Free Essay

Internetworking

In:

Submitted By cmwhite05
Words 1649
Pages 7
| Internetworking |

Submitted By: Courtney White
Submission Date: 11/20/2012
Submitted To: Professor Conn
Assignment 4

An internetwork is an assortment of distinct networks that functions as a single large network. Internetworking denotes to the industry, products, and procedures that meet the challenge of crafting and governing internetworks. (Corner & Stevens, 1952) The first networks were time-sharing networks that used mainframes and attached terminals. Local-area networks progressed around the PC insurrection. (Davidson & Muller, 1992) LANs allowed numerous operators in a somewhat trifling area to interchange files and messages, as well as access shared resources. Wide-area networks interconnect LANs with geographically disseminated users to create connectivity. (Davidson & Muller, 1992)
Though it is quite simple to visualize internetwork, implementing a practical internetwork is no unpretentious job. Many encounters must be tackled, especially in the areas of connectivity, reliability, network management, and flexibility. Each area is plays a key role in inaugurating a proficient and operative internetwork. The test when connecting various systems is to support communication among disparate technologies. Different sites, for example, may use different types of media operating at varying speeds, or may even include different types of systems that need to communicate. Because establishments depend comprehensively on data communication, internetworks must deliver a certain level of steadfastness. This is a volatile world; so many large internetworks include redundancy to allow for communication even when problems occur.
The Open Systems Interconnection reference model defines in what way information from a software application in one computer travels through a network medium to a software application in another computer. (Eady, 2004)The OSI reference model is a conceptual model composed of seven layers, each postulating specific network tasks. The OSI model divides the tasks involved with moving material between networked computers into seven reduced, more manageable task groups. (Corner & Stevens, 1952)A task is then apportioned to each of the seven OSI layers. Each layer is reasonably self-contained so that the tasks assigned to each layer can be implemented freely. This allows the resolutions presented by one layer to be updated without adversely affecting the other layers. The seven layers of the Open Systems Interconnection (OSI) reference model are: * Layer 7-Application * Layer 6-Presentation * Layer 5-Session * Layer 4-Transport * Layer 3-Network * Layer 2-Data link * Layer 1-Physical (Eady, 2004)
The physical layer describes the electrical, mechanical, procedural, and functional specifications for initiating and deactivating the physical link between communicating network systems. (Eady, 2004)Physical layer specifications define physiognomies such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, and physical connectors. Physical layer implementations can be categorized as either LAN or WAN specifications.
The data link layer provides dependable transit of data across a physical network link. Dissimilar data link layer specifications describe altered network and protocol characteristics. Physical addressing outlines how devices are addressed at the data link layer. (Eady, 2004)Network topology contains the data link layer specifications that often describe how devices are to be physically connected. (Corner & Stevens, 1952)Finally, flow control moderates the transmission of data so that the receiving device is not overwhelmed with more traffic than it can handle at one time.
The Logical Link Control sub layer of the data link layer manages communications between devices over a single link of a network. (Corner & Stevens, 1952)LLC is defined in the IEEE 802.2 specification and supports both connectionless and connection-oriented services used by higher-layer protocols. (Eady, 2004)IEEE 802.2 defines a number of fields in data link layer frames that enable multiple higher-layer protocols to share a single physical data link. (Eady, 2004)The Media Access Control (MAC) sub layer of the data link layer manages protocol access to the physical network medium. The IEEE MAC specification defines MAC addresses, which enable multiple devices to uniquely identify one another at the data link layer.
The network layer describes the network address, which varies from the MAC address. (Eady, 2004)Some network layer implementations describe network addresses in a way that route selection can be determined systematically by associating the source network address with the destination network address and applying the subnet mask. (Corner & Stevens, 1952)Because this layer defines the logical network layout, routers can use this layer to determine how to forward packets. Much of the design and configuration work for internetworks happens at Layer 3, the network layer.
The transport layer admits data from the session layer and sections the data for conveyance across the network. (Eady, 2004)The transport layer is accountable for making sure that the data is distributed error-free. Flow control generally occurs at the transport layer. Flow control oversees the data transmission between devices so that the communicating device does not send more data than the receiving device can process. Multiplexing enables data from several applications to be conveyed onto a single physical link. (Corner & Stevens, 1952) Virtual circuits are recognized, upheld, and terminated by the transport layer. Error checking encompasses creating various instruments for detecting transmission errors, while error recovery involves acting, such as requesting that data be retransmitted, to resolve any errors that occur. (Davidson & Muller, 1992)The transport protocols used on the Internet are TCP and UDP.
The session layer creates, oversees, and dismisses communication sessions. Communication sessions consist of service requests and service replies that occur between applications located in different network devices. (Eady, 2004) These requests and responses are coordinated by protocols implemented at the session layer. An example of session-layer implementations includes Zone Information Protocol (ZIP) which is the AppleTalk protocol that coordinates the name binding process. (Eady, 2004)
The presentation layer provides a diversity of coding and conversion functions that are applied to application layer data. (Eady, 2004) These functions safeguard the information sent from the application layer of one system, and ensure that it would be readable by the application layer of another system. Some examples of presentation layer coding and conversion schemes are: common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes. (Eady, 2004)
The use of normal image, sound, and video formats allow the swapping of application data between different types of computer systems. Conversion schemes are used to interchange information with systems by using different text and data representations. Standard data compression schemes enable data that is compressed at the source device to be properly decompressed at the destination. Standard data encryption schemes enable data encrypted at the source device to be properly deciphered at the destination. Presentation layer implementations are not connected with a specific protocol stack. Some well-known standards for video include QuickTime and Motion Picture Experts Group. QuickTime is an Apple Computer specification for video and audio, and MPEG is a typical for video compression and coding.
The application layer is the OSI layer adjoining the end user, which means that both the OSI application layer and the user interrelate directly with the software application. (Eady, 2004)This layer intermingles with software applications that implement a communicating component. Application layer functions include classifying communication partners and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network resources for the requested communication exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer.
The OSI model provides a theoretical structure for communication between computers, but the model itself is not a method of communication. (Eady, 2004)Actual communication is made probable by using communication protocols. In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange material over a network medium. A protocol implements the functions of one or more of the OSI layers.

A wide variety of communication protocols exist. Some of these protocols include LAN protocols, WAN protocols, network protocols, and routing protocols. LAN protocols function at the physical and data link layers of the OSI model. (Davidson & Muller, 1992)WAN protocols operate at the lowest three layers of the OSI model. Routing protocols are network layer protocols that are accountable for switching information between routers so that the routers can select the proper path for network traffic. Network protocols are the various upper-layer protocols that exist in a given protocol suite. Many protocols rely on others for operation. (Davidson & Muller, 1992)
The seven OSI layers use numerous forms of control information to communicate with their peer layers in other computer systems. (Eady, 2004)This control information comprises of detailed demands and directions that are switched between peer OSI layers. Control information typically takes one of the two forms: headers and trailers. Headers are prepended to data that has been passed down from upper layers. Trailers are attached to data that has been passed down from upper layers. An OSI layer is not obligatory to attach a header or a trailer to data from upper layers. (Eady, 2004)
Headers, trailers, and data are comparative concepts, contingent on the layer that analyzes the information unit. (Eady, 2004) At the network layer, an information unit comprises of a Layer 3 header and data. At the data link layer, however, all the information passed down by the network layer is treated as data. (Corner & Stevens, 1952)The data portion of an information unit at a given OSI layer potentially can contain headers, trailers, and data from all the higher layers. This is known as encapsulation. (Corner & Stevens, 1952)

Bibliography

Corner, D., & Stevens, D. L. (1952). Internetworking with TCP/IP: Design, implementation, and internals. indianapolis: Prentice Hall.
Davidson, R. P., & Muller, N. J. (1992). Internetworking LANs: . Artech House.
Eady, F. (2004). Networking and Internetworking with Microcontrollers. Elsevier Inc.

Similar Documents

Premium Essay

Internetworking

...INTERNETWORKING INTERNETWORKING Abstract A local area network (LAN) is a communication network that interconnects a variety of data communicating devices within a small geographic area and broadcasts data at high data transfer rates with very low error rates. Since the local area network first appeared in the 1970s, its use has become widespread in commercial and academic environments. It would be very difficult to imagine a collection of personal computers within a computing environment that does not employ some form of local area network. This chapter begins by discussing the basic layouts or topologies of the most commonly found local area networks, followed by the medium access control protocols that allow a workstation to transmit data on the network. We will then examine most of the common local area network products such as Ethernet and token ring. Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a...

Words: 1743 - Pages: 7

Free Essay

Multicast

...C H A P T E R 43 Chapter Goals • • • • • • • • • Explain IP multicast addressing. Learn the basics of Internet Group Management Protocol (IGMP). Explain how multicast in Layer 2 switching works. Define multicast distribution trees. Learn how multicast forwarding works. Explain the basics of protocol-independent multicast (PIM). Define multiprotocol BGP. Learn how Multicast Source Discovery Protocol (MSDP) works. Explain reliable multicast: PGM. Internet Protocol Multicast Background Internet Protocol (IP) multicast is a bandwidth-conserving technology that reduces traffic by simultaneously delivering a single stream of information to thousands of corporate recipients and homes. Applications that take advantage of multicast include videoconferencing, corporate communications, distance learning, and distribution of software, stock quotes, and news. IP Multicast delivers source traffic to multiple receivers without adding any additional burden on the source or the receivers while using the least network bandwidth of any competing technology. Multicast packets are replicated in the network by Cisco routers enabled with Protocol Independent Multicast (PIM) and other supporting multicast protocols resulting in the most efficient delivery of data to multiple receivers possible. All alternatives require the source to send more than one copy of the data. Some even require the source to send an individual copy to each receiver. If there are thousands of receivers, even low-bandwidth...

Words: 6080 - Pages: 25

Premium Essay

Commcates a Risk

...Review and describe the most important criteria for selecting internetworking devices at the core, access, and distribution layer in a computer network When designing a network there are many different important criteria for selecting internetworking devices for router the number ports need for your business. The processing speed and amount of memory do you need for your business. If you need LAN or WAN support availability and quality of technical support and documentation of training and vendor. For switch and bridges you have to look at number of MAC address can learn, support of port security, support for cut through switching and support for adaptive cut through switching. Don’t forget amount of memory. The router network layer protocols supported, routing protocols support, support for multicast, support for advanced queuing switching and other optimization. These are all important of selecting internetworking. You have to look at the business and customers that you are support then you use these internetwork criteria to make your decisions. Priscilla Oppenheimer (2012). Top-Down Networking Design. (Special Edition for Strayer University) Boston, MA, Pearson Learning Solutions Describe the key criteria involved in selecting WAN technologies and WAN providers. Discuss which criteria is the most important from your perspective and state why. When selecting WAN technologies and WAN provider this will vary from company to company one of the most important factors...

Words: 514 - Pages: 3

Premium Essay

Commcates a Risk

...Review and describe the most important criteria for selecting internetworking devices at the core, access, and distribution layer in a computer network When designing a network there are many different important criteria for selecting internetworking devices for router the number ports need for your business. The processing speed and amount of memory do you need for your business. If you need LAN or WAN support availability and quality of technical support and documentation of training and vendor. For switch and bridges you have to look at number of MAC address can learn, support of port security, support for cut through switching and support for adaptive cut through switching. Don’t forget amount of memory. The router network layer protocols supported, routing protocols support, support for multicast, support for advanced queuing switching and other optimization. These are all important of selecting internetworking. You have to look at the business and customers that you are support then you use these internetwork criteria to make your decisions. Priscilla Oppenheimer (2012). Top-Down Networking Design. (Special Edition for Strayer University) Boston, MA, Pearson Learning Solutions Describe the key criteria involved in selecting WAN technologies and WAN providers. Discuss which criteria is the most important from your perspective and state why. When selecting WAN technologies and WAN provider this will vary from company to company one of the most important factors...

Words: 514 - Pages: 3

Free Essay

Three Way Handshack

...TCP/IP Three-Way Handshake   In May 1974 the Institute of Electrical and Electronic Engineers (I EEE) publish a paper entitled” A Protocol for Packet Network Intercommunication”. This document describes an Internet internetworking protocol for sharing sources using packet switching. A central control component of this model which was the Transmission Control Program that incorporated both connection – oriented links and datagram service between hosts. The monolithic Transmission Control Program was later divided into a modular architecture consisting of the Transmission Control Protocol at connection – oriented layer and the Internet Protocol at the internetworking layer. The model became known as TCP/IP.   TCP/IP is the backbone of the Internet of today. Comprised of two protocols which is known as TCP and IP. The TCP/IP protocol is one of the most widely used by corporations and household today. The Internet protocol (IP as is generally known) is the network layer of the Internet. The job of IP is to route and send packets to the package destination. IP provides no guarantee for the packets try to deliver. The IP packets are usually turn datagram. The datagram go to a series of routers before they reached the destination. Since the network has variable delay, it is no guarantee that the datagram will receive in sequence. IP only tries for best-effort delivered. Transmission control protocol (TCP) runs on top of IP improvised a connection on his service between the sender and...

Words: 384 - Pages: 2

Premium Essay

Engineer

...routing; congestion control; local area networks; communications architecture and protocols; internetworking.   Pre-requisites   By topic: •  Programming language (such as C++) •  Basic understanding of probability theory and data structures •  Basic understanding of the internal operations of computers   By course: •  STAT 230 Probability and Random Variables, and EECE 330 Data Structures and Algorithms. Instructor   Ayman Kayssi                   Office: 404, Raymond Ghosn Building (RGB) Office Hours: Monday 2 – 3:30 pm and by appointment Extension: 3499 Email: ayman@aub.edu.lb Web: aub.edu/~ayman Messaging: +961 3 965 258 LinkedIn: lb.linkedin.com/in/aymankayssi Twitter: akayssi Facebook: akayssi Course objectives   The objectives of this course are to give students:   An understanding of the basic principles of computer networking   An overview of the main technologies used in computer networks   An overview of internetworking principles and how the Internet protocols, routing, and applications operate   The basic background in computer networks that will allow them to practice in this field, and that will form the foundation for more advanced courses in networking   The basic skills needed to write network applications. Topics covered in this course Introductory concepts   Physical media   Link layer and local area networks   Packet switching   Internetworking   Routing   Transport layer   Network applications   Network programming   Textbook ...

Words: 1522 - Pages: 7

Premium Essay

Ieee Group

...Standards Research IEEE Group The IEEE 802.1 Working Group is sanctioned to fret about and improve principles and proposed follows in the accompanying territories: 802 LAN/MAN structural planning, internetworking around 802 MANs, LANs, and other wide range networks, 802 by and large network administration, 802 Security, and convention layers above the layers of LLC & MAC. The 802.1 working assembly have four animated assignment aggregations: Interworking, Security, Time Sensitive Networking and Data Center Bridging. IEEE 802.1 handles the building design, security, Metropolitan Area Networks, Wide Area Networks and Local Area Networks, institutionalized by IEEE 802. Following are the key tasks of IEEE 802.1: • Outlines and executes models that manage network administration practices • Furnishes administrations, incorporating LAN/MAN administration, media access control (MAC) connecting, information encryption/encoding and network movement administration (Hiertz, Denteneer, et al. 2010) IEEE 802.1 is contained four assemblies that keep tabs on distinctive guidelines and arrangements in the accompanying zones: • Audio/video (A/V) bridging • Internetworking • Security • Data center bridging The Internetworking assembly handles generally structural planning, connection conglomeration, convention tending to, network way identification/calculation and other specialized practices and suggestions. Need of the IEEE 802 Standard IEEE 802 alludes to a group of IEEE standards...

Words: 1026 - Pages: 5

Premium Essay

Computer Science

...Instruction Plan for CSE240 Lab on Data Structure and N/Ws Term: 4th Course No: CSE240 Course Title: Lab on Data Structures and Networks L: 0 T: 0 P: 4 Textbook: 1. Data Structures – Seymour Lipschutz :India Adapted Edition 2006 2. Data communication and networks- Forouzan-4TH Edition Reference Books: 3.Data Structures & Algorithms Using C- R.S Salaria-2nd Edition 4.Data Structures,Algorithms and applications in C++ --Sartaj Sahni—2nd Edition 5.PC Hardware in a Nutshell-Robert Bruce Thomsan and Barbara Fritchman Thomsan—July2003 :Second Edition Other readings: |Sr.No. |Journal articles as compulsory readings (Complete reference) | |6. |Cisco system advanced exam guide-CISCO press | |7. |Cisco system CCNA Exam dump guide –CISCO press | Relevant websites: |S.No. |Web address |Salient Features | |8. |http://www.java2s.com/Tutorial/C/0260__Data-Structure |A web page on Data Structure| | | ...

Words: 1499 - Pages: 6

Free Essay

Information Technology

...Management and Administration, Programming in C++, Java and Visual Basic .NET, System Analysis, Networking, Computer Security and Management Science, Business Management and Economics, Management Information System, Etcetera. HND ELECTRICAL/ELECTRONIC ENGINEERING Course content includes: Network Analysis, Engineering Mathematics, Digital Electronics, Telecommunications, Power Systems, Computer Technology, Computer Literacy, Microcomputer, Computer Applications, Fault Diagnosis, Control Systems, Equipment Maintenance, Power Electronics, Etcetera. CISCO (CCNA Exploration: Network Fundamentals) at College of Engineering, KNUST Course content includes: Internetworking, Introduction to TCP/IP, Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP, Cisco’s Internetworking Operating System (IOS) and Security Device Manager (SDM) CISCO (CCNA Exploration: Routing Protocols and Concepts) at College of Engineering, KNUST Course content includes: Introduction to...

Words: 649 - Pages: 3

Premium Essay

Hotel Management Srs

...M.O.P VAISHNAV COLLEGE FOR WOMEN (AUTONOMOUS) COMMON TO B.SC COMPUTER SCIENCE AND B.C.A COMPUTER NETWORKS QUESTION BANK Two Marks Questions UNIT I KNOWLEDGE OF SPECIFIC FACTS 1. What is computer network? 2. What is the difference between computer network and distributed system? 3. What is client-server model? 4. What are local area networks? 5. What are metropolitan area networks? 6. What are wide area networks? 7. What is multicasting? 8. What is broadcasting? 9. What is unicasting? 10. What are switching elements? 11. What is routing algorithm? 12. What is blue tooth? 13. What is communication subnet? 14. What are peers? 15. What is a protocol stack? 16. What is topology? 17. What is ring topology? 18. What is star topology? 19. What is bus topology? 20. What is mesh topology? 21. What is tree topology? 22. What is connection-oriented service? 23. What is connection less service? 24. What is a datagram service? 25. What is store and forward network? 26. What is a cell? KNOWLEDGE OF TERMINOLOGY 27. Define broadcast links. 28. Define point-to-point links 29. Define gateway 30. Define Internet work. 31. Define protocol. 32. Define interface. 33. Define bandwidth. KNOWLEDGE OF CLASSIFICATION AND CATEGORY 34. Give the two types of transmission technology. 35. Give the different types of services. 36. Mention the...

Words: 2997 - Pages: 12

Premium Essay

Parents' Role Towards the Internet

...PARENT’S ROLE TOWARDS THE INTERNET Thesis statement: Since surfing the internet have greatly affected the lives of young people, parents should develop a new practical system to monitor their children when they’re surfing the internet. Introduction: Surfing the internet have become very famous throughout the world. A. This paper aims to show the effects of internet to the lives of young people. B. It also aims to show the new practical system to monitor children while using the internet. I. The internet, like other technologies, has also its history. A. The invention of the internet started to help people in making their research more progressive. B. Later on, the Internet started to develop and become the way it is today. II. There are many effects of using the internet. A. Internet has been very useful to everyone. B. Internet has become one of the problems of many parents. III. Parents have roles in developing their children. A. It is important that children must have a proper guidance for their parents in their early childhood. B. Even though children become teenagers and have the right to decide for themselves, they still need to be guided to prevent bad information from corrupting their minds. IV. Parents could use new practical systems to monitor their children. A. They could use manual monitoring. B. They could also use advanced technology to...

Words: 3457 - Pages: 14

Premium Essay

Ip Adresses Classes and Special-Use Ip Address Space

...IP ADRESSES CLASSES AND SPECIAL-USE IP ADDRESS SPACE NT2640 ENRIGHT 3/19/2016 DURAZO ENRIGHT NT2640 “Class A IP addresses were used for networks that had a large number of hosts on the network. The class permitted up to 126 networks by using the first octet of the address for the network identification. The first bit in this octet was always fixed or set to be zero. The following seven bits in the octet were then set to one which would complete the network identification” (tech faq, n.d.). In class A the most significant bits begin with a zero. In class B they begin with a 10. The class C begin with a 110. Class D IP addresses were reserved for multicasting purposes. These addresses begin with an octet in the 224-239 range. They would have leading bits of 1 1 1 0 and includes addresses from 224.0.0.0 to 239.255.255.255. I. RFC 1918 address ranges are: 10.0.0.0/8 (10.0.0.0 - 10.255.255.255) 172.16.0.0/12 (172.16.0.0 - 172.31.255.255) 192.168.0.0/16 (192.168.0.0 - 192.168.255.255) As required by RFC 1918, these addresses will never be routed outside the campus network. II. RFC 1918 addresses that IST will not route inside campus are: 10.0.0.0/12 (10.0.0.0 - 10.15.255.255) 192.168.0.0/16 (192.168.0.0 - 192.168.255.255) Campus computer users can use addresses in those two ranges however they like, confident that these addresses will not be routed by IST. ENRIGHT ...

Words: 1317 - Pages: 6

Premium Essay

Request for Proposal – Response

...You are a $10 million consulting company responding to a Request for Proposal for a prospective client. The client seeks an analysis of its existing network in anticipation of a large merger. This engagement would be worth over $5 million in revenue to your $10 million company. The client seeks to ensure that your small organization has the technical acumen to prepare, guide, and assess merging the two company networks. Write a two to three (2-3) page paper in which you: Prepare an opening statement that specifies your organization’s capabilities to manage a deployment of this size. Graphically depict and effectively promote your company’s structured development and services using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. Explain what the client can expect from your services. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or Dia. The completed diagrams...

Words: 316 - Pages: 2

Free Essay

Mr. Tran

...the network. The most challenges designers face when designing for scalability is usually expansion. 2) 100-99.80= 0.2% 0.2% * 365= 0.73 days 0.73*24= 17.52% hrs/day 17.52*7= 122.64% = 1 hrs and 22 mins downtime /per day Hr/week = 8 hrs 58 mins downtime/ per week Down time for minutes per day will be = 82 minutes Downtime for second per day will be = 4920 second 3) For this question number 3 I do not have significant answer for it so I just going to try my best to answer it usually the technical problem with this issues is could be packet switching delay. Because the latency accrued when switches and routers forward data. The latency depends on the speed of internal circuitry and CPU, and the switching architecture of the internetworking device. or the problems could accrued from serialization delay. The time to put digital data onto a transmission line, which depends on the data volume and the speed of the line. 4) The two tools that I research on that attacker use are attacking on your password , access attacks or DoS attack. Access attacks: first they will try to bait people go into get information from their own access and hack their way into it. Then find the way to get on to authentication services, then FTP service Password attacks: password attack usually refers to repeated attempts to identify a user account, password or both. These repeated attempts are called brute force...

Words: 313 - Pages: 2

Free Essay

Gigabit Ethernet

...Table of Contents Introduction 2-4 Reasons 4-5 Advantages 5 Disadvantages 5 Summary 6 Reference 7 Introduction     The Ethernet is a system used in the connection between a number of computers to form a Local Area Network(LAN), which consist of the physical and data link layer. During the 1980s, one of the first widely deployed Ethernet supported a theoretical data rate of 10Megabit per second(Mbps). Over the years through the advancement of technology, the maximum data rates were increased to 100Mbps to todays peak performing a whopping 1Terabit per second(Tbps), but only active in area of research. As workplaces slowly become a more computerised and network based, with the rise of emails and the internet, Ethernet has become more prevalent. Every computer that requires a connection to another or link to systems uses the Ethernet. The computers you use at home, in your office at work, in school that accesses the internet through the use of the Ethernet.     Ethernet LANs consist of network nodes and interconnecting media. The network nodes fall into two major classes: Data terminal equipment (DTE) - Devices that are either the source or the destination of data frames. DTEs are typically devices such as PCs, workstations, file servers, or print servers that, as a group, are all often referred to as end stations. Data communication equipment (DCE) - intermediate network devices that receive and forward...

Words: 1657 - Pages: 7