SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Chapter 11
Enterprise & Distributed Networks

Networking Concepts – Eric Vanderburg ©2005
Expanding Networks
 Modem

(Modulator/Demodulator)

 RJ11

phone port
 External modems use RS-232
(Recommended Standard 232) serial port
 Hayes-compatible – works with software
designed for the original Hayes modems in
the early 80’s

Networking Concepts – Eric
Vanderburg ©2005
Modems
Baud – number of sound wave oscillations per second
– old modems transferred 1 bit/baud
 ITU (International Telecommunications Union) –
created the V-series standards


•
•
•
•
•

V.22bis* – 2400baud, 2.4kbps
V.32 – 2400baud, 9.6kbps
V.32bis – 2400baud, 13.4kbps
V.32ter – 2400baud, 19.2kbps
V.FC (Fast Class) – 9600baud,
28.8kbps

•
•
•
•
•

V.34 – 9600baud, 28.8kbps
V.34bis – 9600baud, 33.6kbps
V.42bis – uses compression &
error correction, 28.8kbps
V.90 – 56k d/l, 22.6k u/l
V.92 – modem on hold, 56k

Networking respectively
*Bis & ter mean 2nd & 3rd revisionsConcepts – Eric
Vanderburg ©2005
Modems
Asynchronous – start and stop bits are placed before and after each byte
(8 bits + parity bit). More check data and more overhead.
 PCM (Pulse Code Modulation) – digitizing an analog signal on a modem





33.6 Kbps from modem to ISP
56 Kbps from ISP to modem

MNP Class 5 compression
 Synchronous – devices agree on a timing scheme utilizing sync bits and
transfer blocks of data (frames) accordingly. Less overhead, leased line
use. Also provide error checking.








SDLC (Synchronous Data Link Control)
HDLC (High-level Data Link Control)
Bisync (Binary Synchronous)

Transfer rates depend on




Line conditions
V standard
FCC regulations (max is 54kbps)

Networking Concepts – Eric
Vanderburg ©2005
Digital Modems


ISDN (Integrated Services Digital Network)







Cable




NT (Network Termination)
TA (Terminal Adapter)
BRI (Basic Rate Interface) – 2 B channels (64k) & 1 D channel (16k),
$50-$70
PRI (Primary Rate Interface) – 23 B channels, 1 D channel
(H10=1472 kb/s *see ch.7), $300-$1500
DOCSIS encrypts each connection to increase security.

DSL




Distance limitation between user and CO (17,500-23,000ft)
ADSL (Asymmetric Digital Subscriber Line) - 8 Mbps d/l, 1 Mbps u/l
SDSL (Symmetric Digital Subscriber Line) - equal d/l and u/l speeds

Networking Concepts – Eric
Vanderburg ©2005
Carriers
 Throughput

– how much data can be
sent over the line per second
 Distance
 Cost

Networking Concepts – Eric
Vanderburg ©2005
RRAS
 RRAS

Authentication

 Wizard

Networking Concepts – Eric
Vanderburg ©2005
RRAS & terms


RRAS






DUN (Dial-up Networking)
SLIP (Serial Line Internet Protocol)





Layer 1
Works with TCP/IP only

CSLIP (Compressed Serial Line Internet Protocol)




Max concurrent clients: 256
Called RAS (Remote Access Service) in NT

Same as SLIP but can compress data to increase speed

PPP (Point-to-Point Protocol)





Layers 1 & 2
Works with IP, IPX, & NetBEUI
Can compress & check for errors
Supports DHCP

Networking Concepts – Eric
Vanderburg ©2005
Other Vendors


Novell NetWare provides VPN server connections







Able to form VPN WAN by connecting corporate LANs over
VPN connections through the Internet

Mac OS version 9 and above support VPN client
connections to Windows servers using PPTP or IPSec
Mac OS X Server provides a VPN server service that
permits Mac OS, Windows, and Linux/Unix clients to
connect to the corporate LAN
Linux versions using L2TP may not be compatible with
Windows VPN solutions

Networking Concepts – Eric
Vanderburg ©2005
VPN
 Linux

supports VPN client and server
applications
 Not

compatible with Windows L2TP
 More difficult to use; may require a patch to
the kernel
 VPNs

are Less expensive than a modem
pool. Internet connection replaces direct
modem connection
Networking Concepts – Eric
Vanderburg ©2005
VLAN
 Implemented

on switches
 Requires a router also
 Divides ports into logical
sections
 Usually separated by
subnet

Networking Concepts – Eric
Vanderburg ©2005
Routing
 Static

routing – each path must be
manually entered – same path is used
each time
 Dynamic routing – router determines the
best route based on available info

Networking Concepts – Eric
Vanderburg ©2005
Brouters
 Routes

packets that use routable
protocols
 Forwards packets that are not routable
 Useful in hybrid network with mixture of
routable and nonroutable protocols
 May be identified as router with bridging
capabilities
Networking Concepts – Eric
Vanderburg ©2005
Gateway
 Operates

at layer 7
 Translates between most dissimilar
networks
 GSNW…

Networking Concepts – Eric
Vanderburg ©2005

Weitere ähnliche Inhalte

Was ist angesagt?

Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgEric Vanderburg
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Networkzaisahil
 

Was ist angesagt? (20)

Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
WLAN
WLANWLAN
WLAN
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Cn fundamentals of networks
Cn fundamentals of networksCn fundamentals of networks
Cn fundamentals of networks
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Wireless
WirelessWireless
Wireless
 
Zigbee
ZigbeeZigbee
Zigbee
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Network
 
Zigbee
 Zigbee    Zigbee
Zigbee
 

Andere mochten auch

Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0Guus van den Brekel
 
Central reservation system
Central reservation systemCentral reservation system
Central reservation systemShantimani
 
Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)jasna thilayil kundoor
 
The Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler ExperienceThe Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler ExperienceRafat Ali
 

Andere mochten auch (8)

Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0Virtual Research Networks : Towards Research 2.0
Virtual Research Networks : Towards Research 2.0
 
Central reservation system
Central reservation systemCentral reservation system
Central reservation system
 
Online Travel Agency
Online Travel AgencyOnline Travel Agency
Online Travel Agency
 
Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)Computer Reservation System (CRS) & Global Distribution System (GDS)
Computer Reservation System (CRS) & Global Distribution System (GDS)
 
Introduction of Booking.com
Introduction of Booking.comIntroduction of Booking.com
Introduction of Booking.com
 
The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...
The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...
The Power of Online Travel Agencies (OTA): Results of an Online Survey on Hot...
 
OTA Models
OTA ModelsOTA Models
OTA Models
 
The Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler ExperienceThe Connected: How Digital is Transforming the Traveler Experience
The Connected: How Digital is Transforming the Traveler Experience
 

Ähnlich wie Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vanderburg

Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Designnakomuri
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber LineKashif Akram
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]Raul Soto
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoguy
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Sachin Morya
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Routerphanleson
 
Voice and Data Delivery Networks
Voice and Data Delivery NetworksVoice and Data Delivery Networks
Voice and Data Delivery NetworksKen V
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exampapapapogi
 
Broad band
Broad bandBroad band
Broad bandBala V
 
65042_chapter9.ppt
65042_chapter9.ppt65042_chapter9.ppt
65042_chapter9.pptssuser1028f8
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 

Ähnlich wie Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vanderburg (20)

Modem
ModemModem
Modem
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Design
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
 
Lecture8
Lecture8Lecture8
Lecture8
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber Line
 
Ce 305 -wa ns
Ce 305 -wa nsCe 305 -wa ns
Ce 305 -wa ns
 
Telecomm presentation [2005]
Telecomm presentation [2005]Telecomm presentation [2005]
Telecomm presentation [2005]
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Videoconferencing Technology Workshop
Videoconferencing Technology WorkshopVideoconferencing Technology Workshop
Videoconferencing Technology Workshop
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Chapter 02 - Wan Router
Chapter 02 - Wan RouterChapter 02 - Wan Router
Chapter 02 - Wan Router
 
Voice and Data Delivery Networks
Voice and Data Delivery NetworksVoice and Data Delivery Networks
Voice and Data Delivery Networks
 
Powerpoint exam
Powerpoint examPowerpoint exam
Powerpoint exam
 
Broad band
Broad bandBroad band
Broad band
 
65042_chapter9.ppt
65042_chapter9.ppt65042_chapter9.ppt
65042_chapter9.ppt
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Broadband
Broadband Broadband
Broadband
 

Mehr von Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Mehr von Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Kürzlich hochgeladen

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Networking Concepts Lesson 11 - Enterprise & Distributed Networks - Eric Vanderburg

  • 1. Chapter 11 Enterprise & Distributed Networks Networking Concepts – Eric Vanderburg ©2005
  • 2. Expanding Networks  Modem (Modulator/Demodulator)  RJ11 phone port  External modems use RS-232 (Recommended Standard 232) serial port  Hayes-compatible – works with software designed for the original Hayes modems in the early 80’s Networking Concepts – Eric Vanderburg ©2005
  • 3. Modems Baud – number of sound wave oscillations per second – old modems transferred 1 bit/baud  ITU (International Telecommunications Union) – created the V-series standards  • • • • • V.22bis* – 2400baud, 2.4kbps V.32 – 2400baud, 9.6kbps V.32bis – 2400baud, 13.4kbps V.32ter – 2400baud, 19.2kbps V.FC (Fast Class) – 9600baud, 28.8kbps • • • • • V.34 – 9600baud, 28.8kbps V.34bis – 9600baud, 33.6kbps V.42bis – uses compression & error correction, 28.8kbps V.90 – 56k d/l, 22.6k u/l V.92 – modem on hold, 56k Networking respectively *Bis & ter mean 2nd & 3rd revisionsConcepts – Eric Vanderburg ©2005
  • 4. Modems Asynchronous – start and stop bits are placed before and after each byte (8 bits + parity bit). More check data and more overhead.  PCM (Pulse Code Modulation) – digitizing an analog signal on a modem    33.6 Kbps from modem to ISP 56 Kbps from ISP to modem MNP Class 5 compression  Synchronous – devices agree on a timing scheme utilizing sync bits and transfer blocks of data (frames) accordingly. Less overhead, leased line use. Also provide error checking.      SDLC (Synchronous Data Link Control) HDLC (High-level Data Link Control) Bisync (Binary Synchronous) Transfer rates depend on    Line conditions V standard FCC regulations (max is 54kbps) Networking Concepts – Eric Vanderburg ©2005
  • 5. Digital Modems  ISDN (Integrated Services Digital Network)      Cable   NT (Network Termination) TA (Terminal Adapter) BRI (Basic Rate Interface) – 2 B channels (64k) & 1 D channel (16k), $50-$70 PRI (Primary Rate Interface) – 23 B channels, 1 D channel (H10=1472 kb/s *see ch.7), $300-$1500 DOCSIS encrypts each connection to increase security. DSL    Distance limitation between user and CO (17,500-23,000ft) ADSL (Asymmetric Digital Subscriber Line) - 8 Mbps d/l, 1 Mbps u/l SDSL (Symmetric Digital Subscriber Line) - equal d/l and u/l speeds Networking Concepts – Eric Vanderburg ©2005
  • 6. Carriers  Throughput – how much data can be sent over the line per second  Distance  Cost Networking Concepts – Eric Vanderburg ©2005
  • 7. RRAS  RRAS Authentication  Wizard Networking Concepts – Eric Vanderburg ©2005
  • 8. RRAS & terms  RRAS     DUN (Dial-up Networking) SLIP (Serial Line Internet Protocol)    Layer 1 Works with TCP/IP only CSLIP (Compressed Serial Line Internet Protocol)   Max concurrent clients: 256 Called RAS (Remote Access Service) in NT Same as SLIP but can compress data to increase speed PPP (Point-to-Point Protocol)     Layers 1 & 2 Works with IP, IPX, & NetBEUI Can compress & check for errors Supports DHCP Networking Concepts – Eric Vanderburg ©2005
  • 9. Other Vendors  Novell NetWare provides VPN server connections     Able to form VPN WAN by connecting corporate LANs over VPN connections through the Internet Mac OS version 9 and above support VPN client connections to Windows servers using PPTP or IPSec Mac OS X Server provides a VPN server service that permits Mac OS, Windows, and Linux/Unix clients to connect to the corporate LAN Linux versions using L2TP may not be compatible with Windows VPN solutions Networking Concepts – Eric Vanderburg ©2005
  • 10. VPN  Linux supports VPN client and server applications  Not compatible with Windows L2TP  More difficult to use; may require a patch to the kernel  VPNs are Less expensive than a modem pool. Internet connection replaces direct modem connection Networking Concepts – Eric Vanderburg ©2005
  • 11. VLAN  Implemented on switches  Requires a router also  Divides ports into logical sections  Usually separated by subnet Networking Concepts – Eric Vanderburg ©2005
  • 12. Routing  Static routing – each path must be manually entered – same path is used each time  Dynamic routing – router determines the best route based on available info Networking Concepts – Eric Vanderburg ©2005
  • 13. Brouters  Routes packets that use routable protocols  Forwards packets that are not routable  Useful in hybrid network with mixture of routable and nonroutable protocols  May be identified as router with bridging capabilities Networking Concepts – Eric Vanderburg ©2005
  • 14. Gateway  Operates at layer 7  Translates between most dissimilar networks  GSNW… Networking Concepts – Eric Vanderburg ©2005