This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
10BASE-2, one of several physical media specified byÂ IEEEÂ 802.3Â for use in anÂ EthernetÂ local area network, consists ofÂ ThinwireÂ coaxial cableÂ with a maximum segment length of 185 meters. Like other specified media, 10BASE-2 supports Ethernets 10Â MbpsÂ data rate.
This designation is an Institute of Electrical and Electronics Engineers (IEEE) shorthand identifier. The "10" in the media type designation refers to the transmission speed of 10 Mbps. The "BASE" refers to base-band signalling, which means that only Ethernet signals are carried on the medium (or, with 10BASE-36, on a single channel). The "T" represents twisted-pair; the "F" represents fiber optic cable; and the "2", "5", and "36" refer to the coaxial cable segment length (the 185 meter length has been rounded up to "2" for 200).
10BASE5Â (also known asÂ thick EthernetÂ orÂ thicknet) is the original "full spec" variant ofÂ EthernetÂ cable, using cable similar to RG-8/UÂ coaxial cableÂ but with extra braided sheiding. This is a stiff, 0.375-inch (9.5 mm) diameter cable with an impedance of 50Â ohmsÂ (Î©), a solid centre conductor, a foam insulating filler, a shielding braid, and an outer jacket. The outer sheath is often yellow-to-orange/brown foamÂ fluorinated ethylene propyleneÂ (for fire resistance) so it often is called "yellow cable", "orange hose", or sometimes humorously "frozen yellow garden hose".
10BASE5 has been superseded due to the immense demand for high speed networking, the low cost ofÂ Category 5Â Ethernet cable, and the popularity of802.11Â wireless networks. BothÂ 10BASE2Â and 10BASE5 have become obsolete.
Ethernet over twisted pairÂ refers to the use of cables that contain insulated copper wires twisted together in pairs for theÂ physical layerÂ of anÂ Ethernet network-that is, a network in which the Ethernet protocol provides the data link layer. Other Ethernet cable standards useÂ coaxial cableÂ orÂ optical fiber. There are several different standards for thisÂ copper-based physical medium. The most widely used areÂ 10BASE-T,Â 100BASE-TX, andÂ 1000BASE-T, running at 10 MbpsÂ (also Mbps or Mbs-1), 100Â Mbps, and 1000Â Mbps (1Â Gbps), respectively. These three standards all use the same connectors. Higher speed implementations nearly always support the lower speeds as well, so that in most cases different generations of equipment can be freely mixed. They useÂ 8 positionÂ modular connectors, usually calledÂ RJ45Â in the context ofÂ EthernetÂ over twisted pair. The cables usually used are four-pairÂ twisted pair cableÂ (though 10BASE-T and 100BASE-TX only actually require two of the pairs). Each of the three standards support bothÂ full-duplexÂ and half-duplex communication.
The common names for the standards derive from aspects of the physical media. TheÂ numberÂ refers to the theoretical maximum transmission speed in megabitsÂ per second (Mbps). TheÂ BASEÂ is short forÂ baseband, meaning that there is noÂ frequency-division multiplexingÂ (FDM) or other frequency shifting modulation in use; each signal has full control of wire, on a single frequency. TheÂ TÂ designatesÂ twisted pairÂ cable, where the pair of wires for each signal is twisted together to reduceÂ radio frequency interferenceÂ andÂ crosstalkÂ between pairs (FEXTÂ andÂ NEXT). Where there are several standards for the same transmission speed, they are distinguished by a letter or digit following the T, such asÂ TX.
Advantages and Disadvantages
10Base2-An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signalling, with a contiguous cable segment length of 100 meters and a maximum of 2 segmentsÂ
10Base5-An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signalling, with 5 continuous segments not exceeding 100 meters per segment.Â
10BaseT-An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signalling and twisted pair cabling.
Task 1: part b
A repeater connects two segments of your network cable. It retimes and regenerates the signals to proper amplitudes and sends them to the other segments. When talking about, ethernet topology, you are probably talking about using a hub as a repeater. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network communication when there are several repeaters in a row. Many network architectures limit the number of repeaters that can be used in a row. Repeaters work only at the physical layer of the OSI network model.
A bridge reads the outermost section of data on the data packet, to tell where the message is going. It reduces the traffic on other network segments, since it does not send all packets. Bridges can be programmed to reject packets from particular networks. Bridging occurs at the data link layer of the OSI model, which means the bridge cannot read IP addresses, but only the outermost hardware address of the packet. In our case the bridge can read the ethernet data which gives the hardware address of the destination address, not the IP address. Bridges forward all broadcast messages. Only a special bridge called a translation bridge will allow two networks of different architectures to be connected. Bridges do not normally allow connection of networks with different architectures. The hardware address is also called the MAC (media access control) address. To determine the network segment a MAC address belongs to, bridges use one of:
Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. If the address is not in the bridging table, the packet is forwarded to all segments other than the one it came from. This type of bridge is used on ethernet networks.
Source route bridging - The source computer provides path information inside the packet. This is used on Token Ring networks.
A router is used to route data packets between two networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet, readdress the packet to the proper ethernet address, and transmit it on that network. If it is destined for another network and must be sent to another router, it will re-package the outer packet to be received by the next router and send it to the next router. The section on routing explains the theory behind this and how routing tables are used to help determine packet destinations. Routing occurs at the network layer of the OSI model. They can connect networks with different architectures such as Token Ring and Ethernet. Although they can transform information at the data link level, routers cannot transform information from one data format such as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or corrupted packets. If the routing table does not indicate the proper address of a packet, the packet is discarded.
There is a device called a brouter which will function similar to a bridge for network transport protocols that are not routable, and will function as a router for routable protocols. It functions at the network and data link layers of the OSI network model.
A gateway can translate information between different network data formats or network architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brand computers. Most gateways operate at the application layer, but can operate at the network or session layer of the OSI model. Gateways will start at the lower level and strip information until it gets to the required level and repackage the information and work its way back toward the hardware layer of the OSI model. To confuse issues, when talking about a router that is used to interface to another network, the word gateway is often used. This does not mean the routing machine is a gateway as defined here, although it could be.
Task 1: Part C
AnÂ Internet Protocol addressÂ (IP address) is a numerical annuls that is assigned to any device participating in aÂ computer networkÂ that uses theÂ Internet ProtocolÂ for communication between its nodes.Â In other words, it is an address that is assigned to any device that is connected to a network that follows theÂ Internet Protocol, i.e. the Internet. An IP address serves two principal functions; host or network interfaceÂ identificationÂ and locationÂ addressing. Its role has been characterized as follows:Â "AÂ nameÂ indicates what we seek. An address indicates where it is. A route indicates how to get there."
The designers of TCP/IP defined an IP address as aÂ 32-bitÂ numberÂ and this system, known asÂ Internet Protocol Version 4Â (IPv4), is still in use today. However, due to the enormous growth of the InternetÂ and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995,Â standardized byÂ RFC 2460Â in 1998,Â and is in world-wide production deployment.
Although IP addresses are stored asÂ binary numbers, they are usually displayed inÂ human-readableÂ notations, such as 126.96.36.199 (forÂ IPv4), and 2001:db8:0:1234:0:567:1:1 (forÂ IPv6).
The Internet Protocol is used toÂ routeÂ dataÂ packetsÂ between networks; IP addresses specify the locations of the source and destination nodes in theÂ topologyÂ of the routing system. For this purpose, some of the bits in an IP address are used to designate aÂ subnetwork. The number of these bits is indicated inÂ CIDR notation, appended to the IP address; e.g.,Â 188.8.131.52/24.
As the development ofÂ private networksÂ raised the threat ofÂ IPv4 address exhaustion,Â RFC 1918Â set aside a group of private address spaces that may be used by anyone on private networks. Such networks requireÂ network address translatorÂ gateways to connect to the global Internet.
TheÂ Internet Assigned Numbers AuthorityÂ (IANA) manages the IP address space allocations globally and cooperates with fiveÂ regional Internet registriesÂ (RIRs) to allocate IP address blocks toÂ local Internet registriesÂ (Internet service providers) and other entities
Task 2: Part A
InÂ computer networkingÂ andÂ computer science,Â bandwidth,Â network bandwidth,Â data bandwidthÂ orÂ digital bandwidthÂ is aÂ bit rateÂ measure of available or consumed data communication resources expressed in bits/second or multiples of it (kilobits/s, megabits/s etc.).
Note that in textbooks onÂ data transmission,Â digital communications,Â wireless communications,Â electronics, etc., bandwidth refers to analogueÂ signal bandwidth measured inÂ hertzÂ - the original meaning of the term. Some computer networking authors prefer less ambiguous terms such asÂ bit rate,Â channel capacityÂ andÂ throughputÂ rather than bandwidth in bit/s, to avoid this confusion.
Gender Role Identity
Social Class Identity
Task 2: Part C
InÂ computing, aÂ physical address, alsoÂ real address, orÂ binary address, is theÂ memory addressÂ that is electronically (in the form ofÂ binary number) presented on theÂ computer address busÂ circuitry in order to enable theÂ data busÂ to access aÂ particularÂ storage cell ofÂ main memory.
In a computer withÂ virtual memory, the termÂ physical addressÂ is used mostly to differentiate from aÂ virtual address. In particular, in computers utilizingÂ memory management unitÂ (MMU) to translate memory addresses, the virtual and physical addresses refer to an address before and after MMU translation respectively.
Difference between Physical address and Logical address
In a system, there are two types of addresses: logical and physical. Another name for logical address is IP address and it is set by your Internet service provider (ISP) or your router. If you have a router then you have a LAN, which sets a logical address for your computer. Your router will have an logical address set by your ISP.Â
The physical address is also called the MAC address and it is generated by the manufacturer. (but only to a given extent)Â
Because a MAC address is assigned (by the FCC) to a company to use for a range of products.Â
01:23:45:00:00:00 - 01:23:45:FF:FF:FFÂ
Would be their "range" of MAC addresses. They use a coding called Hex which is not to far off from what you know which is base-10 (0-9).Â
Instead hex uses (0-F). 0123456789ABCDEFÂ
A = 10, B = 11, etc.
Task 2: Part C
"The difference betweenÂ Layer 2 and Layer 3Â switching is the type of information inside the frame that is used to determine the correct output interface. With Layer 2 switching, frames are switched based on MAC address information. With Layer 3 switching, frames are switched based on network-layer information."
TheÂ Open Systems Interconnection modelÂ (OSI model) is a product of theÂ Open Systems InterconnectionÂ effort at theÂ International Organization for Standardisation. It is a way of sub-dividing aÂ communications systemÂ into smaller parts called layers. A layer is a collection of conceptually similar functions that provide services to the layer above it and receives services from the layer below it. On each layer anÂ instanceÂ provides services to the instances at the layer above and requests service from the layer below.
For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of the path. Conceptually two instances at one layer are connected by a horizontal protocol connection on that layer.
Encryption and Decryption
Encryption and decryption are both methods used to ensure the secure passing of messages and other sensitive documents and information.
Encryption basically means to convert the message into code or scrambled form, so that anybody who does not have the 'key' to unscramble the code cannot view it. This is usually done by using a 'cipher'. A cipher is a type of algorithm used in encryptionÂ that uses a certain described method to scramble the data. The cipher can only be 'deciphered' with a 'key'. A key is the actual 'described method' that was used to scramble the data, and hence the key can also unscramble the data.
When the data is unscrambled by the use of a key, that is what is known as 'decryption'. It is the opposite of encryption and the 'described method' of scrambling is basically applied in reverse, so as to unscramble it. Hence, the jumbled and unreadable text becomes readable once again.
InÂ networkÂ security, password encryption as well as document encryption is a major player. Without it, there would be no 'security' in theÂ network. Also, encryption is used for all sorts of files and all forms of digital transfers as well. It is used on the internet to safeguard websites and copyrighted material, as well as in bankÂ ATM machines. The encryption process plays a major factor in our technology advanced lives.