« Home « Chủ đề Kĩ thuật mạng

Chủ đề : Kĩ thuật mạng


Có 60+ tài liệu thuộc chủ đề "Kĩ thuật mạng"

Networking: A Beginner’s Guide Fifth Edition- P14

tailieu.vn

If you’re designing a new LAN, generally your best bet is to use Ethernet in a star topology. You’ll find network equipment for this choice is readily available and inexpensive. in fact, the equipment is no longer available.) As noted earlier, for new networks, you should install Cat-5E cable at a minimum, even if you’re initially going to use 100Base-T,...

Networking: A Beginner’s Guide Fifth Edition- P15

tailieu.vn

Coaxial Cable. Many older networks (those built prior to circa 1992) still have coaxial cable installed.. Thin Ethernet cabling is wired in a bus arrangement, where each network segment starts with a terminator that connects to the end of the cable, runs to each node in turn, and ends with another terminator on the other end. The terminators contain special...

Networking: A Beginner’s Guide Fifth Edition- P16

tailieu.vn

Next, use a terminator to close off a large part of the segment and perform the test again. Keep moving the terminator and retrying the test until you discover which part of the cable slows down network performance on the segment. This type of problem is usually caused by a poor connection in one of the male cable-end BNC connectors,...

Networking: A Beginner’s Guide Fifth Edition- P17

tailieu.vn

It’s possible to use a home’s existing telephone wiring to provide a network connection between computers in a home. Some companies offer hardware that lets you network computers through a home’s existing power wiring. Three basic wireless standards are in wide use: 802.11b, 802.11a, and 802.11g. It’s counterintuitive, but in this particular case, 802.11a is a more advanced and faster...

Networking: A Beginner’s Guide Fifth Edition- P18

tailieu.vn

Putting together all the necessary pieces in the proper way is the art of network design. Repeaters operate at the physical layer of the OSI networking model. N Hubs echo all data from each port to all the other ports on the hub. These usually operate at ten times the basic speed of the hub. N Built-in switching, where nodes...

Networking: A Beginner’s Guide Fifth Edition- P19

tailieu.vn

Routers operate at the network layer (layer 3) of the OSI model, and they are far more intelligent than bridges in sending incoming packets off to their destination.. The router can translate from any of the protocols at layers 1 through 3 to any other protocols at layers 1 through 3 (provided the router has been configured and designed to...

Networking: A Beginner’s Guide Fifth Edition- P20

tailieu.vn

M any companies have multiple locations that need to share network. Costs can vary wildly between different technologies, speeds, and other factors (including your location), so you need to rely heavily on cost and availability data from local providers for your own WAN analysis. N How quickly does the data need to be transferred?. N Does the data transfer need...

Networking: A Beginner’s Guide Fifth Edition- P21

tailieu.vn

However, given its heavy past use, and the remote chance that you might run into a system using a POTS connection for some type of data transmission, you should be familiar with it.. (Each bearer channel can carry one voice call at a time.) The third channel, called a data channel, carries call setup information and other overhead communications necessary...

Networking: A Beginner’s Guide Fifth Edition- P22

tailieu.vn

military originally developed and designed X.25 to make military voice traffic available even after a nuclear strike. objective, X.25 is an extremely reliable, secure protocol for transmitting data. All frames (similar to packets) sent over X.25 networks are completely verified from one end of the connection to the other.. In this chapter, you learned about concepts and technologies relating to...

Networking: A Beginner’s Guide Fifth Edition- P23

tailieu.vn

As you can see, most of the Internet services that you might be familiar with actually work through the use of TCP and/or UDP ports, such as HTTP for the Web, SMTP for e-mail, NNTP for Usenet, and so forth. N Version This field indicates the version of the IP protocol being used.. N Header length This field indicates the...

Networking: A Beginner’s Guide Fifth Edition- P24

tailieu.vn

Computer IP Address (Dec Computer IP Address (Bin Subnet mask (Dec . Subnet mask (Bin . The netid of an address, defined by the subnet mask, is whatever portion of the address has a binary 1 set in the corresponding subnet mask. In the preceding example, the netid is the full first three octets (the first 24 bits), and the...

Networking: A Beginner’s Guide Fifth Edition- P25

tailieu.vn

The following are some of the main branches:. If the receiving system knows of the recipient, it acknowledges the request, and then the sending system transmits the body of the message along with any attachments. Each conversation does not use all of the available bandwidth on the line. Add all of this up, and each voice conversation is likely to...

Networking: A Beginner’s Guide Fifth Edition- P26

tailieu.vn

Exploring Directory Services. Directory services work to bring organization to this far-flung network clutter. In this chapter, you learn about what directory services do and how they work. You also learn about the directory services in use today and those slated for use in the near future. With directory services becoming more and more central to the administration of networks,...

Networking: A Beginner’s Guide Fifth Edition- P27

tailieu.vn

You should know about five important directory services: Novell eDirectory, Microsoft’s Windows NT domains, Microsoft’s Active Directory, X.500 Directory Access Protocol, and Lightweight Directory Access Protocol. One thing common to all directory services is a tree-based organization (with the tree usually depicted upside-down with the root at the top), somewhat similar to the organization of directories on a hard disk....

Networking: A Beginner’s Guide Fifth Edition- P28

tailieu.vn

To specify an X.500 address fully, you provide five fields, as in the following:. LDAP’s advocates claim that it provides 90 percent of the power of X.500, but at only 10 percent of the processing cost. (Some other RFCs also describe aspects of LDAP.) The LDAP standard describes not only the layout and fields within an LDAP directory, but also...

Networking: A Beginner’s Guide Fifth Edition- P29

tailieu.vn

You also need to know about another important type of network connection: remote access to a network. With today’s travel-happy corporate cultures, and with companies needing to support such things as working from home and small remote offices, remote access has become more important than ever. One of the big problems with remote access is that it can seem as...

Networking: A Beginner’s Guide Fifth Edition- P30

tailieu.vn

Or you can find different solutions that are consistent with the amount of bandwidth you can offer.. You can estimate a particular application program’s bandwidth requirements by actually measuring the amount of bandwidth that application uses. On the LAN, you can monitor the amount of data being sent to a particular node that uses the application in the way it...

Networking: A Beginner’s Guide Fifth Edition- P31

tailieu.vn

ISDN users, on the other hand, have the choice of either connecting to an ISDN-capable ISP or to ISDN “modems” hosted on the LAN. A VPN connection is carried over a shared or public network—which is almost always the Internet. VPN connections cost much less than dedicated connections, such as the WAN technologies discussed in Chapter 7, because they take...

Networking: A Beginner’s Guide Fifth Edition- P32

tailieu.vn

shows a typical login screen after browsing to the SSL VPN’s URL. N Through user names and passwords defined in the SSL VPN for each user.. Choosing this option lets remote users use their normal network user name and password, and the SSL VPN then integrates with the preexisting authentication system on the network.. N Access to a remote node...

Networking: A Beginner’s Guide Fifth Edition- P33

tailieu.vn

Having said that, network security is one of the most important jobs facing any network administrator. Good network security helps prevent the following:. N Company secrets, such as proprietary designs or processes, falling into the wrong hands (both internally and externally). N Loss of use of the network itself or any part of the network N Corruption or inappropriate modification...