Chapter 1 - Part 2
Chapter 1 - Part 2
CSMA/CD is one such technique where different stations that follow this
protocol agree on some terms and collision detection measures for
effective transmission. This protocol decides which station will transmit
when so that data reaches the destination without corruption.
Ethernet Frame Format
The information in an Ethernet network is exchanged in a packet form.
The packet provides grouping of the information for transmission.
Types of Address:
1. Physical or Media Access
Controller (MAC) Address
2. Logical or Internet
Protocol (IP) Address
MAC Address
The first 6 hexadecimal codes are used to indicate the vendor of the network
interface, also called the Organizationally Unique Identifier (OUI).
The last 6 hexadecimal values are unique numbers assigned by the vendor.
IEEE is the worldwide source of registered OUIs.
A Sample of MAC Addresses
154.118.243.76
172.16.16.1 10.0.0.1
8 8
172.16.17.18 10.10.27.28
.1 .1 .2
1 2 .2
1 2
Classes of IPv4 and Ranges of Each Class
B 128.0.0.0-191.255.255.255 N.N.H.H
C 192.0.0.0-223.255.255.255 N.N.N.H
192.168.1.0
255.255.255.0
Home Networking
Introduction
Setting up a home network is probably one of the first networks that the student
sets up. This is an exciting opportunity for the student to demonstrate their
knowledge of computer networks but setting up the home network can also be
quite a challenge.
Figure 1: Figure 1:
LAN Network with a WR Home Network with a Router and AP
Planning the Home Network (wired vs. wired)
Data Speed
Cost
Ease of Implementation
Appearance
Home Access
Public Access
Continue
Securing the Home Network
Securing the home wireless network is extremely important because a wireless
signal can be intercepted by the wrong person and they can possibly connect to
your network. The following are some basic steps that can be used to help
protect the home network.
The SSID is the name that is used to identify your network and is used by
your access point or wireless router to establish an association. Establishing
an association means that a wireless client can join the network.
Wireless systems broadcast the SSID so that the network can be easily
identified as an available network.
Hackers can use this information to possibly gain access to your network so it
is a good idea to turn off the SSID broadcast.
The exception to this is in hotspots where public access is available. Please
note, hotspots make it easy for the user to gain wireless access.
IP Addressing in the Home Network
The ISP will issue an IP address to the router from an available pool
of IP addresses managed by the ISP.
The computers in the home network are issued private IP
addresses.
IP Addressing in the Home Network
3 computers and 1
printer are to be
configured in the star
topology. Each device
in the network will be
assigned an IP address
from the private address
space.
Feature:
Ethernet CAT5 twisted-pair cable Switch
Assembling, Configuring, and Testing the Office LAN
Step 1
Note: In this class and this text, you will function as the network
administrator. The network administrator must know how to
obtain all IP and MAC address information for devices connected
to the network. This requires that the network administrator
keep good documentation of the network.
The MAC and assigned IP address for the devices in the
office LAN.
Step 3
Configure the IP address settings on each computer according
to the list prepared by the network administrator
Once you have verified that the networking devices are physically
connected together, use the ping command to verify that the networking
devices are communicating.
Ping stands for Packet Internet Groper which is a tool within the ICMP
(Internet Control Message Protocol) used to test that a device on the
network is reachable.
Ping - examples
ping 10.10.10.2
Pinging 10.10.10.2 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.