SlideShare une entreprise Scribd logo
1  sur  14
Chapter 11
Enterprise & Distributed Networks

Networking Concepts – Eric Vanderburg ©2005
Expanding Networks
 Modem

(Modulator/Demodulator)

 RJ11

phone port
 External modems use RS-232
(Recommended Standard 232) serial port
 Hayes-compatible – works with software
designed for the original Hayes modems in
the early 80’s

Networking Concepts – Eric
Vanderburg ©2005
Modems
Baud – number of sound wave oscillations per second
– old modems transferred 1 bit/baud
 ITU (International Telecommunications Union) –
created the V-series standards


•
•
•
•
•

V.22bis* – 2400baud, 2.4kbps
V.32 – 2400baud, 9.6kbps
V.32bis – 2400baud, 13.4kbps
V.32ter – 2400baud, 19.2kbps
V.FC (Fast Class) – 9600baud,
28.8kbps

•
•
•
•
•

V.34 – 9600baud, 28.8kbps
V.34bis – 9600baud, 33.6kbps
V.42bis – uses compression &
error correction, 28.8kbps
V.90 – 56k d/l, 22.6k u/l
V.92 – modem on hold, 56k

Networking respectively
*Bis & ter mean 2nd & 3rd revisionsConcepts – Eric
Vanderburg ©2005
Modems
Asynchronous – start and stop bits are placed before and after each byte
(8 bits + parity bit). More check data and more overhead.
 PCM (Pulse Code Modulation) – digitizing an analog signal on a modem





33.6 Kbps from modem to ISP
56 Kbps from ISP to modem

MNP Class 5 compression
 Synchronous – devices agree on a timing scheme utilizing sync bits and
transfer blocks of data (frames) accordingly. Less overhead, leased line
use. Also provide error checking.








SDLC (Synchronous Data Link Control)
HDLC (High-level Data Link Control)
Bisync (Binary Synchronous)

Transfer rates depend on




Line conditions
V standard
FCC regulations (max is 54kbps)

Networking Concepts – Eric
Vanderburg ©2005
Digital Modems


ISDN (Integrated Services Digital Network)







Cable




NT (Network Termination)
TA (Terminal Adapter)
BRI (Basic Rate Interface) – 2 B channels (64k) & 1 D channel (16k),
$50-$70
PRI (Primary Rate Interface) – 23 B channels, 1 D channel
(H10=1472 kb/s *see ch.7), $300-$1500
DOCSIS encrypts each connection to increase security.

DSL




Distance limitation between user and CO (17,500-23,000ft)
ADSL (Asymmetric Digital Subscriber Line) - 8 Mbps d/l, 1 Mbps u/l
SDSL (Symmetric Digital Subscriber Line) - equal d/l and u/l speeds

Networking Concepts – Eric
Vanderburg ©2005
Carriers
 Throughput

– how much data can be
sent over the line per second
 Distance
 Cost

Networking Concepts – Eric
Vanderburg ©2005
RRAS
 RRAS

Authentication

 Wizard

Networking Concepts – Eric
Vanderburg ©2005
RRAS & terms


RRAS






DUN (Dial-up Networking)
SLIP (Serial Line Internet Protocol)





Layer 1
Works with TCP/IP only

CSLIP (Compressed Serial Line Internet Protocol)




Max concurrent clients: 256
Called RAS (Remote Access Service) in NT

Same as SLIP but can compress data to increase speed

PPP (Point-to-Point Protocol)





Layers 1 & 2
Works with IP, IPX, & NetBEUI
Can compress & check for errors
Supports DHCP

Networking Concepts – Eric
Vanderburg ©2005
Other Vendors


Novell NetWare provides VPN server connections







Able to form VPN WAN by connecting corporate LANs over
VPN connections through the Internet

Mac OS version 9 and above support VPN client
connections to Windows servers using PPTP or IPSec
Mac OS X Server provides a VPN server service that
permits Mac OS, Windows, and Linux/Unix clients to
connect to the corporate LAN
Linux versions using L2TP may not be compatible with
Windows VPN solutions

Networking Concepts – Eric
Vanderburg ©2005
VPN
 Linux

supports VPN client and server
applications
 Not

compatible with Windows L2TP
 More difficult to use; may require a patch to
the kernel
 VPNs

are Less expensive than a modem
pool. Internet connection replaces direct
modem connection
Networking Concepts – Eric
Vanderburg ©2005
VLAN
 Implemented

on switches
 Requires a router also
 Divides ports into logical
sections
 Usually separated by
subnet

Networking Concepts – Eric
Vanderburg ©2005
Routing
 Static

routing – each path must be
manually entered – same path is used
each time
 Dynamic routing – router determines the
best route based on available info

Networking Concepts – Eric
Vanderburg ©2005
Brouters
 Routes

packets that use routable
protocols
 Forwards packets that are not routable
 Useful in hybrid network with mixture of
routable and nonroutable protocols
 May be identified as router with bridging
capabilities
Networking Concepts – Eric
Vanderburg ©2005
Gateway
 Operates

at layer 7
 Translates between most dissimilar
networks
 GSNW…

Networking Concepts – Eric
Vanderburg ©2005

Contenu connexe

Tendances

Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgEric Vanderburg
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Networkzaisahil
 

Tendances (20)

Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
WLAN
WLANWLAN
WLAN
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Cn fundamentals of networks
Cn fundamentals of networksCn fundamentals of networks
Cn fundamentals of networks
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Wireless
WirelessWireless
Wireless
 
Zigbee
ZigbeeZigbee
Zigbee
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Network
 
Zigbee
 Zigbee    Zigbee
Zigbee
 

En vedette

Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0Guus van den Brekel
 
Central reservation system
Central reservation systemCentral reservation system
Central reservation systemShantimani
 
Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)jasna thilayil kundoor
 
The Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler ExperienceThe Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler ExperienceRafat Ali
 

En vedette (8)

Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0
 
Central reservation system
Central reservation systemCentral reservation system
Central reservation system
 
Online Travel Agency
Online Travel AgencyOnline Travel Agency
Online Travel Agency
 
Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)
 
Introduction of Booking.com
Introduction of Booking.comIntroduction of Booking.com
Introduction of Booking.com
 
The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...
The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...
The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...
 
OTA Models
OTA ModelsOTA Models
OTA Models
 
The Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler ExperienceThe Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler Experience
 

Similaire à Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vanderburg

Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Designnakomuri
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber LineKashif Akram
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]Raul Soto
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoguy
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Sachin Morya
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Routerphanleson
 
Voice and Data Delivery Networks
Voice and Data Delivery NetworksVoice and Data Delivery Networks
Voice and Data Delivery NetworksKen V
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exampapapapogi
 
Broad band
Broad bandBroad band
Broad bandBala V
 
65042_chapter9.ppt
65042_chapter9.ppt65042_chapter9.ppt
65042_chapter9.pptssuser1028f8
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 

Similaire à Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vanderburg (20)

Modem
ModemModem
Modem
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Design
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
 
Lecture8
Lecture8Lecture8
Lecture8
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber Line
 
Ce 305 -wa ns
Ce 305 -wa nsCe 305 -wa ns
Ce 305 -wa ns
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
 
Voice and Data Delivery Networks
Voice and Data Delivery NetworksVoice and Data Delivery Networks
Voice and Data Delivery Networks
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exam
 
Broad band
Broad bandBroad band
Broad band
 
65042_chapter9.ppt
65042_chapter9.ppt65042_chapter9.ppt
65042_chapter9.ppt
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Broadband
Broadband Broadband
Broadband
 

Plus de Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Plus de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Dernier

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vanderburg

  • 1. Chapter 11 Enterprise & Distributed Networks Networking Concepts – Eric Vanderburg ©2005
  • 2. Expanding Networks  Modem (Modulator/Demodulator)  RJ11 phone port  External modems use RS-232 (Recommended Standard 232) serial port  Hayes-compatible – works with software designed for the original Hayes modems in the early 80’s Networking Concepts – Eric Vanderburg ©2005
  • 3. Modems Baud – number of sound wave oscillations per second – old modems transferred 1 bit/baud  ITU (International Telecommunications Union) – created the V-series standards  • • • • • V.22bis* – 2400baud, 2.4kbps V.32 – 2400baud, 9.6kbps V.32bis – 2400baud, 13.4kbps V.32ter – 2400baud, 19.2kbps V.FC (Fast Class) – 9600baud, 28.8kbps • • • • • V.34 – 9600baud, 28.8kbps V.34bis – 9600baud, 33.6kbps V.42bis – uses compression & error correction, 28.8kbps V.90 – 56k d/l, 22.6k u/l V.92 – modem on hold, 56k Networking respectively *Bis & ter mean 2nd & 3rd revisionsConcepts – Eric Vanderburg ©2005
  • 4. Modems Asynchronous – start and stop bits are placed before and after each byte (8 bits + parity bit). More check data and more overhead.  PCM (Pulse Code Modulation) – digitizing an analog signal on a modem    33.6 Kbps from modem to ISP 56 Kbps from ISP to modem MNP Class 5 compression  Synchronous – devices agree on a timing scheme utilizing sync bits and transfer blocks of data (frames) accordingly. Less overhead, leased line use. Also provide error checking.      SDLC (Synchronous Data Link Control) HDLC (High-level Data Link Control) Bisync (Binary Synchronous) Transfer rates depend on    Line conditions V standard FCC regulations (max is 54kbps) Networking Concepts – Eric Vanderburg ©2005
  • 5. Digital Modems  ISDN (Integrated Services Digital Network)      Cable   NT (Network Termination) TA (Terminal Adapter) BRI (Basic Rate Interface) – 2 B channels (64k) & 1 D channel (16k), $50-$70 PRI (Primary Rate Interface) – 23 B channels, 1 D channel (H10=1472 kb/s *see ch.7), $300-$1500 DOCSIS encrypts each connection to increase security. DSL    Distance limitation between user and CO (17,500-23,000ft) ADSL (Asymmetric Digital Subscriber Line) - 8 Mbps d/l, 1 Mbps u/l SDSL (Symmetric Digital Subscriber Line) - equal d/l and u/l speeds Networking Concepts – Eric Vanderburg ©2005
  • 6. Carriers  Throughput – how much data can be sent over the line per second  Distance  Cost Networking Concepts – Eric Vanderburg ©2005
  • 7. RRAS  RRAS Authentication  Wizard Networking Concepts – Eric Vanderburg ©2005
  • 8. RRAS & terms  RRAS     DUN (Dial-up Networking) SLIP (Serial Line Internet Protocol)    Layer 1 Works with TCP/IP only CSLIP (Compressed Serial Line Internet Protocol)   Max concurrent clients: 256 Called RAS (Remote Access Service) in NT Same as SLIP but can compress data to increase speed PPP (Point-to-Point Protocol)     Layers 1 & 2 Works with IP, IPX, & NetBEUI Can compress & check for errors Supports DHCP Networking Concepts – Eric Vanderburg ©2005
  • 9. Other Vendors  Novell NetWare provides VPN server connections     Able to form VPN WAN by connecting corporate LANs over VPN connections through the Internet Mac OS version 9 and above support VPN client connections to Windows servers using PPTP or IPSec Mac OS X Server provides a VPN server service that permits Mac OS, Windows, and Linux/Unix clients to connect to the corporate LAN Linux versions using L2TP may not be compatible with Windows VPN solutions Networking Concepts – Eric Vanderburg ©2005
  • 10. VPN  Linux supports VPN client and server applications  Not compatible with Windows L2TP  More difficult to use; may require a patch to the kernel  VPNs are Less expensive than a modem pool. Internet connection replaces direct modem connection Networking Concepts – Eric Vanderburg ©2005
  • 11. VLAN  Implemented on switches  Requires a router also  Divides ports into logical sections  Usually separated by subnet Networking Concepts – Eric Vanderburg ©2005
  • 12. Routing  Static routing – each path must be manually entered – same path is used each time  Dynamic routing – router determines the best route based on available info Networking Concepts – Eric Vanderburg ©2005
  • 13. Brouters  Routes packets that use routable protocols  Forwards packets that are not routable  Useful in hybrid network with mixture of routable and nonroutable protocols  May be identified as router with bridging capabilities Networking Concepts – Eric Vanderburg ©2005
  • 14. Gateway  Operates at layer 7  Translates between most dissimilar networks  GSNW… Networking Concepts – Eric Vanderburg ©2005