CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
-
Upload
merryl-stevenson -
Category
Documents
-
view
225 -
download
0
Transcript of CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
![Page 1: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/1.jpg)
CTC 228 – Computer Networks
Fall 2015Instructor: Robert Spengler
![Page 3: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/3.jpg)
OSI Model
Picture Credit: blog.butchevans.com
![Page 4: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/4.jpg)
Picture Credit: ieee.org
![Page 5: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/5.jpg)
Chapter 1: The Fundamentals
● Network components– Computer with Network Interface Card (NIC)– Network Medium– Interconnecting Device (maybe)
![Page 6: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/6.jpg)
Chapter 1: IP and MAC address
● IP address is a logical address● MAC address is a physical address● Commonly used tools:
– ipconfig– ping– arp -a
![Page 7: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/7.jpg)
Chap 1: LAN, WAN, PAN...
● Local Area Network● Wide Area Network● Personal Area Network● Internetwork● Metropolitan Area Network● Wireless Local Area Network
![Page 8: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/8.jpg)
Chap 1: Encapsulation
![Page 9: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/9.jpg)
Chap 1: Clients and Servers
● Client is accessing resources● Server is providing resources● This is not always a clear distinction
![Page 10: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/10.jpg)
Group Work
Case Project 1-2● Page 59● Bonus questions:
– 1. Why would you use the 'ping' command? – 2.Why would you use the 'ipconfig' command?– 3. Is it possible that your network settings could be
correct but the ping command could report an error? If yes, how? If no, why not?
![Page 11: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/11.jpg)
Chapter 2
● Repeaters● Hubs● Switches● Wireless Access Point ● Routers (will be discussed later)
![Page 12: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/12.jpg)
Chap 2: Connecting to the LAN
● Need a NIC if you're plugging in● Need a Wireless NIC if you're going to WiFi in● These are frequently built-in.
![Page 13: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/13.jpg)
Chap 2: Routers● Used to interconnect LANs to each other● May directly connect or connect through
intermediate routers
![Page 14: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/14.jpg)
Chap 2: A Hub
![Page 15: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/15.jpg)
Chap 2: A Switch
![Page 16: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/16.jpg)
Chap 2: Old Wireless Access Point
![Page 17: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/17.jpg)
Chap 2: So what is this thing?
![Page 18: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/18.jpg)
Chap 2: But what about the back?
![Page 19: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/19.jpg)
Chap 2: Tables and Gateways
● Hosts use a Default Gateway to get out ● Switches do their magic with MAC tables● Routers do their magic with Routing tables
● These entries can be STATIC or DYNAMIC– Special route: Default Route
![Page 20: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/20.jpg)
Chap 2 Group Project
● Project 2-8 ● Page 99● Bonus Questions: A computer has a standard
NIC and a USB wireless adapter that are both connected to the same network.– 1. How many MAC addresses will it have? Why?– 2. How many IP address will it have? Why?
● Turn in before you leave.
![Page 21: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/21.jpg)
Chapter 3
Topologies and CablesEthernetWifiInternet Access
![Page 22: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/22.jpg)
Chapter 3
● Topologies– Bus, Physical Star, Ring, Point-to-Point, Mesh
● Cables– UTP, Fiber Optic, Coaxial
![Page 23: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/23.jpg)
Chap 3: Unshielded Twisted Pair
![Page 24: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/24.jpg)
Chap 3: Coax
![Page 25: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/25.jpg)
Chap 3: Fiber Optic
Multimode vs Single-Mode
![Page 26: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/26.jpg)
Chapter 3
Topologies and CablesEthernetWifiInternet Access
![Page 27: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/27.jpg)
Chap 3: Ethernet
● Invented in the 1970s but has been updated● Uses Carrier Sense Multiple Access with
Collision Detection (CSMA/CD)● Uses Media Access Control (MAC) addresses
– 12 Hexadecimal digits● One Ethernet protocol data unit is called a
frame– Contains source and destination MAC addresses
![Page 28: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/28.jpg)
Chap 3: Ethernet Frame
![Page 29: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/29.jpg)
Chap 3: About Collisions and Errors
● If two devices in the same collision domain send frames at the same time, a collision might occur.– Unlikely with switches but common with hubs.
● Frames could get mangled on the wire, but since Ethernet is best effort, there is no acknowledgment or verification from receiver.– Errors are detected with a Cyclic Redundancy
Check (CRC) added to the end of a frame.
![Page 30: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/30.jpg)
Chapter 3
Topologies and CablesEthernetWifiInternet Access
![Page 31: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/31.jpg)
Chap 3: WiFi
● Two modes: infrastructure and ad-hoc● Uses Carrier Sense Multiple Access Collision
with Avoidance (CSMA/CA)● Different standards and speeds:
– 802.11a 54Mbps but poor reception– 802.11b/g/n 11/54/600Mbps and better reception – 802.11ac up to 6.7 Gbps
![Page 32: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/32.jpg)
Chap 3: Wifi Standards
![Page 33: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/33.jpg)
Chap 3: Wifi Channels
![Page 34: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/34.jpg)
Chap 3: WiFi Security
● Traffic can be intercepted relatively easily● Encryption protocols
– Wired Equivalent Privacy (WEP)– Wi-Fi Protected Access (WPA)– WPA2
![Page 35: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/35.jpg)
Chapter 3
Topologies and CablesEthernetWifiInternet Access
![Page 36: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/36.jpg)
Chap 3: Internet Access Technology
● Cable Modem● Dial-up● DSL● Satellite ● Ethernet
![Page 37: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/37.jpg)
Chap 3 Group Project
● EMAIL TO [email protected]● Case Project 3-1● Page 159● Bonus Question: If five users are
simultaneously participating in a Wi-Fi network operating in ad-hoc mode, what is the network topology? Why?
![Page 38: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/38.jpg)
Chapter 4
● PVC is used as the jacket of UTP cables and is toxic when it burns
● UTP Cable types– CM, CMR (Riser), CMP (Plenum)– Also called Cat-5, Cat-5e, Cat-6
![Page 39: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/39.jpg)
Chap 4: RJ45
![Page 40: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/40.jpg)
Chap 4: Terms
● Crossover vs Straight-Through (patch)● Horizontal wiring vs Vertical wiring● Entrance facility and “point of demarcation”
![Page 41: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/41.jpg)
Chap 4: Fiber Optic
● Tons of connector types● Termination is a little difficult● Can go great distances with great speed● Multi mode and Single Mode
![Page 42: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/42.jpg)
Chap 5: Protocol Stacks
● TCP/IP Stack actually has a lot more stuff than just TCP and IP.
![Page 43: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/43.jpg)
Chap 5: In depth with the layers
![Page 44: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/44.jpg)
Chap 5: IP address
Two forms: IPv4 and IPv6
Going into detail on IPv4
Subnet Masks
Classful and Classless
![Page 45: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/45.jpg)
Chap 5: IPv4 Packet
![Page 46: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/46.jpg)
Chap 5: Transport Layer
Transmission Control Protocol
Reliable and connection-oriented
User Datagram Protocol
Unreliable and connectionless
Both work with segments, use source and destination ports, and use checksums
![Page 47: CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.](https://reader031.fdocuments.in/reader031/viewer/2022012919/56649ef15503460f94c02446/html5/thumbnails/47.jpg)
Chap 5: TCP and UDP