COS338_Day1and2 - Tony Gauvin`s Web Site

Download Report

Transcript COS338_Day1and2 - Tony Gauvin`s Web Site

COS 338
Day 1 Introduction
Agenda

Roll Call

Introduction to Course

WebCT Overview

Syllabus Review

Introduction to Networking
2
INSTRUCTOR

Tony Gauvin, Assistant Professor of ECommerce

Contact info

216 Nadeau

[email protected]

(207) 834-7519 or ext 7519

WebCT (Tony Gauvin COS 125)
3
Instructional Philosophy

Out-Come based education

Would rather discuss than lecture


Hate grading assignments


Requires student preparation
Especially LATE assignments
Use class interaction, assignments, quizzes,
labs and projects to determine if outcomes are
met.
4
COS 338 Survival Primer

Read Material BEFORE the class discussion

Check WebCT Often

Use the additional resources identified in syllabus

ASK questions about what you didn’t understand in readings

DON’T do assignments and projects at last minute.

REVEIW lectures and notes

Seek HELP if you are having difficulties

OFFER feedback and suggestions to the instructor in a
constructive manner
5
Computer Accounts



Computer login

Sys admin
 Pete Cyr (x7547) or Art Drolet (x7809)

Applications
MSDN Academic Alliance

Free Stuff

See Dr. Ray Albert
Access Cards

$10 deposit

See Lisa Fournier
6
WebCT

http://webct.umfk.maine.edu

Login

First name. Last Name

John Doe  John.Doe

Initial password is webct

Help with WebCT available from Blake Library staff

All quizzes and assignments will be administered from
WebCT
7
COS 338 Specifics

Fully WebCT enabled


Market Driven Content


All Quizzes, assignments, projects
Wireless, Ethernet, QOS, Security, Frame Relay, TCP/IP, Windows XP
Cohesion Case

First Bank of Paradise

Managerial Perspectives instead of technical

Lab Components


Hands-on using OMS CIAG Lab
 Students will build a SOHO LAN with working apllications

Simulations using Opnet IT Guru and ACE
Follow-up Course Cos 420 Internet and Intranet Architecture will be
much more technical and will be based on TCP/IP
8
Syllabus review

Requirements

Grading

Course outline

Special Notes

Subject to change
9
Introduction
Chapter 1
Panko’s
Business Data Networks and Telecommunications, 5th edition
Copyright 2005 Prentice-Hall
The Chapter

This chapter is a survey of
the key concepts we will
see in this course

The rest of the book
essentially fleshes out out
the concepts we will see
in this chapter
11
The Chapter

Networking is a Head
Game

There is a lot of
information to master

There are many TLAs
(three-letter
acronyms)

For design and
troubleshooting, you
must know everything
to do anything.
12
Learning Objectives

By the end of this chapter, you should be able
to

Discuss the First Bank of Paradise (FBP), our
running case study for this book.

Discuss the major types of networked applications.

List the eight elements of networks.

Explain the major types of networks in businesses:
LANs, WANs, internets, intranets, and extranets.
13
Learning Objectives

By the end of this chapter, you should be able
to

Discuss major concerns for network
managers: staffing, network architecture,
standards, security, wireless networking,
efficiency, and quality of service (QoS).

Explain the elements and operation of a
small home PC network using a LAN.
14
Learning Objectives

By the end of this chapter, you should be able
to

Use some key hands-on network
management tools, including bandwidth
measurement services, ping, ping 127.0.0.1,
tracert, ipconfig, winipconfig, nslookup, and
the use of Windows Calculator to compute
dotted decimal notation IP addresses.
15
First Bank of Paradise (FBP)

The book’s cohesion case study

Composite mid-size bank in Hawaii

Banks are fairly “typical” firms, although they
have stronger need for security

Warren Chun is the chief information officer
(CIO)

Yvonne Champion is the network manager
16
First Bank of Paradise (FBP), Continued

Annual Revenues: $4 Billion

Operations


50 Branches

350 ATMs (Automated Teller Machines)
Network

500 Ethernet switches

400 Routers
17
First Bank of Paradise (FBP), Continued


Computers

2,000 desktop and notebook user PCs

200 Windows servers

30 Unix servers

10 Novell NetWare file servers
Information Systems Staff

150 people
18
Figure 1-1: Networked Applications at the First
Bank of Paradise

Networked Applications are
Applications Made Possible by
Networking


E-mail, etc.
Users Only Care About
Applications

The rest is just details to them
19
Figure 1-1: Networked Applications at the
First Bank of Paradise, Continued

E-Commerce

Buying and selling on the
Internet

Users typically interact with
databases

Customers will soon be
able to talk to customer
representatives while online
20
Figure 1-1: Networked Applications at the
First Bank of Paradise, Continued

Transaction
Processing

Simple, highlystructured, and highvolume interactions,
such as check
processing

Built around
databases

External settlement
networks
21
Figure 1-1: Networked Applications at the
First Bank of Paradise, Continued

Transaction Processing

Back-office transaction
processing applications
 Accounting, payroll,
purchasing, human
resources, etc.

Functional databases in
individual departments
22
Figure 1-1: Networked Applications at the
First Bank of Paradise, Continued

Office Applications

Word processing,
spreadsheeting, etc.

E-mail, instant messaging
(IM), and Web access
23
Figure 1-2: Elements of a Network
Message (Frame)
Application
Application
Client
Station
Switch
Server
Station
Networks connect
Switch
applications Trunk
on different stations.
AccessApplications
Switch are all users care about
Line
Trunk
Line
Line
Mobile Client
Station
Switch
Outside
World
Router
Mobile Client
Station
24
Figure 1-2: Elements of a Network, Continued
Message (Frame)
Application
Application
Client
Station
Switch
Server
Station
Networks connect stations:
Switch
clients (fixed and
mobile) and servers
Trunk
Access Switch
Line
Trunk
Line
Line
Mobile Client
Station
Switch
Outside
World
Router
Mobile Client
Station
25
Figure 1-2: Elements of a Network, Continued
Message (Frame)
Application
Application
Client
Station
Switch
Stations (and routers)
usually communicate
Access Switch
by sendingLine
messages
called frames
Mobile Client
Station
Trunk
Line
Switch
Server
The path Station
a frame takes
Switch
is called its data link
Trunk
Line
Outside
World
Router
Mobile Client
Station
26
Figure 1-2: Elements of a Network, Continued
Message (Frame)
Application
Application
Client
Station
Switch
Server
Station
Switch
Access
Line
Mobile Client
Station
Trunk
Switch
Switches
Linemove frames
Trunk
to or closer to the destinationLine
station
Outside
World
Switches handle a packet sequentially
Switch
Router
Mobile Client
Station
27
Figures 1-6 and 1-7: Workgroup and Core
Switches
19 inches (48 cm) wide
19 inches (48 cm) wide
Small Switches
(Stacked):
Workgroup Switches
To Link Stations
To Network
Central Core Switch
28
Figure 1-2: Elements of a Network, Continued
Message (Frame)
Application
Application
Client
Station
Switch
Access
Line
Server
Station
Routers connect networks Switch
to the outside world;
Trunk
Switch Treated just like stations
Line
Trunk
Line
Mobile Client
Station
Outside
World
Switch
Mobile Client
Station
Router
29
Figure 1-2: Elements of a Network, Continued
Message (Frame)
Application
Application
Access lines
Client
connect stations
Station
to switches
Trunk lines
Switch
connect switches
to switches (and routers)
Server
Station
Switch
Access
Line
Switch
Mobile Client
Station
Trunk
Line
Switch
Trunk
Line
Trunk
Line
Outside
World
Router
Mobile Client
Station
30
Figure 1-2: Elements of a Network (Recap)

Applications (the only element that users care about)

Stations


Clients
Servers

Switches

Routers

Transmission Lines



Trunk lines
Access Lines
Messages (Frames)
Never talk about an
Innovation “reducing cost,”
“increasing speed,” etc.
without specifying
which element is
cheaper or faster.
For example, multiplexing
only reduces the cost of
trunk lines; other
costs are not decreased
31
Figure 1-3: Multiplexing in a Packet-Switched
Network
Trunk line
multiplexes the
messages of
different
conversations
AC
Client
Station A
AC
AC BD
BD
Mobile Client
Station B
AC
AC
Trunk Line
Access
Line
AC
This reduces
trunk line
costs through
cost sharing
by users
Server
Station C
BD
BD
Router D
32
LANs and WANs

LANs transmit data
within corporate sites

WANs transmit data
between corporate sites

Each LAN or WAN is a
single network
WAN
33
DAY 2 Agenda

Questions?

8 elements of a network?

Differences between LAN and WAN

Assignment 1 due next class

Opnet Lab 1 next class


Read Home PC Network Lab Manual.pdf loaded in WebCT
Today

Finish Introduction

Some Hands on Computer stuff
34
Figure 1-4: The First Bank of Paradise’s
Wide Area Networks (WANs)
North Shore
Operations
OC3 Private Line
T3
T3
Headquarters
Bank has multiple
facilities connected
by multiple WANs
35
Figure 1-5: Local Area Network (LAN) in a
Large Building
Multi-floor
Office Building
The bank has multiple
LANs—one at each site
36
Figure 1-5: Local Area Network (LAN) in a Large
Building, Continued
Wall Jack
Workgroup Switch
Workgroup Switch
To
WAN
Router
Core Switch
37
Internets

Most firms have multiple LANs and WANs.

They must create internets

An internet is a collection of networks connected by
routers so that any application on any host on any
single network can communicate with any
application on any other host on any other network
in the internet.
Application
Application
LAN
WAN
Router
LAN
Router
38
Figure 1-8: Internet with Three Networks
Host A
R1
Packet
Network X
Network Z
A packet goes all the
way across the internet;
It’s path is its route
Network Y
Route A-B
R2
Host B
39
Figure 1-8: Internet with Three Networks,
Continued

Messages in single networks (LANs or WANs) are
called frames

Message in internets are called packets


Travel from the source host to the destination host
across the entire internet
Within a single network, the packet is encapsulated in
(carried in) the network’s frame
Packet
Package
(Packet)
Truck
(frame)
Frame
40
Figure 1-8: Internet with Three Networks,
Continued
Frame X
Details in
Network X
Packet
Data Link
A-R1
Switch
Host A
Switch
Server
Host
Switch
X1
Mobile Client
Host
Switch
X2
Route
A-B
Router R1
Network X
41
Figure 1-8: Internet with Three Networks,
Continued
Details in
Network Y
To
Network X
Route
A-B
Router R1
Data Link
R1-R2
To
Network Z
Router R2
Frame Y
Packet
Network Y
42
Figure 1-8: Internet with Three Networks,
Continued
Data Link
R2-B
Details in
Network Z
Packet
Frame Z
Switch
Z1
Host B
Switch
Router R2
Switch
Z2
Mobile Client
Hosts
Switch
Router
Network Z
43
Figure 1-8: Internet with Three Networks,
Continued

In this internet with three networks, in a
transmission,



There is one packet
There are three frames (one in each network)
If a packet in an internet must pass through N
networks,


How many packets will be sent?
How many frames must carry the packet?
44
Figure 1-8: Internet with Three Networks,
Continued

Lower-case internet is any internet

Upper-case Internet is the global Internet
45
Figure 1-11: The Internet
Webserver
User PC
Access
Line
The Internet Backbone
(Multiple Carriers)
Access
Line
Router
NAP
ISP 2 NAP
NAP
ISP 1
ISP 4
ISP 3
Internet
Service
Provider
For User PC
NAP = Network Access Point
Internet Service
Provider
For Webserver
46
Figures 1-9 and 1-10: Routers
19 inches (48 cm) wide
19 inches (48 cm) wide
Small Routers
Stacked
For Branch Offices
Large Routers
for Large Sites and ISPs
47
Figure 1-12: The Internet, internets,
Intranets, and Extranets

internets versus the Internet

Intranets


Internal internet for use within an organization

Based on the TCP/IP standards created for the
Internet
Extranets

Connect multiple firms
 Only some computers from each firm are on the
extranet

Use TCP/IP standards
48
Recap


Switches versus Routers

Switches move frames through single networks
(LANs or WANs)

Routers move packets through internets
Messages

Messages in single networks are called frames

Messages in internets are called packets

Packets are encapsulated within frames
49
Figure 1-13: Major Network Technical
Concerns

Network Architecture

A broad plan for how the firm will
connect all of its computers
within buildings (local area
networks), between sites (wide
area networks), and to the
Internet

New systems must fit the rules
of the architecture

Undisciplined growth in the past
 No overall plan
50
Figure 1-13: Major Network Technical
Concerns, Continued

Network Architecture

Legacy networks

Use obsolete technologies that
do not fit the long-term
architecture

Many exist in the bank

Too expensive to replace
quickly; must live with many for
awhile
51
Figure 1-13: Major Network Technical
Concerns, Continued

Network Architecture

Scalability
 The ability of selected technologies to be able to
handle growth efficiently
Cost
Per
Bit
Poor
Scalability
Good
Scalability
Demand
52
Figure 1-13: Major Network Technical
Concerns, Continued

Standards

Standards govern message interactions between
pairs of entities (Figure 1-14)

For example, HTTP request and response messages for
WWW access
Webserver
HTTP Request Message
Client PC
Browser
Client
Program
HTTP Response Message
Webserver
Application
Server
Program
53
Figure 1-13: Major Network Technical
Concerns, Continued

Standards

Standards create competition

This reduces costs

It also stimulates the development of new
features

Protects the business if the main vendors go
out of business
54
Figure 1-13: Major Network Technical
Concerns, Continued

Standards

Competing standards organizations create
incompatible standards

FBP will standardize to save money

LANs: FBP will standardize on Ethernet (some
legacy LAN technologies are still in use)

WAN standards: will have fewer but still two to four

Internetworking: will standardize on TCP/IP
55
Figure 1-13: Major Network Technical
Concerns, Continued

Security

A Major Problem

Many attacks

Growing trend toward
criminal attackers
56
Figure 1-15: Firewalls
Allowed Legitimate Border
Packet
Firewall
Attacker
Hardened
Server
Hardened
Client PC
Border firewall
should pass
legitimate packets
Log File
Legitimate
Packet
Legitimate
Host
Internal
Corporate
Network
57
Figure 1-15: Firewalls, Continued
Border firewall
should deny (drop)
Hardened and log
Server attack packets
Hardened
Client PC
Border
Firewall
Attack Packet
Denied
Attack
Packet
Log File
Network Management
Console
Attacker
Legitimate
Host
Internal
Corporate
Network
58
Figure 1-13: Major Network Technical
Concerns, Continued

Security

Virtual Private Networks (VPNs) (Figure 1-16)

Provide communication over the Internet with
added security

Cryptographic protection for confidentiality
(eavesdroppers cannot read)

Cryptographic authentication (confirms sender’s
identity)
59
Figure 1-16: Virtual Private Networks
(VPNs)
Site-to-Site VPN
Using Gateway
Client
VPN
Remote Access
Gateway PC 1
VPN Using
Corporate
Gateway
Site B
VPN
Gateway
Internal
Server
Corporate
Site A
Internet
Host-to-Host
VPN
Remote
Client PC 2
Remote Client PC 3
60
Figure 1-13: Major Network Management
Concerns, Continued

Wireless
Communication

To improve mobility

Drive-by hackers can
eavesdrop on internal
communication

Drive-by hackers can
break into the network
bypassing firewalls
Drive-By Hacker
61
Figure 1-13: Major Network Technical
Concerns, Continued

Need for Efficiency
 User demand is growing rapidly
 Budgets are growing slowly if at all
 For projects, need burning justification
 Still add new services by squeezing maximum
payback from each dollar
Money/
Demand
User Demand
Budget
Time
62
Figure 1-13: Major Network Technical
Concerns, Continued

Quality of Service (QoS)
QoS

Numerical objectives for performance

Transmission speed in bits per second (bps)



A bit is a single one or zero
NOT bytes per second
Increase by factors of 1000, not 1024
 kilobits per second (kbps)—lower-case k
 Megabits per second (Mbps)
 Gigabits per second (Gbps)
 Terabits per second (Tbps)
63
Figure 1-13: Major Network Technical
Concerns, Continued

Quality of Service




For Transmission Speed, have 1 to 3 places
BEFORE the decimal point.
Example
 .5 Mbps is wrong
New
 500 kbps is correct
Not in the Book
Example
 2,300 Mbps is wrong
 2.3 Gbps is correct
Example
 473.2 Mbps is correct
64
Figure 1-13: Major Network Technical
Concerns, Continued

Quality of Service

Typical transmission speeds in
most firms:

LANs: 100 Mbps to each
desktop

WANs: most site-to-site links
only are 56 kbps to a few
megabits per second because
long-distance transmission is
very expensive and so must
be used more sparingly
LANs:
100 Mbps
WANs:
56 kbps
to a few
Mbps
65
Figure 1-13: Major Network Technical
Concerns, Continued

Quality of Service

Congestion, Throughput, Latency, and
Response Time

Congestion: when there is too much traffic for
the network’s capacity

Throughput: The speed users actually see
(often much less than rated speed)

Individual throughput is less than total
throughput on shared-speed links
66
Figure 1-13: Major Network Technical
Concerns, Continued

Quality of Service

Congestion, Throughput,
Latency, and Response Time
 Latency: delay (usually
measured in milliseconds or
ms)

Within corporations, latency is
typically under 60 ms 90% of
the time

On the Internet, typically 30
ms to 150 ms
67
Checking latency

Use Ping

Start -> Run-> cmd

Try ping 127.0.0.1
68
Checking throughput

Use an available bandwidth tester on the
Internet

http://reviewszdnet.com.com/Bandwidth_meter/7004-7254_160.html?tag=is

http://www.dslreports.com

http://www.bandwidthplace.com/speedtest/
69
Other XP Command line networking tools

Start -> run -> cmd

ipconfig /all /release /renew
 Show tcp/ip settings

Tracert
 Shows path of packet through Internet

nslookup
 Does DNS testing
70
Figure 1-13: Major Network Technical
Concerns, Continued

Quality of Service

Congestion, Throughput, Latency, and Response
Time
 Response Time

The time to get a response after a user
issues a command

A quarter second
or less is good
71
Figure 1-13: Major Network Technical
Concerns, Continued

Availability

Availability is the percentage of
time a network can be used

Downtime: when the user cannot use the network

Want 24x7 availability

Telephone network gives 99.999% availability

Typical networks reach 98% today
72
Figure 1-13: Major Network Technical
Concerns, Continued

Error Rate

Measured as the percentage of messages
damaged or lost

Substantial error rates can disrupt applications

Substantial error rates generate more network
traffic because of retransmissions
73
Pat Lee’s Home Network

Pat Lee is a vice president at FBP

Wants a network in her home


Family’s main computer is the downstairs PC

Daughter Emily has a PC in her room

Wants to connect both to the Internet through a
broadband (high-speed) cable modem service
Perspective

A small LAN but has all the key network elements
74
Figure 1-18: Pat Lee’s Home Network
1.
Coaxial Cable
to ISP
2.
Cable
Modem
3. UTP Cord
4.
Access
Router
75
Figure 1-22: Home Network Access Router
About 4 inches (10 cm) Wide
Power
Jack for
External
Power
Switch Ports
UTP Cords
Run to Stations
WAN Port
UTP Cord
Runs to
Cable Modem
76
Figure 1-18: Pat Lee’s Home Network, Continued
6.
A1-BD-33-6E-C7-BB
PC in Emily’s Room
5. UTP
Cord
5. UTP
Cord
6.
B2-CD-13-5B-E4-65
PC in Study
77
Figure 1-18: Pat Lee’s Home Network, Continued
6.
A1-BD-33-6E-C7-BB
PC in Emily’s Room
7. File
Sharing
6.
B2-CD-13-5B-E4-65
PC in Study
78
Figure 1-18: Pat Lee’s Home Network, Continued
6.
A1-BD-33-6E-C7-BB
PC in Emily’s Room
8. Printer
Sharing
6.
B2-CD-13-5B-E4-65
PC in Study
79
Figure 1-19: Network Interface Cards
(NICs) (Photo)
Internal NIC. Installed inside
systems unit. Plugged into
expansion slot on the mother
board.
PC Card NIC. Installed in PC
Card slot in notebook and some
PDAs.
80
Internal NIC
RJ-45
Jack
PCI Connector Pins
81
Computer Mother Board

Mother Board
PCI Slots
for Expansion Boards
(NICs, etc.)
Slots for RAM
Slot for
Microprocessor
(Pentium 4)
82
Mother Board and Expansion Boards
Expansion Board
(NIC)
Connector
Expansion
Slots
Mother Board
83
Figure 1-20: Unshielded Twisted Pair
(UTP) Cord With RJ-45 Connector (Photo)
4-Pair Unshielded Twisted Pair (UTP)
Industry Standard Pen
8-Pin RJ-45 Connector
UTP Cord
84
Figure 1-21: UTP Cord RJ-45 Connector and
Jack
UTP Cord
--About as thick
as a pencil
--Rugged and
Flexible
RJ-45 Jack
On a Wall
On a Switch
or
On a NIC
RJ-45
Connector
85
Figure 1-23: Logical Functions of the
Access Router
Cable
Modem
Access Router
Router Function
DHCP
Server
Function
NAT
Function
Switch Function
86
Figure 1-24: Ethernet Switch Operation
Switching Table
Port Host
10
A1-44-D5-1F-AA-4C
13
B2-CD-13-5B-E4-65
15
C3-2D-55-3B-A9-4F
16
D4-47-55-C4-B6-9F
Ethernet Switch
UTP
UTP
Frame To C3…
A1-44-D5-1F-AA-4C
UTP
UTP
D4-47-55-C4-B6-9F
Frame To C3…
C3-2D-55-3B-A9-4F
B2-CD-13-5B-E4-65
87
Figure 1-25: Frames and Packets
Cable
Modem
Packet in
DOCIS
Frame
Internal
Router
Access Router
Packet is always
carried (encapsulated)
in a frame
A1-BD-33-6E-C7-BB
IP address = 192.168.0.3
PC in Emily’s Room
Packet in
Ethernet Frame
B2-CD-13-5B-E4-65
IP address = 192.168.0.2
PC in Study
88
Figure 1-26: Dynamic Host Configuration
Protocol (DHCP)
Cable
Modem
ISP
DHCP
Server
1.
IP Address =
60.47.112.6
Access Router
A1-BD-33-6E-C7-BB
PC in Emily’s Room
The ISP only
Gives each home a
Single IP address B2-CD-13-5B-E4-65
PC in Study
A DHCP Server
provides User PCs with
a temporary IP Address
each time the user
connects to the Internet
89
Figure 1-26: Dynamic Host Configuration
Protocol (DHCP), Continued
Cable
Modem
ISP
DHCP
Server
1.
IP Address =
60.47.112.6
Internal
DHCP
Server
Access Router
A1-BD-33-6E-C7-BB
IP address = 192.168.0.3
PC in Emily’s Room
2. IP Address =
192.168.0.3
2. IP Address =
192.168.0.2
The access router’s
Internal DHCP server
Gives private IP
Addresses to each PC
B2-CD-13-5B-E4-65
IP address = 192.168.0.2
PC in Study
90
Figure 1-27: Network Address Translation
(NAT)
2. Packet from
60.47.112.6
Webserver
IP address=
123.7.86.285
Cable
Modem
Internal
NAT
Module
Access Router
The access router’s NAT
module translates between the
private IP addresses and
the single ISP-given IP address
1. Packet from
192.168.0.2
PC in Study
192.168.0.2
91
Figure 1-27: Network Address Translation
(NAT), Continued
3.
Packet
to
60.47.112.6
Webserver
IP address=
123.7.86.285
Cable
Modem
Internal
NAT
Module
Access Router
4. Packet to
192.168.0.2
PC in Study
192.168.0.2
92
Figure 1-28: The Domain Name System
(DNS), Continued
DNS Table
Originating
Host’s DNS
Resolver
Host Name
…
…
Voyager.cba.hawaii.edu
…
IP Address
…
…
128.171.17.13
…
DNS Request Message
“The host name is Voyager.cba.hawaii.edu”
DNS Response Message
“The IP address is 128.171.17.13”
DNS
Host
93
Other XP Command line networking tools

Start -> run -> cmd

nslookup
 Does DNS testing

Try nslookup mail.maine.edu
94
Figure 1-29: Converting Binary IP Addresses to
Dotted Decimal Notation
Binary
IP Address
01111111101010110001000100001101
8-Bit
Segments
01111111 10101011 00010001 00001101
Convert
Segments
to Decimal
Dotted
Decimal
Notation
127
171
17
13
127.171.17.13
95
Figure 1-30: Windows Calculator
1. Open Calculator, which is in
the Program Group Accessories
2. Select View,
Scientific
96
Figure 1-30: Windows Calculator
4. Enter data on keypad
(Limit is 8 bits for Binary)
3. Enter initial
data type here
Dec = Decimal
Bin = Binary
97
Figure 1-30: Windows Calculator
6. Observe answer
5. Enter final
data type here,
observe results
Initial zeros are dropped,
so answer is 0001 0111
98
Topics Covered

The First Bank of Paradise

Networked Applications

Packet switching and Multiplexing

LANs versus WANs

Within a site versus between sites
99
Elements of a Network
Message (Frame)
Application
Application
Client
Station
Switch
Server
Station
Switch
Access
Line
Switch
Mobile Client
Station
Trunk
Line
Switch
Trunk
Line
Outside
World
Router
Mobile Client
Station
100
Topics Covered

Internets



Package
(Packet)
Routers
Packets carried within frames
Truck
(frame)
Categories

Internets

The Internet: ISPs and NATs

Intranets

Extranets
101
Topics Covered

Network Architecture

The Need

Legacy Networks

Scalability

Standards

Need for Efficiency
102
Topics Covered

Security

Firewalls

VPNs

Wireless Communication
103
Topics Covered

Quality of Service (QoS)

Numerical objectives that must be met

Speed and throughput

Latency

Response time

Availability

Error rate
104
Topics Covered: Pat Lee’s Home Network
6.
A1-BD-33-6E-C7-BB
PC in Emily’s Room
2.
Cable
Modem
1.
Coaxial Cable
to ISP
3. UTP Cord
5. UTP
Cord
4.
Access
Router
7. File
Sharing
5. UTP
Cord
6.
B2-CD-13-5B-E4-65
PC in Study
8. Printer
Sharing
105
Topics Covered: Pat Lee’s Home Network

DHCP

NAT

DNS
106