Thursday, June 6, 2019
Ethernet system Essay Example for Free
Ethernet system EssayRobert Metcalfe with his colleagues at the Xerox Palo alto explore Center (PARC) developed the experimental Ethernet system. According to OReilly and associates (2000) the main purpose of developing the Ethernet system is to interconnect a personal workstation with graphical user interface c every last(predicate)ed Xerox Alto. The experimental system was use in order to connect Altos and also printers and servers. The systems interfaces signal clock was patterned in the Altos system clock. This resulted to 2. 94 Mbps. data transmission rate on the experimental Ethernet. Ethernet was origin solelyy known as Alto ciao Ne twainrk. Alto Aloha Network was changed its name to Ethernet by Metcalfe to indicate that the system not only pay Altos but also new(prenominal) computers. And Metcalfe also focalize out that the Ethernet has progressed way beyond the Aloha system. He chose the name ether as to describe the es displaceial feature of the system which is t he physical medium carries bits to all stations the same way as the aluminiferous ether was once believe to proliferate There ar two ways which drive out be used to allocate the capacity of transmission media baseband and broadband transmissions.Baseband transmission allocates the entire capacity of the medium to one confabulation channel. It uses distinct values by measuring rod the voltage in wire which only carried one signal at a time. In broadband transmission, the system allows two or more communication channels to constituent the bandwidth of the communication medium. The system uses the technique of dividing the bandwidth into frequency bands which is bellyacheed frequency division multiplexing (FDM) which works only with analog signals. There is also another technique called time-division multiplexing (TDM) that supports digital signals.Figure 1, show the difference betwixt baseband and broadband transmission mode of operation Figure 1. Difference in the mode of ope ration among baseband and broadband Broadband transmission is used in the web hosting companies. This is because of the higher speeds of the broadband. With the use of broadband, people can enjoy the full range of lucre serve like downloading videos, music, watching movies and plying online games. Transceivers have contrasting speeds which are measured in MHz and also specified in wavelengths.The larger the value of the fiber fondness of the transceivers, measured in microns, there will be more bandwidth possible but also the outgo will be shorter. The 1000 Base-LX is the long wavelength with a signaling speed of 1. 25100 ppm GBd. This transceiver can use both 62. 5 and 50 micron multimode fiber and it also uses single-mode fiber optic cables with distances of 440m, 550m and 5 km. Another transreceiver is the 100 Base-TX which uses 4B5B binary encoding to encode 100 Mbps data stream in a signal of 125 MHz. oneness pair is used for transmitting data while the other pair is use d for receiving the data.Given this, one user can setup a system for full semidetached house communication given that there are only interfaces in the same collision domain. It is either the two computers are directly committed to each other by crossover cable or a computer directly connected to a switch. Full duplex communication result to doubling the potency throughput but not often reached more than the modest improvement. Based on Sheldon and Big Sur Multimedia (2001), link aggregation is the wreak of connecting together two or more data channels in order to become a single channel which appears as a single, higher-bandwidth logical link.Also this aggregate links can provide redundancy and fault tolerance if the links follow different physical path. By linking the digital lines, the link aggregation improves the adit to public networks. The aggregation is also use in enterprise network to build multigigabit backbone links. It also allows the networks backbone speed to sta rt increasingly when the demands on the network increases without replacing everything and buy new and expensive hardware.Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol was intend for local anaesthetic area network (LAN) environments where in all the nodes are positioned few hundred feet from each other. The importance of the protocol is to listen up each node to the channels in a short period of time before it transmits. The main assumption of the protocol is that each node should be able to detect the transmission from every other station. But this assumption is violated in nettle network and this resulted to several problems. One of the serious problems encountered is the hidden transmitter problem.This occurs when the CSMA/CA cannot function properly due to a wireless node cannot hear one or more of the other nodes. And when this happen, multiple nodes attempt to transmit their data simultaneously over the shared data thus resulting to interference with each other. To address the hidden transmitter problem, the 802. 11 quantity uses the protocol request to confide/clear to send (RTS/CTS). Before transmitting each packet, each node transmit an RTS packet to other nodes to warn them that it is about to transmit data and later on each transmission, it broadcasts CTS packet.This process is time and bandwidth consuming process and it is required for each and every transmission by each and every wireless node. But this process sill does not address the hidden transmitter problem fully because RTS/CTS packets are subjected to repeated collisions. In most applications, the wireless al-Qaedaard 802. 11b operating at 2. 4 ghz is ample enough. This wireless standard is the mostly widely accepted standard among the three wireless standards and also the price of the equipment is the cheapest because of the rising demand for the 802.11g. Its distance will rely mostly on the communicating devices whether it have line of site or not. And with fewer obstacles among the transmitting and receiving devices, there will be break dance wireless connection and therefore much better web surfing. The 802. 11b wireless standard is good enough if development wireless route or access point only for internet usage because the connection to internet via broadband modem operates about 2mbps which is very fast. The 802. 11b assign data at the rate of 11mbps which is sufficient for internet usage.This device saves money on equipment and gives great web surfing services. Another wireless standard being used is the 802. 11g standard. It is replacing the widely accepted standard which is the 802. 11b because both operate on the same frequency and the price drastically goes down on products. This standard is much very similar to 802. 11b because it also commonly needs a line of site to achieve optical performance. Both standards, 802. 11b and 802. 11g operate at the same frequency range of 2. 4ghz and are inter-operable with each ot her. totally the devices of 802. 11g can communicate with 802.11 devices and the main advantage of the 802. 11g devices is that when transferring files betweens computers or networks, it is usually at a greater speed. It is recommended to use 802. 11g when using wireless connection to transfer files (data files, voice, music, and videos) around the home and office. 802. 11g standard also allows manufacturers to developed devices which work at speed of up to 108mbps because it recommended when transferring large data or audio files within LAN. Wi-Fi saved Access (WPA) is a security technology that is used in wireless network.This was created by an industry trade group called the Wi-Fi Alliance which owns the trademark for the name Wi-Fi and certifies products that take in the name. WPA was created in order to response on the serious weaknesses of the previous system, the Wired Equivalent Privacy (WEP) and also to improve the credential and computeion features of the WEP. It imple ments majority of the IEEE 802. 11i and think to take place the place of WEP. It was designed in order to work with all wireless network interface cards but not with offset generation wireless access point.Temporal Key Integrity Protocol (TKIP) is one of the keystone technologies behind WPA which deals with the encryption weaknesses of the WEP. Also the WAP have built-in authentication which is a key component. The WAP uses the RC4 stream cipher which has a 128-bit key and a 49-bit initialization vector (IV). With the combination of the TKIP and the RC4 stream cipher this solves the problem of key retrieval attacks which was found in WEP. In addition, the WPA provides much improved payload integrity.WPA uses a more secured message authentication code (MAC) but also termed as MIC which stand for message integrity code which is an algorithm Michael. MIC includes a frame counter preventing replay attacks. With the features of the WPA like having increased size of the keys and IVs, r educed number of packets sent with related keys and adding up of a secured message verification system, it is far more difficult to break in within the system. There is one variation in WPA which is called the WPA pre shared key (WPA-PSK), which is also known as personal mode.This was designed for home and small office usage and networks which cant afford the live and complexity of the 802. 1X authentication server. To access the network, the user must enter a pass phrase, with 8 to 63 printable ASCII characters or 64 hexadecimal digits. This can be stored in the users computer with discretion under most operating system in order to avoid re-entry and must keep in the Wi-Fi access point. Protected Extensible Authentication Protocol (PEAP) securely transmits authentication culture which includes password, over wired and wireless network.It is also an 802. 1x authentication pillow slip for wireless LANs. The PEAP is created by the Cisco Systems, Microsoft and RSA Security which is base on the Internet Draft submitted to the IETF. (Cisco Systems, 2007) The system uses only server side public key certificates which authenticate clients by creating encrypted SSL/TLS tunnel in between client and authentic server. This protects from casual inspection the resulting exchange of authentication. According to the Cisco Systems Inc. , the following are classic benefits of the PEAP web security system It relies on the Transport Layer Security (TLS) which allow non-encrypted authentication types (EAP-Generic Token Card and One Time Password (OTP)) support It uses the server-side Public-Key Infrastructure (PKI) based digital certification authentication It allows for the authentication to an extended suite of directories which include Lightweight Directory Access Protocol (LDAP), Novell NDS and OTPA databases It uses the TLS in order to encrypt all the user-sensitive authentication information It supports the password change at expiration It does not display the logo n username in the EAP identity response The system is not supersensitised to dictionary attacks It offer dynamic privacy protection while using in combination with Temporal Key Integrity Protocol (TKIP) or the ripe Encryption Standard (AES) Also the PEAP have enterprise benefit. Based on the Cisco System Inc. , PEAP is based upon the server-side EAP-TLS. This means that organization can avoid the bring on associated in the installing of digital certificates on every client machine which is required by the EAP-TLS.This provides the enterprise to choose what method of client authentication depending on their needs. PEAP authentication work in two phases ? In phase 1, performing the server-side TLS authentication will result to creation of an encrypted tunnel and will achieve server-side authentication. One the process is done the data are encrypted with all the user-sensitive information ? For phase 2 according to the Cisco System Inc. , the client is authenticated by using metho ds like the EAP-GTC and the Microsoft Challenge Authentication Protocol (MS-CHAP)Public switched knell network (PSTN) is referred as the public communication providing local, extended and long distance call think service. It is composed of ring exchanges arranged in order to have nationwide telephone communication system. The system is open for those who can afford the service. Packets, pieces of the callers conversation are switched and then sent simultaneously to many connections to reach a receiver in the other end. All the phones in PSTN are connected in a way that any phone can call to any other phone due to all the local phone systems are connected to each other.Mitchell (2007) cited that PSTN provides the traditional Plain Old Telephone Service (POTS) to establishments and residences and also some parts of the PSTN are being utilized for DSL, VoIP and other internet-based network. In much relation to internet, this provides much of the internets long-distance infrastructur e. Internet service providers (ISP) pay the long distance provider for the access to their infrastructure and they share the circuits among users in the process called packet switching.PSTN network link supports 64 kbps and in residences the PSTN phone lines carrying the bandwidth is made up of copper cable. Dial-up modems utilize 56kbps of the bandwidth when they are connected to a phone line. Also the PSTN utilizes the SS7 signaling protocol. SS7 signaling protocol support the exchange of special-purpose messages on public telephone networks. SS7 messages pass over separate channel different from the channel used for voice communication and it is referred as out of band signaling. Wireless local loop is sometimes called radio in the loop (RITL) or fixed radio access (FRA).It is a system that connects users and subscribers to the public switched telephone network (PSTN) by the use of radio signals as substitute for copper for all part of the connection between subscriber and the s witch. This includes cordless access systems propriety fixed radio access and fixed cellular systems. One of the advantages of the wireless local loop is that it can be deployed in just weeks or months in comparison with copper wire systems which took months and years for the deployments. The instillation of the wireless local loop considerately has much lower construction cost than laying copper lines.The maintenance and operations of the wireless local loop are that easy and the total maintenance time per subscriber is shorter by 3 to 4 times. Signaling is the exchange between information which concerns about the establishment and in the control of a connection and the management of the network. There are many types of signaling In-band signaling pertains to the exchange of signaling information within the same channel of the telephone call Out-of-band signaling is telecommunication signaling meaning exchange of information to control telephone call.It is done over a channel an d it separates from channels which is use for telephone call. This signaling is used by Signaling system 7, the signaling standard controlling the worlds phone calls Line signaling is much pertain in transmitting information on the state of line or channel Register signaling is focused on the transmittance of information in the calling/ called telephone number Channels-associated signaling utilizes signaling channels dedicating to a specific bearer channel Common-channels signaling, utilizes signaling channels which transmit signaling information to multiple bearer channels. Compelled signaling pertains to the need of the receive signal to be fully acknowledged before the next signal is sent. Subscriber signaling pertains to the telephone and the telephone exchanges Trunk signaling pertains to the exchange.References Buis, Paul. (1996, folk). Common 100 Mbps Hardware Variations. Ethernet TechnologyUnderlying Technologies. (Chapter 4). calld September 16,2007 from http//www. cs. bsu. edu/homepages/peb/cs637/ethernet/100mbps. htm Computer Hope. (2007). Ethernet. Retrieved September 16,2007 from http//www. computerhope. com/jargon/e/ethernet. htm ETSTechNEWS.What is the difference between 802. 11g and 802. 11b? Retrieved September 17, 2007 from http//web. monroecc. edu/ETSTechNEWS/80211g Fleishman, Glenn. (2003, November 4). Weakness in Passphrase Choice in WPA Interface. Retrieved September 17,2007 from http//wifinetnews. com/archives/002452. html GNS Wireless LLC. 802. 11a vs. 802. 11b vs. 802. 11g. 2007. Retrieved September 16, 2007 from the http//www. gnswireless. com/AvsBvsG. htm Laverty, Denis. WPA vs. WEP How your Choice Affects your Wireless Network Security. Retrieved September 16,2007 from http//www. openxtra. co. uk/articles/wpa-vs-wep. php McLauren, Bruce. (1998).Cabling Options. How Gigabit Ethernet works. Retrieved September 15,2007 from http//misnt. indstate. edu/coutinho/ge/WORKS. HTM Mitchell, Bradley. Wireless/networking WPA Wi-Fi Prote cted Access. Retrieved September 16,2007 from http//searchnetworking. techtarget. com/sDefinition/0,,sid7_gci214316,00. html Ou, George. (2005,June 2). Understanding the updated WPA and WPA2 standards. Message posted to http//blogs. zdnet. com/Ou/index. php? p=67 Pidgeon,Nick. Introduction to how Ethernet Works. The Ethernet. Retrieved September 16,2007 from http//computer. howstuffworks. com/ethernet. Sheldon, Tom.Link Aggregation. The Encyclopedia of Networking and Telecommunications. Retrieve September 16,2007 from http//www. linktionary. com/l/link_aggregation. html Spurgeon, Charles E.. (2000). Why is it called Ethernet?. Ethernet The Definitive Guide. Retrieved September 16,2007 from http//www. ethermanage. com/ethernet/ethername. html ICT Global. What is Ethernet?. Ethernet FAQ. Retrieved September 16,2007from http//www. ictglobal. com/ICT010/faq1. html Networking Essentials. Band Usage (Baseband or Broadband). Retrieved September 17,2007 from http//www. measureup. com/testob jects/MS_NetEss/5a67289. htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.