Вы находитесь на странице: 1из 3

WCI 1600 Assignment 3 Memo 1. 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.

11 1.12 1.13 1.14 1.15 1.16 1.17 1.18 1.19 1.20 1.21 1.22 1.23 1.24 1.25 2. 2.1

Encoding The process of balancing the number of 1s and 0s transmitted. To minimize signal degradation due to electronic noise. Unshielded Twisted Pair Network Media that carries a single ray of light, usually emitted from a laser. Metropolitan Area Network 64 Bytes 1518 Bytes Virtual Local Area Network Enables the packet to be forwarded to its destination. Enables the packet to be carried by the local media across each segment. The jamming signal is used to notify the other devices of a collision. The backoff algorithm causes all devices to stop transmitting for a random amount of time, which allows the collision signal to subside. It is a technique used by an attacker to inject the wrong MAC address association into a network by issuing fake ARP requests. Trailer Header Network Interface Card Because a device has to wait its turn before it can use the medium. Carrier Sense Multiple Access Collision Half-duplex Virtual Circuit Frame Check Sequence Preamble Cyclic Redundancy Check

The physical media and associated connectors. A representation of bits on the media Encoding of data and control information Transmitter and receiver circuitry on the network devices The physical components Data encoding Signaling Discrete pulses Can have one of two states Voltage jumps between levels UTP Coaxial

2.2

2.3

2.4

STP 2.5 More expensive than copper media over the same distance. Different skills and equipment required to terminate and splice the cable infrastructure. More careful handling than copper media Misalignment: The fiber-optic media are not precisely aligned to one another when joined. End gap: The media do not completely touch at the splice or connection. End finish: The media ends are not well polished or dirt is present at the termination. Make the connection with the upper layers. Frames the network layer packet Identifies the network layer protocol Remains relatively independent of the physical equipment More devices are being connected to the network. Devices access the network media more frequently. Distances between devices are increasing. Availability Economics Requirements Resolving IPv4 addresses to MAC addresses. Maintaining a cache of mappings The switch receives the entire frame. Checks the FSC for errors Forwards the frame to the appropriate port Allows the upper layers to access the media using techniques such as framing. Controls how data is placed onto the media and is received from the media using techniques such as media access control and error detection. Data Link Physical Frames the Network layer protocol Identifies the Network layer protocol Media sharing Topology The device monitors the media for the presence of a data signal.

2.6

2.7

2.8

2.9

2.10

2.11

2.12

2.13

2.14

2.15

2.16

If a data signal is absent, indicating that the media is free, the device transmits the data. If signals are then detected that show another device was transmitting at the same time, all devices stop sending and try again later. 2.17 Point-to-Point Multi-Access Ring

3. 3.1

Using Basic Subnetting, the highest number of hosts required per subnet is 30, therefore a subnet mask of /27 applies which provides a total of 8 subnets (23) of 32 hosts (30 usable). Writing down the first 5 Subnets gives:
Network Name Subnet 0 Subnet 1 Subnet 2 Subnet 3 Subnet 4 Network Address 217.93.73.0 217.93.73.32 217.93.73.64 217.93.73.96 217.93.73.128 First Usable Host address 217.93.73.1 217.93.73.33 217.93.73.65 217.93.73.97 217.93.73.129 Last Usable Host Address 217.93.73.30 217.93.73.62 217.93.73.94 217.93.73.126 217.93.73.158 Broadcast Address 217.93.73.31 217.93.73.63 217.93.73.95 217.93.73.127 217.93.73.159

3.2 Using the VLSM technique, we subnet according to each network size and we proceed by first sorting the networks from largest to smallest
Network Name Network 3 Network 2 Network 1 Network 4 Network 5 Network 6 Slash Mask /26 /26 /26 /30 /30 /30 Total hosts 64 64 64 4 4 4 Network Address 192.118.47.0 192.118.47.64 192.118.47.128 192.118.47.192 192.118.47.196 192.118.47.200 First Usable Host address 192.118.47.1 192.118.47.65 192.118.47.129 192.118.47.193 192.118.47.197 192.118.47.201 Last Usable Host Address 192.118.47.62 192.118.47.126 192.118.47.190 192.118.47.194 192.118.47.198 192.118.47.202 Broadcast Address 192.118.47.63 192.118.47.127 192.118.47.191 192.118.47.195 192.118.47.199 192.118.47.203

3.3 Using the VLSM technique, we subnet according to each network size and we proceed by first sorting the networks from largest to smallest
Network Name Network 1 Network 3 Network 2 Network 4 Network 5 Slash Mask /26 /26 /27 /30 /30 Total hosts 64 64 32 4 4 Network Address 223.153.45.0 223.153.45.64 223.153.45.128 223.153.45.160 223.153.45.164 First Usable Host address 223.153.45.1 223.153.45.65 223.153.45.129 223.153.45.161 223.153.45.165 Last Usable Host Address 223.153.45.62 223.153.45.126 223.153.45.158 223.153.45.162 223.153.45.166 Broadcast Address 223.153.45.63 223.153.45.127 223.153.45.159 223.153.45.163 223.153.45.167

Вам также может понравиться