1 NETWORKING TECHNOLOGIES (II) BUS3500 - Abdou Illia, Fall 2010 (October 20, 2010)

Slides:



Advertisements
Similar presentations
Networks Terminology and Hardware. Network A network is a group of connected computers that can communicate with each other to share information and equipment,
Advertisements

CIM 2465 Fundamentals of Ethernet1 Fundamentals of Ethernet (Topic 3) Textbook: Networking Basics, CCNA 1 Companion Guide, Cisco Press Cisco Networking.
CCNA 1 v3.1 Module 7 Review. 2 Which of the following has limited the bandwidth of fiber based Ethernet? (Choose three.) emitter technology absolute fiber.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
ETHERNET By:- Introduced By:- Saleh Al-Ghamdi Abdullah Al-Yabis Uthman Al-Amoudi King Fahd University of Petroleum & Minerals College.
Networks & telecommunications Part 2 July 2, 2012.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Spring 2007 (Week 9, Thursday 3/8/2007)
1 LANs are Subnet Standards Only Physical and Data Link Layer standards Implemented by the NICs:NICs Application Transport Internet LAN Subnet (NIC) Application.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Networks & telecommunications October 9, LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types.
Chapter 15: LAN Systems Business Data Communications, 4e.
Review for Exam 3 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Review on Networking Technologies Linda Wu (CMPT )
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
Media, LAN Technologies, and Network Topologies Lecture 5.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
LAN SYSTEMS. GIGABIT ETHERNET Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the Standard 802.3z. The goals of the Gigabit Ethernet design.
Chapter 2 Review of Computer Network Technology
Network Topologies An introduction to Network Topologies and the Link Layer.
Network Security FAST & GIGABIT ETHERNET. Network Security Fast Ethernet: Goals  Upgrade the data rate up to 100 Mbps  Make it compatible with Standard.
In The Name Of Allah Whose Blessings Are Uncountable.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Laudon & Laudon: Canadian Edition
What is a Protocol? protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each.
NETWORK+ GUIDE TO NETWORKS 6 TH EDITION CHAPTER 5 TOPOLOGIES AND ETHERNET STANDARDS.
Local Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (March 9, 2015)
Chapter 9A Network Basics.
Network Architecture Layout designed and constructed by: Vicki Kertz.
Network Access and Transmission Methods Chapter 10.
Ethernet Two nodes transmit at the same time
Basic network concepts (Part 5)
                                       CIM6400 CTNW Lesson 9 – LAN Architectures & Networking Protocols and the OSI Model.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Introduction network Protocol
Basic Concepts and Principles Chapter 1 Copyright 2001 Panko.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
CS/IS 465: Data Communication and Networks 1 CS/IS 465 Data Communications and Networks Lecture 28 Martin van Bommel.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 14 Local Area Networks: Ethernet.
Fundamentals Of LAN and WAN Chapter 4 powered by DJ.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Ethernet Physical Layer Topology: Order in which stations receive bits Ethernet hubs use a bus topology –Signal is broadcast –All stations receive.
1 Voice and Video Networks Reserved Capacity –Circuit capacity is reserved during duration of each call –At each switch –On each trunk line Circuit Reserved.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
1 Traditional Ethernet 8Ethernet and CSMA/CD (IEEE 802.3) 8Carrier sense multiple access with collision detection 8Four step procedure 8If medium is idle,
The Building Blocks: LAN Shared and Switched Ethernet Connecting Devices Ethernet Access Methods Network Operating Systems Best Practice LAN Designs.
BASIC NETWORK PROTOCOLS AND THEIR FUNCTIONS Created by: Ghadeer H. Abosaeed June 23,2012.
Local Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 8, Tuesday 2/27/2007)
Ethernet Chapter 4.
CSCI 465 D ata Communications and Networks Lecture 22 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Chapter Overview Ethernet Token Ring FDDI Wireless Networking.
 Describe the basic and hybrid LAN physical topologies and their uses, advantages, and disadvantages  Describe the backbone structures that form the.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Computer networks. Topologies Point to point Bus (rail) Ring Tree, star, etc.
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Fall 2008 (November 4, 2008)
Network Access and Transmission Methods
Protocols.
Introduction to Networking & Telecommunications
NETWORKING TECHNOLOGIES (II)
Chapter 12 Local Area Networks
Protocol layering and data
Business Data Communications, 4e
Local Area Networks School of Business Eastern Illinois University
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Presentation transcript:

1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Fall 2010 (October 20, 2010)

2 LEARNING GOALS  Describe networking protocols and identify the major protocols used in business.  Describe and contrast types of transmission techniques used in data networks and voice networks.

3 Protocols  An agreed upon set of rules that govern communication in a network  All computers on a network must use same protocol for effective communication  Example of protocols:  TCP/IP suite  Ethernet  Token Ring Computer 1 Rules for Task 1 Rules for Task 2 Rules for Task 3 Rules for Task 4 Rules for Task 5 Computer 2 Rules for Task 1 Rules for Task 2 Rules for Task 3 Rules for Task 4 Rules for Task 5

4 TCP/IP  TCP/IP suite is named after its two main protocols: TCP and IP  Transmission Control Protocol (TCP) Provides a reliable data transfer service between two endpoints on a network  Internet Protocol (IP) Defines a delivery mechanism for packets of data sent between all systems on an Internet  TCP/IP is the protocol suite for the Internet TaskSample protocols ApplicationHTTP, FTP, SMTP TransportTCP, UDP InternetIP PhysicalEthernet, Token Ring, PPP, Modem standards

5 Ethernet  A set of rules for transmitting messages in LANs  Most widely used protocol for LANs  Uses a method called CSMA/CD* for wired LANs 1) All computers (“carriers”) listen (“sense”) for traffic on the LAN 2) If no traffic, computer that wishes to transmit may transmit 3) If collision occurs, computers must wait a random amount of time 4) The computer with smallest random number send again first. * Carrier Sense Multiple Access with Collision Detection CSMA/CD*

6 Ethernet standards 10Base-T Speed: 10 Mbps Signal type: Baseband transmission Medium: Twisted Pair - Speed: 100 Mbps - Signal type: Baseband - Distance: 100 m between Hub/Switch and node - Uses CAT5 or better UTP with RJ-45 connectors - Star topology: physical star, logical bus 100Base-TX 100Base-TX: Two Twisted-pairs of Category 5 UTP or STP 100Base-FX: Fiber-optic cabling using 2-strand cable 100Base-T4: Four Twisted-pairs of Category 3,4, or 5 UTP 1000Base-CX: Uses Twinaxial cable 1000Base-LX: Uses single-mode Fiber-optic cable (5 km) 1000Base-T: 4 Twisted-pairs of Cat. 5 UTP in full-duplex CSMA/CD Ethernet 10Base-2 10Base-5 10Base-T 10Broad u Fast Ethernet 100Base-TX 100Base-FX 100Base-T z Gigabit Ethernet 1000Base-SX 1000Base-LX 1000Base-CX + New 10Gbps standard

7 Token Ring  Other set of rules for transmitting messages in LANs  Only one node “talks” at a time  A node only transmits when it receives a special packet called a “Token”  Only one Token on the ring  No collisions

8 Transmitting Data in a Network  Two major techniques: 1)Circuit switching network  Traditionally used for voice transmission 2)Packet switching network  Used for computer data transmission.

9 Circuit Switching Circuit capacity is reserved during duration of each call At each switch On each trunk line Circuit Reserved Capacity Reserved Capacity

10 Circuit Switching  Nothing like congestion on the Internet  Reserved Circuit Capacity is Expensive Pay for it whether you use it or not Good for voice, because conversations are fairly constant Bad for data, because most data transmission is bursty; e.g., in World Wide Web, download, then stare at screen for a long time until next download

11 Packet-Switching  Packet Switching Large messages are broken into small pieces called packets (or frames) Packets are short (averaging a few hundred bytes) because switches handle short messages efficiently Message Packets

12 Packet-Switching  Multiplexing Packets from many conversations are mixed (multiplexed) over each trunk line Multiplexing on Transmission Line Packet Switching

13 Summary Questions BookNotes 1)(a) What is a protocol? (b) Name few protocols used in network. 2) Could collisions occur in: (a) Ethernet LANs? (b) Token Ring LANs? 3)(a) What is the maximum speed in a 100BaseTX Ethernet LAN? (b) What kind of transmission media it uses? 4)Is Token Ring widely used? 5)What kind of switching technique is traditionally used in: (a) data networks? (b) voice networks 6)How do Circuit-Switching networks differ from Packet- Switching networks?

14

15 Problem  Four students share a dorm. They would like to set up a network in order to share programs and data files. Three of the students own PCs and the fourth student has a laptop computer. a)What computing equipments they need to buy in order to set up the Ethernet network with a star topology? b)Suppose that they decided to set up a P2P wired network. They have purchased a 10/100BASE-TX 4-port Ethernet hub at What kind of physical transmission media they need to buy?