Presentation is loading. Please wait.

Presentation is loading. Please wait.

CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.

Similar presentations


Presentation on theme: "CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler."— Presentation transcript:

1 CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler

2 Syllabus ● Get it at: http://ctc228.weebly.com/

3 OSI Model Picture Credit: blog.butchevans.com

4 Picture Credit: ieee.org

5 Chapter 1: The Fundamentals ● Network components – Computer with Network Interface Card (NIC) – Network Medium – Interconnecting Device (maybe)

6 Chapter 1: IP and MAC address ● IP address is a logical address ● MAC address is a physical address ● Commonly used tools: – ipconfig – ping – arp -a

7 Chap 1: LAN, WAN, PAN... ● Local Area Network ● Wide Area Network ● Personal Area Network ● Internetwork ● Metropolitan Area Network ● Wireless Local Area Network

8 Chap 1: Encapsulation

9 Chap 1: Clients and Servers ● Client is accessing resources ● Server is providing resources ● This is not always a clear distinction

10 Group Work Case Project 1-2 ● Page 59 ● Bonus questions: – 1. Why would you use the 'ping' command? – 2.Why would you use the 'ipconfig' command? – 3. Is it possible that your network settings could be correct but the ping command could report an error? If yes, how? If no, why not?

11 Chapter 2 ● Repeaters ● Hubs ● Switches ● Wireless Access Point ● Routers (will be discussed later)

12 Chap 2: Connecting to the LAN ● Need a NIC if you're plugging in ● Need a Wireless NIC if you're going to WiFi in ● These are frequently built-in.

13 Chap 2: Routers ● Used to interconnect LANs to each other ● May directly connect or connect through intermediate routers

14 Chap 2: A Hub

15 Chap 2: A Switch

16 Chap 2: Old Wireless Access Point

17 Chap 2: So what is this thing?

18 Chap 2: But what about the back?

19 Chap 2: Tables and Gateways ● Hosts use a Default Gateway to get out ● Switches do their magic with MAC tables ● Routers do their magic with Routing tables ● These entries can be STATIC or DYNAMIC – Special route: Default Route

20 Chap 2 Group Project ● Project 2-8 ● Page 99 ● Bonus Questions: A computer has a standard NIC and a USB wireless adapter that are both connected to the same network. – 1. How many MAC addresses will it have? Why? – 2. How many IP address will it have? Why? ● Turn in before you leave.

21 Chapter 3 Topologies and Cables Ethernet Wifi Internet Access

22 Chapter 3 ● Topologies – Bus, Physical Star, Ring, Point-to-Point, Mesh ● Cables – UTP, Fiber Optic, Coaxial

23 Chap 3: Unshielded Twisted Pair

24 Chap 3: Coax

25 Chap 3: Fiber Optic Multimode vs Single-Mode

26 Chapter 3 Topologies and Cables Ethernet Wifi Internet Access

27 Chap 3: Ethernet ● Invented in the 1970s but has been updated ● Uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) ● Uses Media Access Control (MAC) addresses – 12 Hexadecimal digits ● One Ethernet protocol data unit is called a frame – Contains source and destination MAC addresses

28 Chap 3: Ethernet Frame

29 Chap 3: About Collisions and Errors ● If two devices in the same collision domain send frames at the same time, a collision might occur. – Unlikely with switches but common with hubs. ● Frames could get mangled on the wire, but since Ethernet is best effort, there is no acknowledgment or verification from receiver. – Errors are detected with a Cyclic Redundancy Check (CRC) added to the end of a frame.

30 Chapter 3 Topologies and Cables Ethernet Wifi Internet Access

31 Chap 3: WiFi ● Two modes: infrastructure and ad-hoc ● Uses Carrier Sense Multiple Access Collision with Avoidance (CSMA/CA) ● Different standards and speeds: – 802.11a 54Mbps but poor reception – 802.11b/g/n 11/54/600Mbps and better reception – 802.11ac up to 6.7 Gbps

32 Chap 3: Wifi Standards

33 Chap 3: Wifi Channels

34 Chap 3: WiFi Security ● Traffic can be intercepted relatively easily ● Encryption protocols – Wired Equivalent Privacy (WEP) – Wi-Fi Protected Access (WPA) – WPA2

35 Chapter 3 Topologies and Cables Ethernet Wifi Internet Access

36 Chap 3: Internet Access Technology ● Cable Modem ● Dial-up ● DSL ● Satellite ● Ethernet

37 Chap 3 Group Project ● EMAIL TO RSPENGLER@CSUDH.EDU ● Case Project 3-1 ● Page 159 ● Bonus Question: If five users are simultaneously participating in a Wi-Fi network operating in ad-hoc mode, what is the network topology? Why?

38 Chapter 4 ● PVC is used as the jacket of UTP cables and is toxic when it burns ● UTP Cable types – CM, CMR (Riser), CMP (Plenum) – Also called Cat-5, Cat-5e, Cat-6

39 Chap 4: RJ45

40 Chap 4: Terms ● Crossover vs Straight-Through (patch) ● Horizontal wiring vs Vertical wiring ● Entrance facility and “point of demarcation”

41 Chap 4: Fiber Optic ● Tons of connector types ● Termination is a little difficult ● Can go great distances with great speed ● Multi mode and Single Mode

42 Chap 5: Protocol Stacks ● TCP/IP Stack actually has a lot more stuff than just TCP and IP.

43 Chap 5: In depth with the layers

44 Chap 5: IP address Two forms: IPv4 and IPv6 Going into detail on IPv4 Subnet Masks Classful and Classless

45 Chap 5: IPv4 Packet

46 Chap 5: Transport Layer Transmission Control Protocol Reliable and connection-oriented User Datagram Protocol Unreliable and connectionless Both work with segments, use source and destination ports, and use checksums

47 Chap 5: TCP and UDP


Download ppt "CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler."

Similar presentations


Ads by Google