SlideShare une entreprise Scribd logo
1  sur  14
Chapter 11
Enterprise & Distributed Networks

Networking Concepts – Eric Vanderburg ©2005
Expanding Networks
 Modem

(Modulator/Demodulator)

 RJ11

phone port
 External modems use RS-232
(Recommended Standard 232) serial port
 Hayes-compatible – works with software
designed for the original Hayes modems in
the early 80’s

Networking Concepts – Eric
Vanderburg ©2005
Modems
Baud – number of sound wave oscillations per second
– old modems transferred 1 bit/baud
 ITU (International Telecommunications Union) –
created the V-series standards


•
•
•
•
•

V.22bis* – 2400baud, 2.4kbps
V.32 – 2400baud, 9.6kbps
V.32bis – 2400baud, 13.4kbps
V.32ter – 2400baud, 19.2kbps
V.FC (Fast Class) – 9600baud,
28.8kbps

•
•
•
•
•

V.34 – 9600baud, 28.8kbps
V.34bis – 9600baud, 33.6kbps
V.42bis – uses compression &
error correction, 28.8kbps
V.90 – 56k d/l, 22.6k u/l
V.92 – modem on hold, 56k

Networking respectively
*Bis & ter mean 2nd & 3rd revisionsConcepts – Eric
Vanderburg ©2005
Modems
Asynchronous – start and stop bits are placed before and after each byte
(8 bits + parity bit). More check data and more overhead.
 PCM (Pulse Code Modulation) – digitizing an analog signal on a modem





33.6 Kbps from modem to ISP
56 Kbps from ISP to modem

MNP Class 5 compression
 Synchronous – devices agree on a timing scheme utilizing sync bits and
transfer blocks of data (frames) accordingly. Less overhead, leased line
use. Also provide error checking.








SDLC (Synchronous Data Link Control)
HDLC (High-level Data Link Control)
Bisync (Binary Synchronous)

Transfer rates depend on




Line conditions
V standard
FCC regulations (max is 54kbps)

Networking Concepts – Eric
Vanderburg ©2005
Digital Modems


ISDN (Integrated Services Digital Network)







Cable




NT (Network Termination)
TA (Terminal Adapter)
BRI (Basic Rate Interface) – 2 B channels (64k) & 1 D channel (16k),
$50-$70
PRI (Primary Rate Interface) – 23 B channels, 1 D channel
(H10=1472 kb/s *see ch.7), $300-$1500
DOCSIS encrypts each connection to increase security.

DSL




Distance limitation between user and CO (17,500-23,000ft)
ADSL (Asymmetric Digital Subscriber Line) - 8 Mbps d/l, 1 Mbps u/l
SDSL (Symmetric Digital Subscriber Line) - equal d/l and u/l speeds

Networking Concepts – Eric
Vanderburg ©2005
Carriers
 Throughput

– how much data can be
sent over the line per second
 Distance
 Cost

Networking Concepts – Eric
Vanderburg ©2005
RRAS
 RRAS

Authentication

 Wizard

Networking Concepts – Eric
Vanderburg ©2005
RRAS & terms


RRAS






DUN (Dial-up Networking)
SLIP (Serial Line Internet Protocol)





Layer 1
Works with TCP/IP only

CSLIP (Compressed Serial Line Internet Protocol)




Max concurrent clients: 256
Called RAS (Remote Access Service) in NT

Same as SLIP but can compress data to increase speed

PPP (Point-to-Point Protocol)





Layers 1 & 2
Works with IP, IPX, & NetBEUI
Can compress & check for errors
Supports DHCP

Networking Concepts – Eric
Vanderburg ©2005
Other Vendors


Novell NetWare provides VPN server connections







Able to form VPN WAN by connecting corporate LANs over
VPN connections through the Internet

Mac OS version 9 and above support VPN client
connections to Windows servers using PPTP or IPSec
Mac OS X Server provides a VPN server service that
permits Mac OS, Windows, and Linux/Unix clients to
connect to the corporate LAN
Linux versions using L2TP may not be compatible with
Windows VPN solutions

Networking Concepts – Eric
Vanderburg ©2005
VPN
 Linux

supports VPN client and server
applications
 Not

compatible with Windows L2TP
 More difficult to use; may require a patch to
the kernel
 VPNs

are Less expensive than a modem
pool. Internet connection replaces direct
modem connection
Networking Concepts – Eric
Vanderburg ©2005
VLAN
 Implemented

on switches
 Requires a router also
 Divides ports into logical
sections
 Usually separated by
subnet

Networking Concepts – Eric
Vanderburg ©2005
Routing
 Static

routing – each path must be
manually entered – same path is used
each time
 Dynamic routing – router determines the
best route based on available info

Networking Concepts – Eric
Vanderburg ©2005
Brouters
 Routes

packets that use routable
protocols
 Forwards packets that are not routable
 Useful in hybrid network with mixture of
routable and nonroutable protocols
 May be identified as router with bridging
capabilities
Networking Concepts – Eric
Vanderburg ©2005
Gateway
 Operates

at layer 7
 Translates between most dissimilar
networks
 GSNW…

Networking Concepts – Eric
Vanderburg ©2005

Contenu connexe

Tendances

Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgEric Vanderburg
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Networkzaisahil
 

Tendances (20)

Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
WLAN
WLANWLAN
WLAN
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Cn fundamentals of networks
Cn fundamentals of networksCn fundamentals of networks
Cn fundamentals of networks
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Wireless
WirelessWireless
Wireless
 
Zigbee
ZigbeeZigbee
Zigbee
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Network
 
Zigbee
 Zigbee    Zigbee
Zigbee
 

En vedette

Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0Guus van den Brekel
 
Central reservation system
Central reservation systemCentral reservation system
Central reservation systemShantimani
 
Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)jasna thilayil kundoor
 
The Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler ExperienceThe Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler ExperienceRafat Ali
 

En vedette (8)

Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0
 
Central reservation system
Central reservation systemCentral reservation system
Central reservation system
 
Online Travel Agency
Online Travel AgencyOnline Travel Agency
Online Travel Agency
 
Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)
 
Introduction of Booking.com
Introduction of Booking.comIntroduction of Booking.com
Introduction of Booking.com
 
The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...
The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...
The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...
 
OTA Models
OTA ModelsOTA Models
OTA Models
 
The Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler ExperienceThe Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler Experience
 

Similaire à Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vanderburg

Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Designnakomuri
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber LineKashif Akram
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]Raul Soto
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoguy
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Sachin Morya
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Routerphanleson
 
Voice and Data Delivery Networks
Voice and Data Delivery NetworksVoice and Data Delivery Networks
Voice and Data Delivery NetworksKen V
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exampapapapogi
 
Broad band
Broad bandBroad band
Broad bandBala V
 
65042_chapter9.ppt
65042_chapter9.ppt65042_chapter9.ppt
65042_chapter9.pptssuser1028f8
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 

Similaire à Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vanderburg (20)

Modem
ModemModem
Modem
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Design
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
 
Lecture8
Lecture8Lecture8
Lecture8
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber Line
 
Ce 305 -wa ns
Ce 305 -wa nsCe 305 -wa ns
Ce 305 -wa ns
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
 
Voice and Data Delivery Networks
Voice and Data Delivery NetworksVoice and Data Delivery Networks
Voice and Data Delivery Networks
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exam
 
Broad band
Broad bandBroad band
Broad band
 
65042_chapter9.ppt
65042_chapter9.ppt65042_chapter9.ppt
65042_chapter9.ppt
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Broadband
Broadband Broadband
Broadband
 

Plus de Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Plus de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Dernier

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Dernier (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vanderburg

  • 1. Chapter 11 Enterprise & Distributed Networks Networking Concepts – Eric Vanderburg ©2005
  • 2. Expanding Networks  Modem (Modulator/Demodulator)  RJ11 phone port  External modems use RS-232 (Recommended Standard 232) serial port  Hayes-compatible – works with software designed for the original Hayes modems in the early 80’s Networking Concepts – Eric Vanderburg ©2005
  • 3. Modems Baud – number of sound wave oscillations per second – old modems transferred 1 bit/baud  ITU (International Telecommunications Union) – created the V-series standards  • • • • • V.22bis* – 2400baud, 2.4kbps V.32 – 2400baud, 9.6kbps V.32bis – 2400baud, 13.4kbps V.32ter – 2400baud, 19.2kbps V.FC (Fast Class) – 9600baud, 28.8kbps • • • • • V.34 – 9600baud, 28.8kbps V.34bis – 9600baud, 33.6kbps V.42bis – uses compression & error correction, 28.8kbps V.90 – 56k d/l, 22.6k u/l V.92 – modem on hold, 56k Networking respectively *Bis & ter mean 2nd & 3rd revisionsConcepts – Eric Vanderburg ©2005
  • 4. Modems Asynchronous – start and stop bits are placed before and after each byte (8 bits + parity bit). More check data and more overhead.  PCM (Pulse Code Modulation) – digitizing an analog signal on a modem    33.6 Kbps from modem to ISP 56 Kbps from ISP to modem MNP Class 5 compression  Synchronous – devices agree on a timing scheme utilizing sync bits and transfer blocks of data (frames) accordingly. Less overhead, leased line use. Also provide error checking.      SDLC (Synchronous Data Link Control) HDLC (High-level Data Link Control) Bisync (Binary Synchronous) Transfer rates depend on    Line conditions V standard FCC regulations (max is 54kbps) Networking Concepts – Eric Vanderburg ©2005
  • 5. Digital Modems  ISDN (Integrated Services Digital Network)      Cable   NT (Network Termination) TA (Terminal Adapter) BRI (Basic Rate Interface) – 2 B channels (64k) & 1 D channel (16k), $50-$70 PRI (Primary Rate Interface) – 23 B channels, 1 D channel (H10=1472 kb/s *see ch.7), $300-$1500 DOCSIS encrypts each connection to increase security. DSL    Distance limitation between user and CO (17,500-23,000ft) ADSL (Asymmetric Digital Subscriber Line) - 8 Mbps d/l, 1 Mbps u/l SDSL (Symmetric Digital Subscriber Line) - equal d/l and u/l speeds Networking Concepts – Eric Vanderburg ©2005
  • 6. Carriers  Throughput – how much data can be sent over the line per second  Distance  Cost Networking Concepts – Eric Vanderburg ©2005
  • 7. RRAS  RRAS Authentication  Wizard Networking Concepts – Eric Vanderburg ©2005
  • 8. RRAS & terms  RRAS     DUN (Dial-up Networking) SLIP (Serial Line Internet Protocol)    Layer 1 Works with TCP/IP only CSLIP (Compressed Serial Line Internet Protocol)   Max concurrent clients: 256 Called RAS (Remote Access Service) in NT Same as SLIP but can compress data to increase speed PPP (Point-to-Point Protocol)     Layers 1 & 2 Works with IP, IPX, & NetBEUI Can compress & check for errors Supports DHCP Networking Concepts – Eric Vanderburg ©2005
  • 9. Other Vendors  Novell NetWare provides VPN server connections     Able to form VPN WAN by connecting corporate LANs over VPN connections through the Internet Mac OS version 9 and above support VPN client connections to Windows servers using PPTP or IPSec Mac OS X Server provides a VPN server service that permits Mac OS, Windows, and Linux/Unix clients to connect to the corporate LAN Linux versions using L2TP may not be compatible with Windows VPN solutions Networking Concepts – Eric Vanderburg ©2005
  • 10. VPN  Linux supports VPN client and server applications  Not compatible with Windows L2TP  More difficult to use; may require a patch to the kernel  VPNs are Less expensive than a modem pool. Internet connection replaces direct modem connection Networking Concepts – Eric Vanderburg ©2005
  • 11. VLAN  Implemented on switches  Requires a router also  Divides ports into logical sections  Usually separated by subnet Networking Concepts – Eric Vanderburg ©2005
  • 12. Routing  Static routing – each path must be manually entered – same path is used each time  Dynamic routing – router determines the best route based on available info Networking Concepts – Eric Vanderburg ©2005
  • 13. Brouters  Routes packets that use routable protocols  Forwards packets that are not routable  Useful in hybrid network with mixture of routable and nonroutable protocols  May be identified as router with bridging capabilities Networking Concepts – Eric Vanderburg ©2005
  • 14. Gateway  Operates at layer 7  Translates between most dissimilar networks  GSNW… Networking Concepts – Eric Vanderburg ©2005