SlideShare uma empresa Scribd logo
1 de 25
Chapter 7
Network Architectures

Networking Concepts – Eric Vanderburg ©2005
Network Architectures
 The

overall structure, topology, physical
media, and channel access method.

Networking Concepts – Eric
Vanderburg ©2005
Ethernet
 Easy

to install
 Works with many protocols
 Uses a hardware address

Networking Concepts – Eric
Vanderburg ©2005
10Mbps Standards
 10base5
 10base2
 10baseT
 UTP

or STP
 5-4-3 rule – 5 segments, 4 repeaters, 3
segments with nodes
 100m
 1024 nodes, 1024 segments
 10baseF
Networking Concepts – Eric
Vanderburg ©2005
10baseF
 10baseFL

– fiber to desktop
 10baseFP – connecting passive hubs,
500m
 10baseFB – fiber backbone
 1024 nodes, 1024 segments

Networking Concepts – Eric
Vanderburg ©2005
100baseT
 100baseT4

– 4pair Cat3
 100baseTX – 2 pair Cat5
 100baseFX – 2 strand fiber
 Hub Types
 Class

I – 1 hub between devices
 Class 2 – 2 hubs between devices
 Switches are immune
Networking Concepts – Eric
Vanderburg ©2005
Gigabit Ethernet
 802.3z
 1000baseLX

– long wavelength (12701355nm), multimode fiber
 1000baseLH – long haul, 10,000m,
single-mode
 1000baseZX – 100,000m, single-mode
 1000baseSX – short wavelength (770860nm), multimode
Networking Concepts – Eric
Vanderburg ©2005
Gigabit Ethernet
 1000baseCX

– twin copper cables, short
range 25m, for connecting equipment
 1000baseT
 802.3ab
 Full

duplex all wires

Networking Concepts – Eric
Vanderburg ©2005
10 Gigabit Ethernet




802.3ae
All fiber
LAN versions





MAN versions




10GbaseSR – 26-82m, multimode, high speed server,
switches, & SANs
10GbaseLR, 10km, single mode, campus backbone
10GbaseER – 40km, single-mode

WAN versions




10GbaseSW – 300m, multimode
10GbaseLW – 10km, single mode
10GbaseEW – 40km, single mode
Networking Concepts – Eric
Vanderburg ©2005
Ethernet Frame Types
 Must

use same frame type to communicate
 802.3 – Netware 2x, 3x
 802.2 - IEEE 802.3
 Ethernet SNAP (SubNetwork Access Protocol)
– AppleTalk, protocol type field
 Ethernet II – TCP/IP, has protocol type field in
the preamble, can be up to 1518 bytes long

Networking Concepts – Eric
Vanderburg ©2005
Max Segments
 Switches

reduce the collision domain
 Routers reduce the broadcast domain
 Add

switches or routers to the network

Networking Concepts – Eric
Vanderburg ©2005
Wireless
 Hidden

node problem – all can hear AP
but not each other
 Demand priority used to correct
 RTS

(Ready to Send)
 CTS (Clear to Send)

Networking Concepts – Eric
Vanderburg ©2005
Token Ring
 NAUN

(Nearest Active Upstream Neighbor)
 NADN (Nearest Active Downstream Neighbor)
 Beaconing – find error in ring, beacon sent
every 7 seconds
 MAU (Multistation Access Unit) / SMAU (Smart
Multistation Access Unit)


Has 10 or 16 ports, 2 ports used for RI (Ring In) &
RO (Ring Out)

Networking Concepts – Eric
Vanderburg ©2005
Token Ring Frame Types
 802.5

frame type (the native format for
Token Ring networks), up to 18,000
bytes long
 Token Ring SNAP - 802.5 frame type
with SNAP header (can be used with
TokenTalk)

Networking Concepts – Eric
Vanderburg ©2005
AppleTalk
 AppleTalk

Phase 1 – 32 nodes/network,

254 max
 AppleTalk Phase 2
 EtherTalk

(1024)
 TokenTalk
 LocalTalk

– bus network

Networking Concepts – Eric
Vanderburg ©2005
FDDI










Redundancy
Uses Fiber
500 nodes
100m
Primary and secondary ring
Multiple frames
Concentrator – hub for FDDI
DAS (Dual Attachment Station) – connected to primary
and secondary rings
SAS (Single Attachment Station)


Used when connected to DAS concentrator
Networking Concepts – Eric
Vanderburg ©2005
Broadband
 Cable

DOCSIS (Data Over Cable Service Interface
Specification)
 Longer range
 Faster speed


 DSL


More secure

 ISDN

(Integrated Services Digital Network)

2 B (bearer) channels, 56kbps
 1 D (data) channel 16 kbps


Networking Concepts – Eric
Vanderburg ©2005
ISDN
H

channels provide a way to aggregate
B channels.
 H0=384

kb/s (6 B channels)
 H10=1472 kb/s (23 B channels)
 H11=1536 kb/s (24 B channels)
 H12=1920 kb/s (30 B channels) International (E1) only

Networking Concepts – Eric
Vanderburg ©2005
DSL Types
Type

Description

Data Rate

Distance Limit

Application

IDSL

ISDN Digital Subscriber Line

128 Kbps

18,000 feet on 24 gauge

Similar to the ISDN BRI service but
data only (no voice on the same line)

CDSL

Consumer DSL
from Rockwell

1 Mbps downstream; less
upstream

18,000 feet on 24 gauge

Splitter less home and small business
service

DSL
Lite

"Splitterless" DSL

From 1.544 Mbps to 6 Mbps
downstream

18,000 feet on 24 gauge

The standard ADSL; sacrifices speed
for not having to install a splitter at the
user's home or business

HDSL /
UDSL

High bit-rate Digital Subscriber
Line / Unidirectional DSL

1.544 Mbps duplex on two twistedpair lines;
2.048 Mbps duplex on three
twisted-pair lines

12,000 feet on 24 gauge

T1/E1 service between server and
phone company or within a company;
WAN, LAN, server access

SDSL

Symmetric DSL

1.544 Mbps duplex (U.S. and
Canada); 2.048 Mbps (Europe) on
a single duplex line downstream
and upstream

12,000 feet on 24 gauge

Same as for HDSL but requiring only
one line of twisted-pair

ADSL

Asymmetric Digital Subscriber
Line

1.544 to 6.1 Mbps downstream;
16 to 640 Kbps upstream

1.544 Mbps at 18,000ft
2.048 Mbps at 16,000ft
6.312 Mpbs at 12,000ft
8.448 Mbps at 9,000ft

Used for Internet and Web access,
motion video, video on demand, remote
LAN access

RADSL

Rate-Adaptive DSL from Westell

Adapted to the line, 640 Kbps to
2.2 Mbps downstream; 272 Kbps
to 1.088 Mbps upstream

Not provided

VDSL

Very high Digital Subscriber Line

12.9 to 52.8 Mbps downstream;
1.5 to 2.3 Mbps upstream;
1.6 Mbps to 2.3 Mbps downstream

4,500 feet at 12.96 Mbps;
3,000 feet at 25.82 Mbps;
1,000 feet at 51.84 Mbps

Networking Concepts – Eric
Vanderburg ©2005

Used for Internet and Web access,
motion video, video on demand, remote
LAN access

ATM networks;
Fiber to the Neighborhood
Broadcast
 Satellite
 Modem

for upload
 400kbps download
 DirectPC

Networking Concepts – Eric
Vanderburg ©2005
ATM
 Asynchronous

Transfer Mode
 Dedicated circuit
 Cells used – 53byte (Header:5, Data:48)

Networking Concepts – Eric
Vanderburg ©2005
SONET
 Synchronous

Optical Network
 Easy to add and remove multiplex channels
 Asynchronous technologies require
demiltiplexing and remultiplexing of the entire
switching structure when a change is made.
 Ring
 DWDM (Dense Wavelength Division
Multiplexing) – divides fiber into 32 channels
from 1520-1580nm wavelengths
Networking Concepts – Eric
Vanderburg ©2005
Terms
 Synchronous

- digital transitions in the
signals occur at exactly the same rate.
 Plesiochronous - transitions occur at
“almost” the same rate, with any
variation being constrained within tight
limits.
 Asynchronous - transitions do not
necessarily occur at the same rate
Networking Concepts – Eric
Vanderburg ©2005
Optical Carrier (OC)
 See

page 273

Networking Concepts – Eric
Vanderburg ©2005
HIPPI
 High

Performance Parallel Interface
 Serial HIPPI, 800Mbps
 GSN (Gigabyte System Network)
HIPPI 6400, 6.4Gbps

Networking Concepts – Eric
Vanderburg ©2005

Mais conteúdo relacionado

Mais procurados

Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric VanderburgNetworking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric VanderburgEric Vanderburg
 
Networking Concepts Lesson 04 - Hardware - Eric Vanderburg
Networking Concepts Lesson 04 - Hardware - Eric VanderburgNetworking Concepts Lesson 04 - Hardware - Eric Vanderburg
Networking Concepts Lesson 04 - Hardware - Eric VanderburgEric Vanderburg
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgEric Vanderburg
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wirelessAble George
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehraMohit Mehra
 
Training on basic internet troubleshooting
Training on basic internet troubleshootingTraining on basic internet troubleshooting
Training on basic internet troubleshootingSpandan Pradhan
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Module 4 emerging wireless technologies and standards
Module 4  emerging wireless technologies and standardsModule 4  emerging wireless technologies and standards
Module 4 emerging wireless technologies and standardsnikshaikh786
 
Troubleshooting Industrial Ethernet & TCP/IP Networks
Troubleshooting Industrial Ethernet & TCP/IP NetworksTroubleshooting Industrial Ethernet & TCP/IP Networks
Troubleshooting Industrial Ethernet & TCP/IP NetworksLiving Online
 
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentationGOPAL BASAK
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell youIT Tech
 

Mais procurados (20)

Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric VanderburgNetworking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg
 
Networking Concepts Lesson 04 - Hardware - Eric Vanderburg
Networking Concepts Lesson 04 - Hardware - Eric VanderburgNetworking Concepts Lesson 04 - Hardware - Eric Vanderburg
Networking Concepts Lesson 04 - Hardware - Eric Vanderburg
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
 
Introduction to cisco wireless
Introduction to  cisco wirelessIntroduction to  cisco wireless
Introduction to cisco wireless
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Wireless
WirelessWireless
Wireless
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
 
Training on basic internet troubleshooting
Training on basic internet troubleshootingTraining on basic internet troubleshooting
Training on basic internet troubleshooting
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Module 4 emerging wireless technologies and standards
Module 4  emerging wireless technologies and standardsModule 4  emerging wireless technologies and standards
Module 4 emerging wireless technologies and standards
 
Troubleshooting Industrial Ethernet & TCP/IP Networks
Troubleshooting Industrial Ethernet & TCP/IP NetworksTroubleshooting Industrial Ethernet & TCP/IP Networks
Troubleshooting Industrial Ethernet & TCP/IP Networks
 
Iuwne10 S06 L02
Iuwne10 S06 L02Iuwne10 S06 L02
Iuwne10 S06 L02
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell you
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
Final presentation
Final presentationFinal presentation
Final presentation
 

Destaque

Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgEric Vanderburg
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgEric Vanderburg
 
Basic networking
Basic networkingBasic networking
Basic networkingworr1244
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking conceptsMujeeb Ahmad
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistMiss Cheska
 

Destaque (7)

Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 

Semelhante a Networking Concepts Lesson 07 - Architectures - Eric Vanderburg

Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber LineKashif Akram
 
Fiber optics 1-5
Fiber optics 1-5Fiber optics 1-5
Fiber optics 1-5grantlerc
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational contentOlajide Kuku
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentOlajide Kuku
 
Wired Broadband Communication
Wired Broadband CommunicationWired Broadband Communication
Wired Broadband CommunicationDilum Bandara
 
Broad band
Broad bandBroad band
Broad bandBala V
 
Cable free low cost microwave radio datasheet
Cable free low cost microwave radio datasheetCable free low cost microwave radio datasheet
Cable free low cost microwave radio datasheetAbrar Ahmad
 
Current technology .
Current technology .Current technology .
Current technology .Mo Asyraz
 
Mobile wireless-networks
Mobile wireless-networksMobile wireless-networks
Mobile wireless-networksPeter R. Egli
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networksdaveph
 
65042_chapter9.ppt
65042_chapter9.ppt65042_chapter9.ppt
65042_chapter9.pptssuser1028f8
 

Semelhante a Networking Concepts Lesson 07 - Architectures - Eric Vanderburg (20)

Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber Line
 
2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren2010fall ch8 18ulziisuren
2010fall ch8 18ulziisuren
 
FTTx Basics & Its Network Basics
FTTx Basics & Its Network BasicsFTTx Basics & Its Network Basics
FTTx Basics & Its Network Basics
 
Fiber optics 1-5
Fiber optics 1-5Fiber optics 1-5
Fiber optics 1-5
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational content
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-Content
 
Wired Broadband Communication
Wired Broadband CommunicationWired Broadband Communication
Wired Broadband Communication
 
Broad band
Broad bandBroad band
Broad band
 
Cable free low cost microwave radio datasheet
Cable free low cost microwave radio datasheetCable free low cost microwave radio datasheet
Cable free low cost microwave radio datasheet
 
Wi max overview
Wi max overviewWi max overview
Wi max overview
 
Current technology .
Current technology .Current technology .
Current technology .
 
Mobile wireless-networks
Mobile wireless-networksMobile wireless-networks
Mobile wireless-networks
 
telecom.ppt
telecom.ppttelecom.ppt
telecom.ppt
 
Ethernet and LIFI
Ethernet and LIFIEthernet and LIFI
Ethernet and LIFI
 
Networking hardware (2)
Networking hardware (2)Networking hardware (2)
Networking hardware (2)
 
Networking hardware (2)
Networking hardware (2)Networking hardware (2)
Networking hardware (2)
 
Networking hardware
Networking hardwareNetworking hardware
Networking hardware
 
Community Wireless Networks
Community Wireless NetworksCommunity Wireless Networks
Community Wireless Networks
 
Wi max
Wi maxWi max
Wi max
 
65042_chapter9.ppt
65042_chapter9.ppt65042_chapter9.ppt
65042_chapter9.ppt
 

Mais de Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

Mais de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Networking Concepts Lesson 07 - Architectures - Eric Vanderburg

  • 1. Chapter 7 Network Architectures Networking Concepts – Eric Vanderburg ©2005
  • 2. Network Architectures  The overall structure, topology, physical media, and channel access method. Networking Concepts – Eric Vanderburg ©2005
  • 3. Ethernet  Easy to install  Works with many protocols  Uses a hardware address Networking Concepts – Eric Vanderburg ©2005
  • 4. 10Mbps Standards  10base5  10base2  10baseT  UTP or STP  5-4-3 rule – 5 segments, 4 repeaters, 3 segments with nodes  100m  1024 nodes, 1024 segments  10baseF Networking Concepts – Eric Vanderburg ©2005
  • 5. 10baseF  10baseFL – fiber to desktop  10baseFP – connecting passive hubs, 500m  10baseFB – fiber backbone  1024 nodes, 1024 segments Networking Concepts – Eric Vanderburg ©2005
  • 6. 100baseT  100baseT4 – 4pair Cat3  100baseTX – 2 pair Cat5  100baseFX – 2 strand fiber  Hub Types  Class I – 1 hub between devices  Class 2 – 2 hubs between devices  Switches are immune Networking Concepts – Eric Vanderburg ©2005
  • 7. Gigabit Ethernet  802.3z  1000baseLX – long wavelength (12701355nm), multimode fiber  1000baseLH – long haul, 10,000m, single-mode  1000baseZX – 100,000m, single-mode  1000baseSX – short wavelength (770860nm), multimode Networking Concepts – Eric Vanderburg ©2005
  • 8. Gigabit Ethernet  1000baseCX – twin copper cables, short range 25m, for connecting equipment  1000baseT  802.3ab  Full duplex all wires Networking Concepts – Eric Vanderburg ©2005
  • 9. 10 Gigabit Ethernet    802.3ae All fiber LAN versions    MAN versions   10GbaseSR – 26-82m, multimode, high speed server, switches, & SANs 10GbaseLR, 10km, single mode, campus backbone 10GbaseER – 40km, single-mode WAN versions    10GbaseSW – 300m, multimode 10GbaseLW – 10km, single mode 10GbaseEW – 40km, single mode Networking Concepts – Eric Vanderburg ©2005
  • 10. Ethernet Frame Types  Must use same frame type to communicate  802.3 – Netware 2x, 3x  802.2 - IEEE 802.3  Ethernet SNAP (SubNetwork Access Protocol) – AppleTalk, protocol type field  Ethernet II – TCP/IP, has protocol type field in the preamble, can be up to 1518 bytes long Networking Concepts – Eric Vanderburg ©2005
  • 11. Max Segments  Switches reduce the collision domain  Routers reduce the broadcast domain  Add switches or routers to the network Networking Concepts – Eric Vanderburg ©2005
  • 12. Wireless  Hidden node problem – all can hear AP but not each other  Demand priority used to correct  RTS (Ready to Send)  CTS (Clear to Send) Networking Concepts – Eric Vanderburg ©2005
  • 13. Token Ring  NAUN (Nearest Active Upstream Neighbor)  NADN (Nearest Active Downstream Neighbor)  Beaconing – find error in ring, beacon sent every 7 seconds  MAU (Multistation Access Unit) / SMAU (Smart Multistation Access Unit)  Has 10 or 16 ports, 2 ports used for RI (Ring In) & RO (Ring Out) Networking Concepts – Eric Vanderburg ©2005
  • 14. Token Ring Frame Types  802.5 frame type (the native format for Token Ring networks), up to 18,000 bytes long  Token Ring SNAP - 802.5 frame type with SNAP header (can be used with TokenTalk) Networking Concepts – Eric Vanderburg ©2005
  • 15. AppleTalk  AppleTalk Phase 1 – 32 nodes/network, 254 max  AppleTalk Phase 2  EtherTalk (1024)  TokenTalk  LocalTalk – bus network Networking Concepts – Eric Vanderburg ©2005
  • 16. FDDI          Redundancy Uses Fiber 500 nodes 100m Primary and secondary ring Multiple frames Concentrator – hub for FDDI DAS (Dual Attachment Station) – connected to primary and secondary rings SAS (Single Attachment Station)  Used when connected to DAS concentrator Networking Concepts – Eric Vanderburg ©2005
  • 17. Broadband  Cable DOCSIS (Data Over Cable Service Interface Specification)  Longer range  Faster speed   DSL  More secure  ISDN (Integrated Services Digital Network) 2 B (bearer) channels, 56kbps  1 D (data) channel 16 kbps  Networking Concepts – Eric Vanderburg ©2005
  • 18. ISDN H channels provide a way to aggregate B channels.  H0=384 kb/s (6 B channels)  H10=1472 kb/s (23 B channels)  H11=1536 kb/s (24 B channels)  H12=1920 kb/s (30 B channels) International (E1) only Networking Concepts – Eric Vanderburg ©2005
  • 19. DSL Types Type Description Data Rate Distance Limit Application IDSL ISDN Digital Subscriber Line 128 Kbps 18,000 feet on 24 gauge Similar to the ISDN BRI service but data only (no voice on the same line) CDSL Consumer DSL from Rockwell 1 Mbps downstream; less upstream 18,000 feet on 24 gauge Splitter less home and small business service DSL Lite "Splitterless" DSL From 1.544 Mbps to 6 Mbps downstream 18,000 feet on 24 gauge The standard ADSL; sacrifices speed for not having to install a splitter at the user's home or business HDSL / UDSL High bit-rate Digital Subscriber Line / Unidirectional DSL 1.544 Mbps duplex on two twistedpair lines; 2.048 Mbps duplex on three twisted-pair lines 12,000 feet on 24 gauge T1/E1 service between server and phone company or within a company; WAN, LAN, server access SDSL Symmetric DSL 1.544 Mbps duplex (U.S. and Canada); 2.048 Mbps (Europe) on a single duplex line downstream and upstream 12,000 feet on 24 gauge Same as for HDSL but requiring only one line of twisted-pair ADSL Asymmetric Digital Subscriber Line 1.544 to 6.1 Mbps downstream; 16 to 640 Kbps upstream 1.544 Mbps at 18,000ft 2.048 Mbps at 16,000ft 6.312 Mpbs at 12,000ft 8.448 Mbps at 9,000ft Used for Internet and Web access, motion video, video on demand, remote LAN access RADSL Rate-Adaptive DSL from Westell Adapted to the line, 640 Kbps to 2.2 Mbps downstream; 272 Kbps to 1.088 Mbps upstream Not provided VDSL Very high Digital Subscriber Line 12.9 to 52.8 Mbps downstream; 1.5 to 2.3 Mbps upstream; 1.6 Mbps to 2.3 Mbps downstream 4,500 feet at 12.96 Mbps; 3,000 feet at 25.82 Mbps; 1,000 feet at 51.84 Mbps Networking Concepts – Eric Vanderburg ©2005 Used for Internet and Web access, motion video, video on demand, remote LAN access ATM networks; Fiber to the Neighborhood
  • 20. Broadcast  Satellite  Modem for upload  400kbps download  DirectPC Networking Concepts – Eric Vanderburg ©2005
  • 21. ATM  Asynchronous Transfer Mode  Dedicated circuit  Cells used – 53byte (Header:5, Data:48) Networking Concepts – Eric Vanderburg ©2005
  • 22. SONET  Synchronous Optical Network  Easy to add and remove multiplex channels  Asynchronous technologies require demiltiplexing and remultiplexing of the entire switching structure when a change is made.  Ring  DWDM (Dense Wavelength Division Multiplexing) – divides fiber into 32 channels from 1520-1580nm wavelengths Networking Concepts – Eric Vanderburg ©2005
  • 23. Terms  Synchronous - digital transitions in the signals occur at exactly the same rate.  Plesiochronous - transitions occur at “almost” the same rate, with any variation being constrained within tight limits.  Asynchronous - transitions do not necessarily occur at the same rate Networking Concepts – Eric Vanderburg ©2005
  • 24. Optical Carrier (OC)  See page 273 Networking Concepts – Eric Vanderburg ©2005
  • 25. HIPPI  High Performance Parallel Interface  Serial HIPPI, 800Mbps  GSN (Gigabyte System Network) HIPPI 6400, 6.4Gbps Networking Concepts – Eric Vanderburg ©2005