Introduction to Networking Basics
Format: PDF / Kindle (mobi) / ePub
The 2nd edition of Wiley Pathways Networking Basics addresses diversity and the need for flexibility. Its content focuses on the fundamentals to help grasp the subject with an emphasis on teaching job-related skills and practical applications of concepts with clear and professional language. The core competencies and skills help users succeed with a variety of built-in learning resources to practice what they need and understand the content. These resources enable readers to think critically about their new knowledge and apply their skills in any situation.
convert data from one protocol to another. 3.1.2 Identifying Protocols by Role IN ACTION: NETWORK PROTOCOLS Understand where protocols fit in networks. Protocol stack The group of protocols surrounding a data packet that is added and removed as the data stack moves through the layers of the OSI model. Protocol suite A group of network protocols used as a group, like TCP/IP. Most network devices must support at least two protocols, a Data Link layer protocol used for network access and a
Unlike the TCP/IP and IPX/SPX protocol suites, the AppleTalk protocol suite was developed with the OSI model in mind and maps directly to the OSI model. Features and benefits of AppleTalk include ease of addressing and built-in mechanisms for limiting network traffic. The network portion of an AppleTalk address is manually configured by the network administrator, although device numbers are dynamically assigned, using 8 bits or the numbers 1–253. The numbers 0, 254, and 255 are reserved. This
appropriately within the given zone, and prevent other broadcast messages from crowding network traffic. Devices located within an AppleTalk network are assembled into logical zones. These zones block the broadcasts that are sent within the network. Each zone can then be connected to an interface on a router. The router can block the broadcasts, but can provide information about all of the connected zones to the user. In this way, traffic is limited while access is provided to all devices
restricted nor protected by domain security, so workgroups can become a security risk. You might consider using an internal firewall to segregate the workgroup off its own screened subnet as a way of protecting both it and the domain. 128 Chapter 4: Network Architectures IN ACTION: SEGMENTING YOUR HYBRID NETWORK What are the key concerns with segmenting your network? Another justification for separating workgroups is that you don’t want the rest of the domain to be aware of or have access to
systems and to non-PC (and even non-computer) network hardware devices. 5.1 COMPARING PHYSICAL NETWORK TOPOLOGIES Physical topology The layout of the cables connecting the network devices. Logical topology The way in which devices communicate and data is transmitted. Topology The structure of a network. Hybrid topologies Networks that use more than one topology in their physical structure. When implementing a wired network, your network topology determines how you wire your physical cable