involved in designing, implementing, Metropolitan area network (MAN)
upgrading, managing and otherwise  is a computer network that interconnects
working with networks and network users with computer resources in a
technologies. geographic region of the size of a city.

Computer networks Storage area network (SAN)


 allows transfer of files, data, and shared  refers to a series of storage devices that
application are networked together to provide very
fast data storage for a network or
What if we want to expand our network? subnetwork.
Then, use a network device, either a switch or
a hub, to connect more than two computers
together.
Networking Terminology (cont)

Network Operating System (NOS)


Networking Terminology  Allows communication, security, and
distribution of data, files, and applications
Media over a network.
 Refers to the wire cabling that form the
connections in most networks Network Interface Card (NIC)
 Some networks use wireless transmission  A device that allows a computer or other
media, such as infrared or radio signals device to connect to a network through
Media the media
Servers Networking hardware
 host the resources for the clients to use  Describes all the physical components of
and provide security a network, such as the NIC, cable, hub,
 contains the file, print, application, switch, router, and any related connectors
security, and other services in a central or devices.
computer that is continuously available to
respond to client requests. Networking software
Client  The programs used to run a network.
 Is the computer that requests resources
from the server Virtual private networks
 Network that uses a public
In a client/server network arrangement, communications infrastructure (like the
network services are located in a dedicated Internet) to facilitate private
computer whose only function is to respond to communication between a company LAN
the requests of clients. and remote employees.

 Extranet is the part of the company’s


Network Types: network that allows access to
nonemployees.
Peer-to-peer network  Intranet is the part of the company’s
 When every computer on a network acts network that allows access to
as both a client and a server employees
 Also known as “workgroups”
Midterm Exam Lecture Reviewer: ITEC 90 2

Network Topology
 the link that ties end users to a data
center and serves as the link between the
devices within the data center.

4 topologies most commonly used to build


most networks:
 Star
 Bus
 Mesh
 Ring Mesh topology
 is one which all of the nodes are directly
Star topology connected with all of the other nodes.
 is configured by connecting all of the
nodes on the network to central device. two types of mesh network:
full mesh is one which every workstation is
The central connection allows the network to connected to the other ones in the network.
continue functioning even if a single node or
cable fails. The major drawback to this partial mesh, the workstations have at least
topology is that if the central device fails, then two NICs with connections to other nodes on
the network will become unstable or cease to the network.
function.
Mesh networks are commonly used in
WANs.

Bus topology
 is one which all of the devices on the
network are connected with a single
cable with terminators on each end.

In this topology, messages sent from a node


are broadcast to all nodes on the network. Open Systems Interconnection (OSI)
Only the intended recipient node accepts and model
processes the message.  Presented in 1984 by the International
Organization for Standardization (ISO) to
provides the architectural framework for
all of network and computing
communication.
 Based on examination of existing
protocols, ISO recommended a seven-
layer network model
 OSI allows different vendors to implement
Ring topology networks that permit communication
 is one which the network is a loop where among the wide variety of network
data is passed from one workstation to implementations
another.
The OSI model is not an absolute standard
Each node in the network acts as a repeater for computer networks
keeping the signal strong as it travels through  Used as a reference model, a conceptual
the network. A node will generate a signal that framework, a blueprint of how communication
is addressed to a specific computer on the should take place.
network, and then the signal will be sent
through the network in either a clockwise or
counterclockwise direction.
Midterm Exam Lecture Reviewer: ITEC 90 3

Reasons for Layering: 5. Session layer


 Simplifies the networking model  Control for data exchange (full or half
 Enables programmers to specialize in a duplex)
particular level or layer  Clocking or timing
 Provides design modularity
 Encourages interoperability 6.Presentation layer
 Allows networking vendors to produce  Data translation
standardized interfaces  Data formatting
 Data syntax restructuring
Protocol
 Defined method for communicating 7.Application layer
between systems  Initiating the request for network services
 Providing network services to
Computers must use a common protocol to applications such as email and Web
communicate properly browsers
Examples: TCP/IP and IPX/SPX  concerned with user interaction with the
computer and the network
Peer communication
 Each layer will only talk to its peer on the
opposite side of the communications Note for OSI Model:
process
 Each layer is unaware of the activities of  The four lower layers (called the data
all other layers of the model flow layers) define connection protocols
and methods for exchanging data.
 The three upper layers (called the
application layers) define how the
OSI model 7 layers applications within the end stations
communicate with each other and with
this a conceptual framework that describes users.
the functions of a networking or
telecommunication system.
- Keith Shaw What is TCP/IP model?
Internet Protocol (IP)
1. Physical layer
 Defines the physical characteristics of the  is the primary OSI network layer (layer
network hardware, including cable and three) protocol that provides addressing,
connectors datagram routing and other functions in
an internetwork.
2. Data Link layer
 NIC software functions, including the Transmission Control Protocol (TCP)
identification of the source and destination  is the primary transport layer (layer four)
nodes via their physical addresses (Media protocol, and is responsible for
Access Control addresses) connection establishment and
 Definition of how data is packaged for
management and reliable data transport
transport in smaller units known as frames
between software processes on devices.
The Data Link sublayers:
Logical Link Control (LLC) layer 4 layers of TCP/IP model
Media Access Control (MAC) layer 1. Network access or Link layer
 defines the protocols and hardware
3. Network layer required to deliver data across a physical
 Software/logical addressing for data packets network.
 Data routing and connectivity 2. Internet layer
 defines the protocols for the logical
4. Transport layer
transmission of packets over the network.
 End-to-end, error-free transmission and
delivery between the ultimate sender and 3. Transport layer
ultimate receiver  defines protocols for setting up the level
of transmission service for applications.
4. Application layer
 Defines protocols for node-to-node
application
Midterm Exam Lecture Reviewer: ITEC 90 4

Data Encapsulation and De-encapsulation 2 types of twisted-pair cabling:


in network
Encapsulation - adding header and trailer to Unshielded twisted pair (UTP) - ability to
the data cancel interference. Used for telephone wiring
De-encapsulation - removing header and Shielded twisted pair (STP) - protect against
trailer to the data signal degradation. Use in Ethernet network
installations

Cisco Three-Layer Hierarchical model


 Does not describe how communications 3 types of UTP implementation
take place 1. Straight through - Used in local area
 Focuses on how best to design a network networks to connect a computer to a network
hub such as a router. Also called as patch
Access Layer cable.
 The layer closest to the users, where it is
attach to the network 2. Cross-over - connects two computers
together without using a switch (or two
Distribution Layer switches directly). It is most often used to
 Separates the Access layer from the connect two devices of the same type: e.g.
Core layer two computers (via network interface
 Implements network policies, and controller) or two switches to each other.
provides many networking services such
as Network Address Translation (NAT), 3. Rollover Wired Cables - most commonly
firewall protection, and quality of service called rollover cables, have opposite Pin
(QoS) assignments on each end of the cable. Not
 IP addressing hierarchy is managed at intended to carry data but instead create an
this layer interface with the device.

IP addressing is the process of assigning Coaxial (or coax) cable


unique IP addresses to devices on the  is a type of transmission line, used to
network carry high frequency electrical signals
with low losses.
Core Layer Fiber-Optic cabling
 Responsible for switching large amounts  used to carry light from the transmitting
of data quickly and efficiently device to the receiver.

What is Network Cabling? Network Segmentation


 referred to as communications cabling Segmentation
and the primary media through which  The breaking down of a single heavily
data is transferred. populated network segment into smaller
 This may be between computers, segments, or collision domains,
routers,switches and/or other network populated by fewer nodes
based devices.
 a major component in any LAN Segment
infrastructure.  Part of a network that is divided logically
or physically from the rest of the network
Types of Network Media
 twisted-pair cabling Command Error
 coaxial cabling Incomplete command – did not enter all the
 fiber-optic cabling keywords or values
 Wireless Ambiguous command – did not enter
enough characters
Twisted-pair Cabling Incorrect / Unrecognized command –
 A type of cabling in which two conductors wrong command or no command as such
of a single circuit are twisted together for
the purposes of improving
electromagnetic compatibility.
Midterm Exam Lecture Reviewer: ITEC 90 5

Repeaters Gateways
 The number of nodes on a network and  Combination of hardware and software
the length of cable used Influence the  Translates between different protocol
quality of communication on the network suites
Ethernet
Attenuation  A network access method (or media
 The degradation of signal clarity access method) originated by the
University of Hawaii
Wireless Access Points
 Provide cell-based areas where wireless Fast Ethernet
clients such as laptops and PDAs can  Provides ten times the data transmission
connect to the network rate

Bridges Gigabit Ethernet


 Operate at the Data Link layer of the OSI  The next iteration of Ethernet, increasing
model the speed to 1000 Mbps
 Filter traffic between network segments  can work in half-duplex mode through
by hubs
 examining the destination MAC address
Half-duplex communications
Broadcast frame  Devices can send and receive signals,
 special frames that are delivered to every but not at the same time
device on the LAN
Full-duplex communications
Broadcast – a process that send a switch of  Devices can send and receive signals
frames or traffic to all member of broadcast simultaneously
domain and ports.

Transparent Bridges
 Also called learning bridges What is IP Address?
 Build a table of MAC addresses as they  Internet Protocol address
receive frames  is an identifying number for network
hardware connected to a network.
Mac-address table - A lists which MAC  allows a device to communicate with
address is connected to other devices over an IP-based network
which port. like the internet.

Switches  Has made up of 32 binary bits


 Increase network performance by  network prefix
reducing the number of frames  host number
transmitted to the rest of the network  divided into four octets
 assigned by a central numbering
Routers authority, the Internet Assigned Numbers
 Provide filtering and network traffic Authority (IANA).
control on LANs and WANs
 Connect multiple segments and multiple Dotted-decimal notations used when binary
networks IP addresses are written in decimal format.

Internetworks – Networks connected by Octet - four decimal numbers separated by


multiple routers dots, converted to its binary form.

Routing table - Lists a route for every Network Address – the first IP address in a
network that a router can reach. network. It is reserved and is only used to
identify a whole set of addresses on a
Brouters network.
 Hybrid device
 Functions as both a bridge for Host Address - IP addresses assigned to
nonroutable protocols and a router for computers and interfaces.
routable protocols
Midterm Exam Lecture Reviewer: ITEC 90 6

MAC Address – identifies a specific NIC in a The subnet address is used to identify the
computer on a network. network itself.

Broadcast Address – the address used by What is sub-netting?


computers to send to all codes in a network.  The word subnet is short for sub network,
a smaller network within a larger one.
Broadcast – a frame meant for the entire  Subnets have a beginning and an ending
network beginning number is the "Network ID“
ending number is the "Broadcast ID."
Broadcast Types:
1. Flooded broadcasts – Broadcasts for any Network ID - the official designation for a
subnet particular subnet
2. Directed broadcasts – are for a specific Broadcast ID - send data to everyone on the
subnet subnet (such as a multicast)

Broadcasts three types of IP packets:


Unicasts are packets sent from one host to
one other host
Multicasts are packets sent from one host to
a group of hosts
Broadcasts are packets sent from one host
to all other hosts on the local network

Domain Name System (DNS) maps a


readable name to an IP address.

Dynamically Allocated IP Addresses:


A network administrator is responsible for
assigning which devices receive which IP
addresses in a corporate network.

Static – by configuring the device with a


specific address
Dynamic – by letting the device automatically
learn its address from the network

Loopback Address – used for testing


purposes. Allows a computer to send packets
to itself without generating network traffic

Remember the following three rules:


 The first octet on an address dictates the
class of that address.
 The subnet mask determines what part of
an address identifies the network, and
what part identifies the host.
 Each class has a default subnet mask. A
network using its default subnet mask is
referred to as a classful network.

Getting the Subnet Masks Steps


1. Write down the 32-bit address and the subnet
mask (174.24.4.176/26).
2. Draw a vertical line just after the last 1 bit in the
subnet mask.
3. Copy the portion of the IP address to the left of
the line. Place all 0s for the remaining free spaces
to the right. This is the subnet number.
Midterm Exam Lecture Reviewer: ITEC 90 7
Midterm Exam Lecture Reviewer: ITEC 90 8

You might also like