Download presentation
Presentation is loading. Please wait.
Published byMerryl Stevenson Modified over 9 years ago
1
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler
2
Syllabus ● Get it at: http://ctc228.weebly.com/
3
OSI Model Picture Credit: blog.butchevans.com
4
Picture Credit: ieee.org
5
Chapter 1: The Fundamentals ● Network components – Computer with Network Interface Card (NIC) – Network Medium – Interconnecting Device (maybe)
6
Chapter 1: IP and MAC address ● IP address is a logical address ● MAC address is a physical address ● Commonly used tools: – ipconfig – ping – arp -a
7
Chap 1: LAN, WAN, PAN... ● Local Area Network ● Wide Area Network ● Personal Area Network ● Internetwork ● Metropolitan Area Network ● Wireless Local Area Network
8
Chap 1: Encapsulation
9
Chap 1: Clients and Servers ● Client is accessing resources ● Server is providing resources ● This is not always a clear distinction
10
Group Work Case Project 1-2 ● Page 59 ● Bonus questions: – 1. Why would you use the 'ping' command? – 2.Why would you use the 'ipconfig' command? – 3. Is it possible that your network settings could be correct but the ping command could report an error? If yes, how? If no, why not?
11
Chapter 2 ● Repeaters ● Hubs ● Switches ● Wireless Access Point ● Routers (will be discussed later)
12
Chap 2: Connecting to the LAN ● Need a NIC if you're plugging in ● Need a Wireless NIC if you're going to WiFi in ● These are frequently built-in.
13
Chap 2: Routers ● Used to interconnect LANs to each other ● May directly connect or connect through intermediate routers
14
Chap 2: A Hub
15
Chap 2: A Switch
16
Chap 2: Old Wireless Access Point
17
Chap 2: So what is this thing?
18
Chap 2: But what about the back?
19
Chap 2: Tables and Gateways ● Hosts use a Default Gateway to get out ● Switches do their magic with MAC tables ● Routers do their magic with Routing tables ● These entries can be STATIC or DYNAMIC – Special route: Default Route
20
Chap 2 Group Project ● Project 2-8 ● Page 99 ● Bonus Questions: A computer has a standard NIC and a USB wireless adapter that are both connected to the same network. – 1. How many MAC addresses will it have? Why? – 2. How many IP address will it have? Why? ● Turn in before you leave.
21
Chapter 3 Topologies and Cables Ethernet Wifi Internet Access
22
Chapter 3 ● Topologies – Bus, Physical Star, Ring, Point-to-Point, Mesh ● Cables – UTP, Fiber Optic, Coaxial
23
Chap 3: Unshielded Twisted Pair
24
Chap 3: Coax
25
Chap 3: Fiber Optic Multimode vs Single-Mode
26
Chapter 3 Topologies and Cables Ethernet Wifi Internet Access
27
Chap 3: Ethernet ● Invented in the 1970s but has been updated ● Uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) ● Uses Media Access Control (MAC) addresses – 12 Hexadecimal digits ● One Ethernet protocol data unit is called a frame – Contains source and destination MAC addresses
28
Chap 3: Ethernet Frame
29
Chap 3: About Collisions and Errors ● If two devices in the same collision domain send frames at the same time, a collision might occur. – Unlikely with switches but common with hubs. ● Frames could get mangled on the wire, but since Ethernet is best effort, there is no acknowledgment or verification from receiver. – Errors are detected with a Cyclic Redundancy Check (CRC) added to the end of a frame.
30
Chapter 3 Topologies and Cables Ethernet Wifi Internet Access
31
Chap 3: WiFi ● Two modes: infrastructure and ad-hoc ● Uses Carrier Sense Multiple Access Collision with Avoidance (CSMA/CA) ● Different standards and speeds: – 802.11a 54Mbps but poor reception – 802.11b/g/n 11/54/600Mbps and better reception – 802.11ac up to 6.7 Gbps
32
Chap 3: Wifi Standards
33
Chap 3: Wifi Channels
34
Chap 3: WiFi Security ● Traffic can be intercepted relatively easily ● Encryption protocols – Wired Equivalent Privacy (WEP) – Wi-Fi Protected Access (WPA) – WPA2
35
Chapter 3 Topologies and Cables Ethernet Wifi Internet Access
36
Chap 3: Internet Access Technology ● Cable Modem ● Dial-up ● DSL ● Satellite ● Ethernet
37
Chap 3 Group Project ● EMAIL TO RSPENGLER@CSUDH.EDU ● Case Project 3-1 ● Page 159 ● Bonus Question: If five users are simultaneously participating in a Wi-Fi network operating in ad-hoc mode, what is the network topology? Why?
38
Chapter 4 ● PVC is used as the jacket of UTP cables and is toxic when it burns ● UTP Cable types – CM, CMR (Riser), CMP (Plenum) – Also called Cat-5, Cat-5e, Cat-6
39
Chap 4: RJ45
40
Chap 4: Terms ● Crossover vs Straight-Through (patch) ● Horizontal wiring vs Vertical wiring ● Entrance facility and “point of demarcation”
41
Chap 4: Fiber Optic ● Tons of connector types ● Termination is a little difficult ● Can go great distances with great speed ● Multi mode and Single Mode
42
Chap 5: Protocol Stacks ● TCP/IP Stack actually has a lot more stuff than just TCP and IP.
43
Chap 5: In depth with the layers
44
Chap 5: IP address Two forms: IPv4 and IPv6 Going into detail on IPv4 Subnet Masks Classful and Classless
45
Chap 5: IPv4 Packet
46
Chap 5: Transport Layer Transmission Control Protocol Reliable and connection-oriented User Datagram Protocol Unreliable and connectionless Both work with segments, use source and destination ports, and use checksums
47
Chap 5: TCP and UDP
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.