ethernet lectures

Upload: malawig-kayvin

Post on 07-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 Ethernet Lectures

    1/6

    KAYVIN L. MALAWIG JULY 9, 2011

    BSIT IV

    1) Different type of ethernet

    - A data packet on the wire is called a frame. A frame begins with Preamble and Start Frame

    Delimiter, following which each Ethernet frame features an Ethernet header featuring source and

    destination MAC addresses. The middle section of the frame consists of payload data including any

    headers for other protocols (e.g., Internet Protocol) carried in the frame. The frame ends with a 32-bitcyclic redundancy check, which is used to detect any corruption of data in transit.

    2) Bridge, Switch, Hub And Repeater

    Bridge

    - is, in short, a device that is used to connect two networks together at the data link layer (layer

    2 of the OSI model).

    - OSI means open system interconnection

    Switch- uses "intelligent" multiplexing to route packets from an entry node to a destination node.

    Hub

    - broadcasts the packet to the network until a destination node "takes" ownership of the packet.

    //Switch & Hub are same.

    Repeater

    - is a device that amplifies and resends a packet of data. All energy signals suffer from attenuation,

    and so a repeater is used to overcome the attenuation due to long cable/fiber runs.

    3) Router VS Switch

    - Router is cheaper than the switch.- Router is used to connect the (LAN)/connected computers to internet- Switch is to create network between computers.- Switches are used in Business Networks today, to connect computers, printers and servers

    within a building or campus.

    4) Network Protocols

    HTTP (Hyper Text Transfer Protocol) is a method of transmitting the information on the web. HTTP

    basically publishes and retrieves the HTTP pages on the World Wide Web. HTTP is a language that is used

    to communicate between the browser and web server. The information that is transferred using HTTP

    can be plain text, audio, video, images, and hypertext. HTTP is a request/response protocol between theclient and server.

    POP3 (Post Office Protocol) In computing, e-mail clients such as (MS outlook, outlook express

    and thunderbird) use Post office Protocol to retreive emails from the remote server over the TCP/IP

    connection. Nearly all the users of the Internet service providers use POP 3 in the email clients to

    retrieve the emails from the email servers. Most email applications use POP protocol.

    Simple Mail Transfer Protocol is a protocol that is used to send the email messages between the

    servers.

  • 8/6/2019 Ethernet Lectures

    2/6

  • 8/6/2019 Ethernet Lectures

    3/6

    (called "Hayes compatible") use a popular language developed by a company "Hayes

    Microcomputer Products, Inc." The command ATDSX4, for example, indicates that pay

    attention (AT), dial stored telephone number (DS), and then display the progress of the

    call (X4).

    o Intelligent Modems: Intelligent modems are also calledadvancedmodems. Thesemodems can accept new instructions and then respond to the commands while

    transmitting data and information. These can be done by microprocessor chips and

    internal read only memory (ROM) contained in the modem. Of course, these modems

    are more expensive.

    Short-Haul and Wireless Modems

    o Short-Haul Modems: Short- haul modems are devices that transmit signals down thecable through any COM1 port. They sometimes are called modem eliminators, because

    they do not require an external power source. They are also called line drivers that can

    send data for a distance of more than one mile. This type of modem can be used within

    or across several buildings in a company or a university campus.

    o Wireless Modems:Wireless modems transmit the data signals through the air instead ofby using a cable. They sometimes are called a radiofrequency modem. This type of

    modem is designed to work with cellular technology, and wireless local area networks.

    Wireless modems are not yet perfected, but the technology is rapidly improving.

    6) Different Types Of Cabling

    Unshielded twisted pair cables, 22-24 gauge (UTP)

    Advantages Inexpensive, may be in place in some places; familiar and simple to install.

    Disadvantages Subject to interference, both internal and external; limited bandwidth, which

    translates into slower transmissions. Somewhat vulnerable to security breaches; may become obsolete

    quickly because of new technologies.

    Shielded twisted pair cables, 22-24 (STP)

    Advantages Easy installation; reasonable cost; resistance to interference; better electrical

    characteristics than unshielded cables; better data security; easily terminated with modular connector.

    Disadvantages May become obsolete due to technical advances; can be tapped, breaching

    security.

    Coaxial cables

  • 8/6/2019 Ethernet Lectures

    4/6

    Advantages Familiar and fairly easy to install; better electrical characteristics (lower attenuation

    and great bandwidth than shielded or unshielded cables; highly resistant to interference; generally good

    data security; easy to connect.

    Disadvantages May become obsolete due to technological advances; can be tapped, breaching

    security.

    Optical fiber cables

    Advantages Top performance; excellent bandwidth ( high in the gigabit range, and theoretically

    higher); very long life span; excellent security; allows for very high rates of data transmission; causes no

    interference and is not subject to electromagnetic interference; smaller and lighter than other cable

    types.

    Disadvantages Slightly higher installed cost than twisted -pair cables.

    7) Most efficient at moving packets between similar network topologies

    Router is more efficient than the Bridge in terms of topologies.

    8.) Type of cabling is easiest to install

    UTP - Some STP cables use a thick braided shield. These cables are heavier, thicker, and harder

    to install than their UTP counterparts

    9) Device is transfer packets across multiple networks & use tables to store network address

    to determine the best destination

    Bridges is used for determining the best destination.

    10) Network - is a collection of computer and devices connected together to share resources.

  • 8/6/2019 Ethernet Lectures

    5/6

    ASSIGNMENT IN IT ELECTIVE 1

    KAYVIN L. MALAWIG

    BSIT IV

    Devices Use In Networking

    Network Repeater

    A repeater connects two segments of your network cable. It retimes and regenerates the signals to

    proper amplitudes and sends them to the other segments. When talking about, ethernet topology, you

    are probably talking about using a hub as a repeater. Repeaters require a small amount of time to

    regenerate the signal. This can cause a propagation delay which can affect network communication

    when there are several repeaters in a row. Many network architectures limit the number of repeaters

    that can be used in a row. Repeaters work only at the physical layer of the OSI network model.

    Bridge

    A bridge reads the outermost section of data on the data packet, to tell where the message is going. It

    reduces the traffic on other network segments, since it does not send all packets. Bridges can be

    programmed to reject packets from particular networks. Bridging occurs at the data link layer of the OSI

    model, which means the bridge cannot read IP addresses, but only the outermost hardware address of

    the packet. In our case the bridge can read the ethernet data which gives the hardware address of the

    destination address, not the IP address. Bridges forward all broadcast messages. Only a special bridge

    called a translation bridge will allow two networks of different architectures to be connected. Bridges

    do not normally allow connection of networks with different architectures. The hardware address is

    also called the MAC (media access control) address. To determine the network segment a MAC address

    belongs to, bridges use one of:

    y Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. Ifthe address is not in the bridging table, the packet is forwarded to all segments other than the

    one it came from. This type of bridge is used on ethernet networks.

    y Source route bridging - The source computer provides path information inside the packet. This

  • 8/6/2019 Ethernet Lectures

    6/6