Midterm Examination Written Responses
Presented in
NET-102 Networking Essentials II
by
Ryan C Dobbs
Baker College of Auburn Hills, Michigan
5/12/14
Dr. Terrance Dillard
Professor
QUESTION 1
In a computer network, switches are devices that are used to connect devices together. Multiple cables can be connected to a switch to enable networked devices to communicate with each other. The role of a switch is to manage the flow of data throughout a network and this process is effective in its role due to the fact that the messages are sent only to the intended target. The media access control (MAC) is the identification that each device connected to the switch carries. By each device having individual IDs this increases the overall effectiveness and security of a network.
Switches operate within the OSI’s layer 2. This is known as the data link layer. The data link layer is responsible for the transfer of data frames from node to node across OSI’s layer one, the physical layer. This allows layers in the upper levels to have transmissions with error checking processes. The data link layer has several responsibilities of its function in the OSI model. The first is link establishment and termination which is where, between two separate nodes, it establishes and terminates the links that connect the two. Layer two also provides traffic control for the frames in transmission.
Network cables are another component that is used in communication between network devices. Cables are used to connect one network device to other via several different connections. The most reliable type of connection between two or more devices is to use a wired connection. These connections can be used to share data and access between servers, PCs, printer...
... middle of paper ...
...plying with this communication, the path of the connection is now going back towards the user, opposite of the original intent.
A ping of death is also another type of dos attack. This type of attack is based on the use of networking devices to send packets of data to many devices instead of one. The amplifier of this attack is the network of system under attack. The ones who send large numbers of IP packets are sending these units with fake address the victim and with the hopes that the system will become bogged down in attempts of communication with the bad address. They also use Ping floods so that by sending the victim too large of an amount of ping packets and the system cannot handle the load. It is very simple to launch and the only goal is to overload the amount that band width can support.
References
Meyers 2012, Managing and troubleshooting Networks
A Hub is a networking device that allows one to connect multiple PCs to a single network. Hubs may be based on Ethernet, Firewire, or USB connections. “A switch is a control unit that turns the flow of electricity on or off in a circuit. It may also be used to route information patterns in streaming electronic data sent over networks. “
...a flood of packets. Therefore, the victim node or sometimes the whole network can get easily paralyzed [24].
Compare and contrast between Information and network: Networking is often a combination of various services. Therefore, in order for various services to be effective, mutual services need to be organically associated. Network have bunch of information. People receive information through using network. It also spread out the data. Applications, which access databases, could save the data and also could manipulated it. Information is data, which comes from the network. So, information and network can never be separated. They are always together.
Devices are needed to create a network and to run it affectively. For example, some common devices:
Generally speaking, typical scenario of communications networks interaction consists in a bunch of devices trying to communicate with each other by using the same medium. Home wireless networks, cellular networks, Ethernet environments are only a few examples of this setting.
SLIP is a TCP/IP protocol used for communication between two machines that are previously configured for communication with each other. For example, your Internet server provider may provide you with a SLIP connection so that the provider's server can respond to your requests, pass them on to the Internet, and forward your requested Internet responses back to you. A better service is provided by the Point-to-Point Protocol (PPP). Point-to-Point Protocol is a protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. For example, your Internet server provider may provide you with a PPP connection so that the provider's server can respond to your requests, pass them on to the Internet, and forward your requested Internet responses back to you. PPP uses the Internet protocol and is designed to handle others. It is sometimes considered a member of the TCP/IP suite of protocols. Relative to the OSI reference model, PPP provides layer 2 (data-link layer) service. Essentially, it packages your computer's TCP/IP packets and forwards them to the server where they can actually be put on the Internet. PPP is a full-duplex protocol that can be used on various physical media, including twisted pair or fiber optic lines or satellite transmission. PPP is usually preferred over the earlier standard SLIP because it can handle synchronous as well as asynchronous communication. PPP can share a line with other users and it has error detection that SLIP lacks. Where a choice is possible, PPP is preferred.
The Open Systems Interconnection (OSI) reference model is essential to the world of computer networking. The model was created in 1977 by the International Standards Committee, in response to a difficulty that was facing computer networkers at the time (Shelly, Cashman, and Serwatka 142). In order to understand the difficulty, one must first realize that computer networks consist of computer hardware, the software that is to be used in conjunction with this hardware, and the medium (such as wiring or cabling) that will interconnect the computing devices that are in the network. The computer networker’s job is to determine which hardware, software, and medium types will create the network that will best suit his client’s needs. Then, the networker must combine these elements into a functional system of interconnected computers (Fortino and Villeneuve 112). It was in attempting this latter task that the computer networker of the late 1970s often found himself in a pickle. The problem was that each vendor of computing equipment had developed his own unique set of products; products that were incompatible with the products of other vendors. This incompatibility made it very difficult for a computer networker to combine the various network components into an operational computer network (Stamper 27).
1. Both Bridges and Switches work on the data link layer of the OSI Model. However, switches are more advanced. Discuss how a switch has an advantage over a bridge in a network then elaborate more on the technology implemented in switches to control broadcast domains (500 words). [25 marks]
There can be collisions when two nodes want to communicate at the same time on the same bus.
It just doesn't get much simpler than the physical bus topology when it comes to connecting nodes on a Local Area Network (LAN). The most common implementation of a linear bus topology is IEEE 802.3 Ethernet. All devices in a bus topology are connected to a single cable called the bus, backbone, or ether. The transmission medium has a physical beginning and an end. All connections must be terminated with a resistor to keep data transmissions from being mistaken as network traffic. The terminating resistor must match the impedance of the cable.
A network switch is a networking device that connects devices together on a network enacting a form of packet switching. It operates in the Data Link layer of the OSI model. It essentially acts like a multi-port network bridge that processes and forwards data. Other types of switches have additional features such as the ability to route packets. Those switches are commonly known as layer-3 or multilayer switches.
Explain how the two important transport protocols deliver messages on behalf of the application and discuss the differences between them
There are basically four types of media used for Local Area Networks. The most commonly used are twisted copper pairs, Coaxial cables, Fiber Optic, and the Wireless technology.
During the silent period of the communication when the users are not utilizing the bandwidth than this idle bandwidth cannot be used by the other parties as a result this bandwidth gets wastes.