Professional Documents
Culture Documents
Itnet - Midterm Reviewer
Itnet - Midterm Reviewer
COMPUTER NETWORKS
NETWORK HARDWARE
A computer network can be as small as two
computers connected by a single cable (or
wirelessly) to the largest network in the world—
the Internet.
To connect a large number of PCs, specialized
equipment and protocols have been designed to
carry out tasks such as segmenting domains,
preventing broadcast storms, and moving packets
from one part of the network to the other as
efficiently as possible. • A data frame sent to every device on a network
segment at the same time is referred to as a
HUB Broadcast.
• Too many broadcasts in a network can cause
delays and dramatically reduce performance.
• A high number of broadcasts causes an enormous
amount of traffic to traverse the network at any
one time.
• A broadcast is usually sent when a data frame is
trying to find a host in the network and doesn’t
know its current location.
• Switches operate by building a list of which PCs
are connected to which ports, allowing the
• A Hub simply allows several networking devices available bandwidth to be used a lot more
to communicate. efficiently.
• Each device plugs into a port on the hub using a • If a PC wants to send data to another PC via a
network cable (more on these cables later). switch, the switch will forward the traffic only to
The simplest network you can build is a few pcs the port to which the intended recipient is
connected to a hub. connected.
Hubs have no memory or hard drive, so they can • If it doesn’t know the port, it will send out a
never remember which device is plugged into broadcast to find out where in the network the
which port. PC is.
• When a hub receives data on one port, it just • Switches and hubs are designed to forward
forwards it to all the other ports. This causes a lot broadcast traffic as data frames addressed to
of unnecessary traffic to pass through the every device in the network.
network. • Switches and hubs are designed to forward
One drawback of using hubs is that, because they broadcast traffic as data frames addressed to
have no memory, they can never keep a record of every device in the network.
which PC is plugged into which port. • Because switches only forward broadcast
For this reason, every time one PC wants to information when the destination is unknown,
speak to another, every single PC plugged into they are used to create smaller collision domains.
the hub gets a copy of the information (contained
within a frame) sent out on the wire.
Every time a PC receives this information, it has
to use processing power to determine whether it
is the intended recipient.
• As you can imagine, this is very inefficient and
can become a major problem as more and more
devices are connected to the hub.
COLLISION DOMAIN
SWITCH
Networking 2 – 2nd Semester Midterm Reviewer
COLLISION DOMAIN
SWITCH
Networking 2 – 2nd Semester Midterm Reviewer
The switch CLI can be accessed through three If you're in need of a console cable but
popular methods: don't have a serial port on your
computer, this is the perfect solution to
Telnet and SSH your problem.
- use the IP network in which the Simply attach the USB-to-Serial cable
switch resides to reach the to the Serial-to-RJ45 rollover cable.
switch.
- require software on the user’s ACCESSING THE CLI WITH TELNET
device, but they rely on the AND SSH
existing TCP/IP network to
transmit data. Telnet
uses the concept of a Telnet client (the
Console terminal application) and a Telnet server
- a physical port built (the switch in this case).
specifically to allow access to Telnet client - the device that sits in
the CLI. front of the user, accepts keyboard input
and sends those commands to the Telnet
- requires both a physical
server.
connection between a PC (or
Telnet server - accepts the text,
other user device) and
interprets the text as a command, and
- the switch’s console port, as
replies back.
well as some software on the
Telnet sends all data (including any
PC.
username and password for login to the
switch) as cleartext data.
SSH
encrypts the contents of all messages,
the passwords, avoiding the possibility
of someone capturing packets in the
network and stealing the password to
network devices
User mode
It lets you issue nondisruptive
commands and displays some
information.
Privileged mode
Key Sequences for Command Edit and Recall supports a superset of commands
compared to user mode, including
commands that might disrupt switch
operations.
Commands used in this context are configuration mode. For example, the
called subcommands — or, in this first command prompt after you enter
specific case, interface subcommands. configuration mode lists (config),
meaning global configuration mode.
EXEC Command After the line console 0 command, the
Movement from enable mode to global text expands to (config- line), meaning
configuration mode line configuration mode.
Each time the command prompt
Hostname [Fred] global configuration changes within config mode, you have
command moved to another configuration mode.
to configure the switch’s name
Common Switch Configuration Modes
line console 0 command
Movement from global configuration
mode to console line configuration
mode
- The running (active) forwards that broadcast frame out all other
configuration file is stored ports.
here. With that logic, to create two different LAN
broadcast domains, you had to buy two
2. Flash Memory different Ethernet LAN switches.
- Cisco IOS Software
Creating Two Broadcast Domains with
- Either a chip inside the switch Two Physical Switches and No VLANs
or a removable memory card
- stores fully functional Cisco
IOS images and is the default
location where the switch gets
its Cisco IOS at boot time
The 802.1Q
Cisco switches break the range of VLAN
IDs (1– 4094) into two ranges: the normal
range and the extended range.
All switches can use normal-range VLANs
with values from 1 to 1005.
Only some switches can use extended-range With an interface connected to each subnet,
VLANs with VLAN IDs from 1006 to 4094. the Layer 2 switch can keep doing its job—
forwarding frames inside a VLAN, while the
Layer 2 Switch Does Not Route Between the router can do its job— routing IP packets
VLANs between the subnets.
IP SUBNETTING
Before subnetting:
In any network (or subnet) one can use most
of the IP addresses for host addresses.
One loses two addresses for every network or
subnet.
Network Address
• The network address is used to find the
subnet in which the computer or the device
is located and the host address is used to
Networking 2 – 2nd Semester Midterm Reviewer
Broadcast Address
• A broadcast address is a special Internet
Protocol (IP) address used to transmit
messages and data packets to network
systems. Network administrators verify
successful data packet transmission via
broadcast addresses.
Subnet Example
Network address 172.19.0.0 with /16 network
mask
Networking 2 – 2nd Semester Midterm Reviewer
• Subnet Information
• Subnet Address
• Range of Host Addresses (first host and
last host)
• Broadcast Address
Subnetting – Example
• Host IP Address: 138.101.114.250
• Network Mask: 255.255.0.0 (or /16)
• Subnet Mask: 255.255.255.192 (or /26)
Networking 2 – 2nd Semester Midterm Reviewer
Networking 2 – 2nd Semester Midterm Reviewer