Вы находитесь на странице: 1из 2

IETF- standards body for the 3G IMS,SMTP ISO-International Standard organization Medium Access Control- The Media Access

Control (MAC) data communication protocol sub-layer, also known as the Medium Access Control, is a sublayer of the Data Link Layer specified in
the seven-layer OSI model (layer 2). It provides addressing and channel access control (Ex Token Ring,TDMA,802.11, 802.3)
Flow Control- Network Congestion-Prevent quantity of data transmits, Windowing-size windows in tcp, DataBuffering-storing data for bursts
to compensate data speeds
Sliding Window-Conceptually, each portion of the transmission (packets in most data link layers, but bytes in TCP) is assigned a unique
consecutive sequence number, and the receiver uses the numbers to place received packets in the correct order, discarding duplicate packets and
identifying missing ones
802.3 Packetsize 1518 bytes Gigethernet has different encoding scheme from 10/100 based on 802.3ab 10-GIG Ethernet is full duplex only and
needs fiber which allows longer distances. Does not use CarrierSenseMultipleAccess Can use WAN and LAN PHY options. Wan allows slower data
rates but provides extra encapsulation for wide area networks. Can use copper on 10GBe but shorter distances. Future Standard is 40GB Dense
Wavelength Division Multiplexing
Asynchronous Transfer Mode is a cell based switching technique that uses TDMA. Runs over Layer1 Physical. Uses both circuit switched and
small packet switched networking. Connection oriented via virtual circuits between endpoints before sending data. Uses SONET/SDH backbone of
ISDN. Reduces delay variance(jitter) by making small equal size packets. ATM uses QoS through 4 basic types (contant bit/cell rates, variable bit
rates, available bit rates, unspecified bit rates). To maintain traffic ATMs use shaping a combination of queueing and marking of cells and use
policy to enforce traffic contracts. ATM supports ATM Adaption Layers (AAL) for constant bit rates services, synchronization and emulation. 2 and
4 are used for variable. 5 for data. AAL is configured by endpoints on a per virtual connection basis. ATM uses a user network interface cell.
Consists of Generic Flow Control, Virtual Path Iden, Virtual Channel Iden, Payload Type, Cell Loss Priority, Header Error Control
VLAN- Uses IEEE 802.1Q or VLAN Tagging for sharing multiple independent logical networks. This is done through underpinning bridging at the
MAC layer and the 802.1D spanning tree protocol. Allowing different VLANs to communicate through Network Layer3.
MultipleVLANRegistrationProtocol formerly known as GARP VLAN Registration Protocol is a standards based layer 2 protocol for automatic config of
VLAN info on switches. It was defined in 802.1ak to dynamically share info and configure vlans. For ex in order to add a switch port to a vlan only
the end port or the vlan supporting network device connected to the switch need to be configured. All vlan trunks are dynamically created on the
mvrp switches. Allows TagProtocolIden, PriorityCodePoints, Canonical Format Iden, VLAN id
802.1D is the Mach bridging standing for bridges/tree and others. It details linking other standards
802.1D is the MAC bridges standard using bridging and spanning tree for 802.3ethernet,802.11wifi,802.16wimax
Weighted Fair Queuing (WFQ) is a data packet scheduling technique allowing scheduling priorities to multiplexed data flows. Each data flow has
FIFO. So each flow is serviced simultaneously. Therefore one bad flow only punishes itself
Jumbo Frames (frames with more than 1500 bytes of payload Allows up to 9k. Gigabit supports but fast Ethernet doesn’t
802.1X-2001 defines two logical port entities for an authenticated port the "controlled port" and the "uncontrolled port". The controlled port is
manipulated by the 802.1X PAE (Port Access Entity) to allow (in the authorized state) or prevent (in the unauthorized state) network traffic
ingressing and egressing to/from the controlled port. The IEEE 802.3af-2003[2] PoE standard provides up to 15.4 W of DC power (minimum 44 V
DC and 350 mA to each device.[5] Only 12.95 W is assured to be available at the powered device as some power is dissipated in the cable
The IEEE 802.3at-2009[7] PoE standard PoE+ provides up to 25.5 W of power. Some vendors have announced products that claim to comply with
the 802.3at standard and offer up to 51 W of power over a single cable by utilizing all four pairs in the Cat.5
RAID0 (block-level striping without parity or mirroring) RAID1 (mirroring without parity or striping), RAID2 (bit-level striping with dedicated
Hamming-code parity) RAID3 (byte-level striping with parity)
JBOD(Just Bunch of DISKS)(SAN connect virtually)(NAS connected through web protocols)
iSCSI-Allows 2 hosts to send SCSI commands over IP. No additional cabling is needed
Fibre Channel Protocol (FCP) is a transport protocol (similar to TCP)originally developed for supercomputing/mainframes. Requirements are for
SAN/NAS SCSI and networking. Supports 8Gb. Uses ports- hardware entity within nodes to perform data connections, nodes-collection of one or
more ports, fabric-the entity that interconnects ports to it and handles frames.
FiberChannel Layers FC4 — Protocol Mapping layer, in which application protocols, such as SCSI or IP, are encapsulated into
a PDU for delivery to FC2.FC3 — Common Services layer, a thin layer that could eventually implement functions
like encryption or RAID redundancy algorithms;FC2 — Network layer, defined by the FC-PI-2 standard, consists of the core of Fibre
Channel, and defines the main protocols;FC1 — Data Link layer, which implements line coding of signals; FC0 — PHY, includes
cabling, connectors etc.;
FiberChannelTopologies 1)pointto point(connect 2 nodes w/o switches), fabric (switched network), arbitrated loop no hub(like a ring), arbitrated
loop w/ hub.
FiberChannel classes of service 1: Acknowledged Connection-oriented service 2: Acknowledged Connectionless service 3: Unacknowledged
Connectionless service 4: Fractional Bandwidth Connection-oriented service 6: Unidirectional Connection service
FC uses two types of frames. Data and control Sequences- Higher layers set down chunks of data to FC-2, which may need to break them up into
a sequence of frames Exchanges-Exchanges are mechanisms for organizing multiple sequences into a higher-level construct to allow easier
interfacing to applications Examples of exchanges are SCSI disk operations like a read or write. Protocols- An exchange is tied to a protocol that
provides a specific service for higher levels such as fabric login, port login, port logout.
FC Flow Control Fibre Channel provides a sophisticated set of flow control mechanisms at two ‘levels’: end-to-end and buffer-to-buffer Key
concept is credit -- negotiated at login & denotes the number of unacknowledged frames allowed at any time FC frame consists of start delimiter,
frame header, data, cyclic redundancy check, end delimiter.
Infiniband 2.5GBs Similar to FC. Supports unicast and multicast (not found in FC) uses switched topology, extremely low latency around
100nanoseconds
Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH) are
standardized multiplexing protocols that transfer multiple digital bit streams over optical fiber using lasersor light-emitting
diodes (LEDs) SONET Features and SERVICES provides a high-speed TDM data stream designed for optical transport systems,
Defines a hierarchical multiplexing format for lower rate data streams, Defines a set of OA&M functions for managing SONET data
streams Provides a scalable architecture: currently supports speeds up to OC-768 (39.8-Gbps) Allows drop-add multiplexing and
fault tolerant system configurations via ring architectures and automatic protection switching
Optical-Uses the infrared spectrum of light, transmitters are LED or Lasers, Fiber cables are single, multimode. Connectors are
many SC and LC common. Recievers convert light to electrical signal and the choices are PIN photodiodes (low cost high reliability)
or avalanche photodiodes (high cost high sensitivity and built in amplification.) Problems with Optical- 1) Loss or Attenuation
through absorption/scattering, attenuation vs wavelength, 2)Dispersion, 3)non linear affects. Wavelength Division Multiplexing-
combining and separating optical signals. CWDM uses increased channel spacing to allow less sophistication and cheaper
transceivers because signals are not spaced for amplification by EDF. DWDM does the opposite. Optical amplification can be
pumped to produce a gain for the light at the wavelength of the laser made through regeneration amplifiers, chirped pulse,etc.
OADM (Optical Add Drop Multiplexer) Adds mores spectrums to an individual spectrum of light. 802.11i (WPA2) uses 4 way
handshake 1)AP sends a ANONCE to client(STA), 2) STA sends ANONCE with Message Authenication and Integrity code, 3)AP sends
GTK and Sequence #, 4)STA sends Ack. TKIP- Mixes the key with an initialization vector. Used in WPA. WEP just concatenates the
two. CCMP uses AES, and unlike TKIP key management and message integrity is handled by single component built around AES
using 128 bit key, 128bit block, and 10 rounds of encoding. 802.11i consists of interim solution for integrity (TKIP) Final Solution
CCMP, Authentication Access Control, Robust security network operations.WLAN QoS DCF-station must listen to see if it’s idle.
Then waits a short/medium/long delay in order to broadcast. PCF Station queries central station or superframe to ask before
broadcasting. 802.11e uses 2 methods of channel access. With Enhanced Distributed Channel Access EDCA, high priority traffic
has a higher chance of being sent than low priority traffic. Hybrid Control F(x) Controlled Channel Access (HCCA) allows for CFPs
being initiated at almost anytime during a CP. This kind of CFP is called a Controlled Access Phase 802.11 A uses OFDM, B uses
DSSS, G uses A&B, N uses OFDM. N was developed to give users 100Mb speeds. IPV6-Enhancements over IPV4 ( more address
space, QoS and resource allocation, improved options and headers, extensible to add new features, support of autoconfiguration,
and security improvements over IPv4) IPV6 allows fragmentation but assumes the path changes infrequently and sends an error
message back if it occurs. IPv6 addresses are written groups of four hexadecimal digits separated by colons,
2001:db8:1f70::999:de8:7648:6e8. a 64-bit (sub-)network prefix, and a 64-bit interface identifier.IPv6 addresses
unicast addresses identify each network interface, anycast addresses identify a group of interfaces, usually at different locations of
which the nearest one is automatically selected, and multicast addresses which are used to deliver one packet to many interfaces.
In order to use IPv6 in IPv4 u can use tunneling/encapsulating ipv6 in IPv4, Mapping ipv6 addresses to ipv4. n IPv6 transition
mechanism meant to transmit IPv6 packets between dual-stack nodes on top of an IPv4 network. So ipv4 address becomes last two
elements in ipv6

Вам также может понравиться