Computer Networking

In: Computers and Technology

Submitted By jpastrana87
Words 69922
Pages 280
COMPUTER NETWORKING
SIXTH EDITION

A Top-Down Approach

James F. Kurose
University of Massachusetts, Amherst

Keith W. Ross
Polytechnic Institute of NYU

Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Editorial Assistant: Emma Snider Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Vice President and Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Manufacturing Manager: Nick Sklitsis Operations Specialist: Lisa McDowell

Art Director, Cover: Anthony Gemmellaro Art Coordinator: Janet Theurer/ Theurer Briggs Design Art Studio: Patrice Rossi Calkin/ Rossi Illustration and Design Cover Designer: Liz Harasymcuk Text Designer: Joyce Cosentino Wells Cover Image: ©Fancy/Alamy Media Editor: Dan Sandin Full-Service Vendor: PreMediaGlobal Senior Project Manager: Andrea Stefanowicz Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color

This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education,…...

Similar Documents

Computer Networking

...7. Further Reading Bibliography 171 171 172 172 172 172 173 173 173 174 175 175 175 160 www.pragsoft.com Contents xi Preface This book is concerned with post-computer communication networks and two of its important streams: data communication and telecommunication. Data communication refers to the communication between digital computers, facilitated by computer networks. Telecommunication refers to the primarily human-to-human communication facilitated by the global telephone system. The differences between these two streams are mainly due to historical reasons. Telecommunication is increasingly relying on digital computer technology, and data communication is relying more than ever on telecommunication networks. The two streams are rapidly converging. Newcomers to this field are often bewildered by the substantial wealth of information already published on the subject. This book is aimed at this group of people. It provides a broad coverage of the key concepts, techniques, and terminology, so as to prepare readers for more advanced discussions. In-depth discussions of technically-involved topics are intentionally avoided in favor of more general concepts. No previous knowledge of networks or programming is assumed. The structure of the book is as follows. Chapter 1 introduces computer networks and explains some of their elementary concepts. It also introduces the OSI reference model, upon which later chapters are based. Each of Chapters 2-8 describes one......

Words: 60074 - Pages: 241

It 230 Computer Networking

...Network Design: XYZ School System Network Design: XYZ School System IT 230 Computer Networking Executive Summary {complete during Week Nine} Write 3-4 paragraphs describing the goals of the network design project, assumptions, pros and cons of the proposed solutions, and project constraints. Cabling Specifications 1. The following specification represents the minimum requirements for the installation of cabling and equipment data cabling in any offices or labs to be constructed or modified for the XYZ School System. 2. Minimum Cabling Requirements a. The Data Cabling and termination shall be in accordance with wiring configurations as per ANSI/TIA/EIA-568-B standards b. All cabling runs must be uninterrupted and without splices c. Where cabling is to be enclosed in a solid wall, the cables should be installed within a conduit for a additions or reconfigurations 3. General Specifications a. Data cable (CAT-6 UTP) i. Terminating method: CAT-6 socket 1. Green/White (1) 2. Green (2) 3. Orange/White (3) 4. Blue (4) 5. Blue/White (5) 6. Orange (6) 7. Brown/White (7) 8. Brown (8) ii. Each data point should have all 4pairs assigned and terminated as per ANSI/TIA/EIA-568-B standards b. Cables Labeling i. Data plates 1. On each face plate a unique number will be used to indicate the data’s location of cable termination on the patch panel 2. The data ports will be marked with orange labeling for each data connection ii. Wiring labels 1. Each cable will be sequentially......

Words: 6096 - Pages: 25

Computer Networking

...Term paper of computer networking (Design wireless network) x.y.z. Abstract: this document tells us about wireless network and various techniques to design a computer wireless network Keywords—wireless networks, connecting devices, switches, hubs. [pic] Campus network A campus network is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. The networking equipments (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc). In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. [pic] | | | | Introduction A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defence. It was the first operational computer network in the world. Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network . Purpose • Facilitating communications. Using a network, people can communicate efficiently and......

Words: 1521 - Pages: 7

Networking

...Introduction Computer Networks were the pioneer of the Internet era. The definition of a computer network is “A network of data processing nodes that are interconnected for the purpose of data communication. 2. A communications network in which the end instruments are computers.”[1] The first networks were narrowly used by important personnel like military bases so they can maintain connection with their traveling co-workers, keeping them safe, and giving them direction. These networks were not connected to the Internet, as we know it. They were just basic networks for the sake of communication. Networks became much more widely used in the 1990’s when the internet emerged to the masses. Now corporate offices and residential homes alike could start a network of their own so they can to connected to whatever they like. The importance of networking was realized very quickly, the number of networks rose at a rapid pace, and today there are billions of people connected to each other in different ways. Whether it be in a small corporate office connecting employees, or the network that connects a business to its manufacturer in China, its very obvious that the network changed the world, and helped it prosper. In this paper I will discuss every networking feature in the Windows operating system as well as its importance to the network. Importance Of A Network Now that it is common for a household to have multiple devices with the ability to connect, networks have become more...

Words: 2060 - Pages: 9

Computer Networking

...accuracy amongst adult learners of German as a foreign language. Unpublished PhD dissertation, University College Dublin. 2.9.10 Also note: - Remember to follow linguistic rather than literature conventions (i.e. the year of publication should be placed after researchers' names rather than at the end of the reference). - The bibliography should be arranged in alphabetical order. - If you are referencing an internet article with no year given, include the abbreviation n.y. where the year of publication would normally be included (in brackets, if the above formatting conventions are adopted). - Page numbers are not usually given for internet sources/html documents since the number of pages differs with different computers/printers. - a, b, c, ...: If a number of articles in your bibliography were published by the same author in one particular year, these must be differentiated by the use of letters after the relevant year in the text as well as in your references, e.g., Crystal, D. (1999a), Crystal, D. (1999b). 8 Which one is a, b, c etc. depends on the first letter of the title.9 - Abbreviations may be given for places of publication. If used, they should be used consistently, e.g. Use "N.Y." for "New York" and "N.J." for "New Jersey", or just "New York" and "New Jersey" but do not use "N.Y." and "New Jersey". 8 The point of this convention is to make clear to the reader which article is of importance at a particular......

Words: 7420 - Pages: 30

Computer Networking

...commonly used networks are client servers and peer to peer (P2P) networks. There are many ways that computers connect and share information with each other. Computers today connect and share information by connecting to a network. There are several types of networks that computers can connect to, but the two most popular are local area networks (LAN) and wireless local area networks (WLAN). In a computer network, anything that a computer can communicate with can be connected to the network. Such as printers, fax machines, routers, and other computers. The internet was created in the mid 1960’s by the department of defense. At first this new invention called the internet was not available to the public. Like with every other new technology, the government officials were the only ones with access to the internet. In 1974 the design of the Transmission Control Program (TCP) made data and information sharing easier and more efficient. In 1982 the internet technology protocols were developed. These protocols worked together with the TCP to regulate and monitor the information sent/received over network. The first definition of the internet is described as computers connected to a set of networks (Mitchell, 2010). From here on out, the World Wide Web is the most sophisticated way to send and receive electronic mail, find information on any topic, and access web pages from any computer....

Words: 277 - Pages: 2

Computer Networking

... of Technology Introduction to Computer Networking Prof. Teodora Bakardjieva 1 1.0 Introduction The purpose of the networking guidelines are as follows:  to assist students in understanding the benefits of networking  to help students place in context their current stage of networking development in their school.  to assist students in planning the next stage of network development in their school.  to provide standard networking ‘models’ and best practice to students that will assist students in their network planning. This document includes information under the following main headings:  Introduction to Networking  Advantages of Networking  Types of Networks  Models of networking appropriate to students  NCTE recommendation to students  Some relevant terms. 1.1. Basic of Networking A computer network consists of a collection of computers, printers and other equipment that is connected together so that they can communicate with each other. Fig 1 gives an example of a network in a school comprising of a local area network or LAN connecting computers with each other, the internet, and various servers. 2 File and Print Server CD or Multimedia Servers Access to: Internet content & learning resources, Scoilnet etc Email communication Users computers Cache, Proxy, Filtering, Firewall Server Modem or Router School ‘Local Area Network’ (LAN) Other users, computers Fig 1: Representation of Network......

Words: 4611 - Pages: 19

Computer Networking

...Chad Nash Advantages and Disadvantages of Windows XP Windows XP was introduced as a significant upgrade to Windows 98 and Windows Millennium. After Microsoft brought out MS-DOS in the 1980's it developed its futuristic operating system - Windows. Newer versions of this OS were developed over the years, including the out bringing of Windows NT (New Technology) which was aimed at business users and computer servers. After numerous incarnations of the Windows operating system, including Windows 95, 98 and the much criticized Windows Millennium, the XP system was released October 25, 2001.Windows XP has much in common with the singularities and also engineering of Windows 2000. In fundamentals XP was created to"bridge the two architectures (NT and Windows 9x--or DOS) into a single common operating system." Windows 2000 was based on Windows NT technology; as far as Millennium (ME) was created from Windows 9x technology. The NT operating system was much more honorable than the other versions before the o of Windows and accordingly Microsoft decided to choose this technology as the infrastructer for XP. XP was put out in two basic versions - The home and the professional version. The basic inequality between the two versions is that the up to speed version places more significance on security. It also has the efficiency to encrypt files and data and has support for multiprocessor systems. ( Lanyon P.) Windows XP was developed to on the problems and inconsistencies in the ME......

Words: 1682 - Pages: 7

Computer Networking

...touches or hits the paper. ink cartridge Cartridge in inkjet printers that holds the different colors of ink for the printer. inkjet printer a type of ink dispersion printer that uses cartridges of ink. The ink is heated to a boiling point and then ejected onto the paper through tiny nozzles. laser printer a type of printer that uses a laser beam to control how toner is placed on the page and then uses heat to fuse the toner to the page. local printer a printer connected to a computer by way of a port on the computer. Compare to network printer. LPT (Line Printer Terminal) assignments of system resources that are made to a parallel port and that are used to manage a print job. Two possible LPT configurations are referred to as LPT1: and LPT2:. network printer a printer that any user on the network can access, through its own network card and connection to the network, through a connection to a stand-alone print server, or through a connection to a computer as a local printer, which is shared on the network. Printer Control Language (PCL) a printer language developed by Hewlett-Packard that communicates to a printer how to print a page. pickup roller a part in a printer that pushes forward a sheet of paper from the paper tray. PostScript a printer language developed by adobe Systems that tells a printer how to print a page. print head The part in an inkjet or impact printer that moves across the paper, creating one line of the......

Words: 1170 - Pages: 5

Computer Network Security for Social Networking

...Computer Network Security for Social Networking McCray C. Devin Undergraduate Business, Leadership, Information System Technology Security Regent University 1000 Regent University dr. Virginia Beach, VA 23464 e-mail: devimcc@mail.regent.edu Abstract In this paper, I will address the security issues, flaws, and problems that social networking sites are faced with in retrospect to information that the sites hold. The Information is not protected from the public in any way, why is this a normal operation about the popular social media sites. Lastly I want to address the simplicity of gaining someone vital information through a protected individual’s social network profile. 1. Introduction In today’s society almost everyone has some type of social networking service that they hold an account with. These social networking sites are a great way to communicate, network, and interact with fellow colligates and friends. Facebook, Twitter, and Google plus are just a few social networking sites to mention. These sites all have a one factor authentication system for the user to log into their account (Beaver) .This simplistic authentication systems is very easy and efficient for the users accessing there accounts. The idea arose if it is this easy for me to log into my account how easy would it be for an outside party to gain access within my account. Companies are faced with the problem of convenience over security. (McCHale 12) In this paper I would like to......

Words: 2048 - Pages: 9

Computer Networking

...1. You have just begun working as a networking consultant with MTI Technologies Inc. One of your first tasks is to help troubleshoot a small Ethernet network at a tax preparation office. The backbone of this network consists of six hubs connected in a bus fashion. Three of the hubs service workgroups of 10 workstations each. One of the hubs services two file servers and two shared printers. In anticipation of tax season and a heavier workload, the organization recently upgraded its network from 10BaseT to100BaseT. However, they have not seen any of the performance increases they expected. Before even visiting the firm, what can you suggest as reasons for the less than optimal performance? If one of the NICs is not capable of 100BASE-TX the entire network will operate on 10BASE-T even if all of the hubs and other NICs are capable of negotiating 100BASE-TX. If there are a large number of transceivers trying to talk at once on a hub-based network they will jam up as packet switched traffic is inherently bursty. There's a limit to the number of repeaters that can be installed between any two hosts on a hub network. There is no such limitation for switches, which is what I would recommend for the company. 10BASE-T allows for 4 repeaters between hosts, but 100BASE-TX allows for only two and only under very strict circumstances. If my initial assessment of the topology is correct, each case involves no less than 3 hubs: one for the workstation group, one for the backbone bus......

Words: 298 - Pages: 2

Networking

...Networking in My Life and Career Angel Salvador Maldonado DeVry University Author Note This paper was prepared for CEIS-100 taught by Professor Reinaldo Fernandez. Course Project Week #: 2 Networking in My Life and Career A network is defined as a group of computers that are connected to share information. An NIC is a Network Interface Card. It is the physical component of a computer that allows a computer to connect to a network. Three types of media used for network connections are cable television coaxial, fiber optic cable and wireless connections. There have often been times when I have had to access my home wireless internet network and have not been able too. I start to troubleshoot by disconnecting and re connecting to the wireless network in the Open Network and Sharing Center. If that does not work, I check my wireless router to see if the lights on the router are green indicating that it is working properly. If there is a red or orange light on the router, I unplug the power source of the router and let it reset. This usually resolves the issue. My career goal is to become a Network System Administrator. That being said, I will be dealing with networks on a daily basis. A Network System Administrator is responsible for designing, installing, maintaining and upgrading networks in businesses of different sizes. I still have not taken any networking classes. I do know that by the time I obtain my Associates in Network Systems Administration I will have......

Words: 298 - Pages: 2

Computer Networking

...1. Information, Information Systems and Management Information Systems | LO1LO2LO3 | 1.1 Introduction to Information assurance and security 1.2 Information 1.3 Information Systems 1.4 Management Information Systems | * Understand the importance and meaning of Information assurance and security * Understand what is information * Discuss what is MIS and how it works | * Formulate some point of view about information security. * Have deeper knowledge about information. * Know what is MIS | * Internet research about information security * Group discussion about information and Information security * Evaluate the accumulated knowledge | Chapter 2. Information Security challenges brought about by computers and the Internet | LO1LO2LO3 | 2.1 Unauthorized or inappropriate access to information or system2.2 Malicious hacker2.3 Cyber-terrorism2.4 Viruses and other Malicious code2.5 Other threats and vulnerabilities | * Identify the nature of information security challenges. * Understand how they work. * Discuss how to identify and prevent the unauthorized or inappropriate access information or system. | * Formulate list of information security challenges. * Have deeper knowledge about unauthorized or inappropriate access to information or system * Determine the ways of discovering and preventing unauthorized information access. | * Internet research about information security challenges. * Graded recitation about the......

Words: 1777 - Pages: 8

Computer Networking Assignment 1

...Unit 1 Assignment Dan SItkowski 1. Cell phones uses both voice and data networks. It uses data to get information and to also be allowed to access the internet. It also uses voice when you make a call. 2. Land phones use both networks. It uses data for caller ID and to send the information to find out where the call will be going. It also uses voice to transmit back and forth so that you can have a convocation. 3. SMS/Text messaging uses data networks. It only uses data networks because you are sending a message to another person. And in that message you can have files attached to the message as well. 4. Fax machines uses a data network. It uses this network because you put a document or photo threw the machine and it takes the image of that and creates a file. It then takes that file and sends it to another location. Then that location opens and prints or views the file. 5. Pagers use only data networks. It only uses data networks because when you send a file containing only text and then send it to a pager. The pager then takes that file and opens it showing the text for that person to read. 6. VOIP (voice over IP) uses data networks. VOIP uses data networks only because It uses the internet to talk to people instead of the traditional voice network. This allows someone to bypass the phone company. It works by taking the conversation and converts it to a file that is sent to the other location where it is opened. The problem with this is that if......

Words: 307 - Pages: 2

Computer Networking

...servers and peer to peer (P2P) networks. There are many ways that computers connect and share information with each other. Computers today connect and share information by connecting to a network. There are several types of networks that computers can connect to, but the two most popular are local area networks (LAN) and wireless local area networks (WLAN). In a computer network, anything that a computer can communicate with can be connected to the network. Such as printers, fax machines, routers, and other computers. The internet was created in the mid 1960’s by the department of defense. At first this new invention called the internet was not available to the public. Like with every other new technology, the government officials were the only ones with access to the internet. In 1974 the design of the Transmission Control Program (TCP) made data and information sharing easier and more efficient. In 1982 the internet technology protocols were developed. These protocols worked together with the TCP to regulate and monitor the information sent/received over network. The first definition of the internet is described as computers connected to a set of networks (Mitchell, 2010). From here on out, the World Wide Web is the most sophisticated way to send and receive electronic mail, find information on any topic, and access web pages from any computer. A computer network is used to connect two or more computers together so they can share data between them. Networks are built......

Words: 1649 - Pages: 7