Monday, June 12, 2017

Topic 7: Wireles Network Hardware

Wireless Router

is a device in a wireless local area network (WLAN) that determines the next network point to which a packet should be forwarded toward its destination.

Wireless AP

is a hardware device or configured node on a local area network (LAN) that allows wireless capable devices and wired networks to connect through a wireless standard, including Wi-Fi or Bluetooth


Wireless Print Servers

are small devices (they look like mini routers) that have a USB port. You just have to connect the printer to this wireless print serverusing a regular USB cable and the printer will then become available to all other computers in yourwireless network.

Wireless Range Extender

is a type of wireless repeater used to expand the reach of a wireless LAN. (also called range expander)


identify where to effectiveley set up acess point?

Step 1: Log into the router’s web-based management page
Step 2: Configure WAN Connection TypeOn the router’s management page, click Network > WAN on the left of the web page:Change the WAN Connection Type to PPPoE.
Step 3: Enter your PPPoE username and password which are provided by your ISP.

Step 4: Click Save to save your settings, then the router will connect to Internet after a while.
Step 5: Wait for a few minutes and check the WAN part on the Status page, if it shows any IP address (similar as below), that means the connection between the Router and the Modem is established.


Step 6: If there is not wan IP address and no internet access, please do a Power Cycle as the below:1.  Turn the DSL modem off first, then turn your router and computer off, and leave them off for about 2 minutes;2.  Turn the DSL modem on first, wait till the modem gets ready, then turn the router and your computer back on. 


how to secure wireless network?

  • Open your router setting page
  • Create a unique password on your router
  • Change network SSID name
  • Enable network encryption
  • Filter mac address
  • Reduce the range of wireless signal
  • Upgrade router firmware

Identify the steps troubleshooting network:

-Workstation issues

Step 1
Check the workstation cable to the wall and the network adapter. The patch cables running between the plug and the workstation may be out of socket. Check the link between the plug and the wiring closet as its common for new cabling installation to bump and loosen old cabling. Also, adding a card to one slot may loosen cards in other slots. Patch cables can loosen the adapters when tugged.

Step 2
Verify that the port on the wiring concentrator is working. Switch the connection (in which problem has occurred) with a good connection into a reliable port.

Step 3
Check the frame type. The default frame type for early versions of NetWare 4 was not Ethernet (as in NetWare 3). Thus, many managers forget to check the frame type when upgrading the system.

Step 4
Check for a locked account. Due to the use of intruder detection systems, stations get locked out of the network if too many unsuccessful login attempts have been made.

Step 5
Verify that all the workstation files were loaded properly. Some changes in the workstation use network memory and error messages are, at times, so fast that they are missed by users.

Step 6
Check timeout values for WAN links. WAN links are less reliable than LAN links and take longer time. Some workstations may timeout before reaching the remote server or getting authenticated properly. In this case, increase the SPX timeout value.

Step 7
Check hubs & routers. Wiring hubs rarely fail. They may become unplugged though. Check if the computers connected to a hub are able to communicate. If routers are flaky on a port, then reset the port.

Step 8
Verify that the server sees the workstation request. Use the TRACK ON command to monitor the requests.

Step 9
If none of the above solutions work, reboot the workstation.

-Workstation issues

Check the workstation cable to the wall and the network adapter. The patch cables running between the plug and the workstation may be out of socket. Check the link between the plug and the wiring closet as its common for new cabling installation to bump and loosen old cabling. Also, adding a card to one slot may loosen cards in other slots. Patch cables can loosen the adapters when tugged.

Verify that the port on the wiring concentrator is working. Switch the connection (in which problem has occurred) with a good connection into a reliable port.
Check the frame type. The default frame type for early versions of NetWare 4 was not Ethernet (as in NetWare 3). Thus, many managers forget to check the frame type when upgrading the system.

Check for a locked account. Due to the use of intruder detection systems, stations get locked out of the network if too many unsuccessful login attempts have been made.

Verify that all the workstation files were loaded properly. Some changes in the workstation use network memory and error messages are, at times, so fast that they are missed by users.

Check timeout values for WAN links. WAN links are less reliable than LAN links and take longer time. Some workstations may timeout before reaching the remote server or getting authenticated properly. In this case, increase the SPX timeout value.

Check hubs & routers. Wiring hubs rarely fail. They may become unplugged though. Check if the computers connected to a hub are able to communicate. If routers are flaky on a port, then reset the port.

Verify that the server sees the workstation request. Use the TRACK ON command to monitor the requests.

If none of the above solutions work, reboot the workstation.

-Access point issues

    • Click Start-> Settings -> Control Panel.
    • Double-click Network Connections.
    • Right-click the wireless connection and click Properties.
    • Click Configure.
    • Click the Advanced tab.
    • Select the Power Management setting, uncheck Default / Auto.

-Server/infrastructure issues

  • Find the kind of error returned 
  • Check if the website is available elsewhere OS attack (I hope not so).
  • Disable Dynamic Sections 
  • Check if the DNS is properly configured
  • Find if It’s really a problem with iWeb 
  • Check the system status page 
  • Assess if you can solve yourself the problem
  • File a ticket 
  • Be descriptive in your ticket.


Reference:

SearchMobileComputing. (2017). What is wireless router? - Definition from WhatIs.com. [online] Available at: http://searchmobilecomputing.techtarget.com/definition/wireless-router [Accessed 9 Jun. 2017].


Techopedia.com. (2017). What is a Wireless Access Point (WAP)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/13538/wireless-access-point-wap [Accessed 9 Jun. 2017].


Labnol.org. (2017). How to Turn your Wired Printer into a Wireless Printer. [online] Available at: https://www.labnol.org/gadgets/make-wired-printer-wireless/12639/ [Accessed 9 Jun. 2017].


SearchMobileComputing. (2017). What is Wi-Fi range extender (range expander)? - Definition from WhatIs.com. [online] Available at: http://searchmobilecomputing.techtarget.com/definition/Wi-Fi-range-extender [Accessed 9 Jun. 2017].


Kb.intellinet-network.com. (2017). Intellinet Knowledge Base - How do I resolve wireless connection issues?. [online] Available at: http://kb.intellinet-network.com/index.php?action=artikel&cat=7161&id=56&artlang=en [Accessed 9 Jun. 2017].



Sunday, June 4, 2017

CN Topic 6 Routing Protocols

Routing Protocols

A generic term that refers to a formula, or protocol, used by a router to determine the appropriate path over which data is transmitted. 

The routing protocol also specifies how routers in a network share information with each other and report changes. 

The routing protocol enables a network to make dynamic adjustments to its conditions, so routing decisions do not have to be predetermined and static.


Differences between Interior Gateway Protocols and Exterior Gateway Protocols.

Interior Gateway Protocol (IGP) is a Routing Protocol which is used to find network path information within an Autonomous System.
Examples: RIP, OSPF, and IGRP.

Exterior Gateway Protocol (EGP) is a Routing Protocol which is used to find network path information between different Autonomous Systems. Exterior Gateway Protocol (EGP) is commonly used in the Internet to exchange routing table information. There is only one Exterior Gateway Protocol (EGP) exists now and it is Border Gateway Protocol (BGP).
Examples: Border Gateway Protocol (BGP) for IP.

References:

Webopedia.com. (2017). What is routing protocol? Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/R/routing_protocol.html [Accessed 5 Jun. 2017].


Omnisecu.com. (2017). Difference between Interior Gateway Protocol (IGP) and Exterior Gateway Protocol (EGP). [online] Available at: http://www.omnisecu.com/cisco-certified-network-associate-ccna/difference-between-igp-and-egp.php [Accessed 5 Jun. 2017].




Monday, May 22, 2017

CN: Topic 6 Server

List all the different types of specialist server you can think of or find via the internet and books (e.g. mail server). Briefly describe each one

Application Servers
An application server is a type of server designed to install, operate and host applications and associated services for end users, IT services and organizations. It facilitates the hosting and delivery of high-end consumer or business applications, which are used by multiple and simultaneously connected local or remote users.
Communication Servers
A communications server is a computing system platform that is used for various network communication applications and allows vendors to add multiple values at different levels of architecture.

Domain controllers/directory Servers
A domain controller (DC) is a server that responds to security authentication requests within a Windows Server domain. It is a server on a Microsoft Windows or Windows NT network that is responsible for allowing host access to Windows domain resources.

Fax Servers
A fax server is a system capable of receiving incoming faxes, sending faxes and distributing faxes over a computer network. Software applications for most operating systems are also available to make a computer in a network act as a fax server. The incoming fax messages can be stored in any printable file format such as graphics or word processing. A fax server helps in reducing the number of dedicated fax lines needed in an environment or organization.

File Servers
In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive.

Print Servers
A print server is a computer that can process print-related jobs on a network of computers. Print servers are connected to a computer network in order to serve the need for printing jobs in a network that may contain more than one printer. A print server usually allows users in a computer network to perform a printing job without having to move files to the computer connected directly to the printer.Also known as printer server or network printer, (although the latter is actually one of the properties of the print server).

Mail Servers
An email server, or simply mail server, is an application or computer in a network whose sole purpose is to act as a virtual post office. The server stores incoming mail for distribution to local users and sends out outgoing messages. This uses a client-server application model to send and receive messages using Simple Mail Transfer Protocol (SMTP).

Web Servers
A Web server is a system that delivers content or services to end users over the Internet. A Web server consists of a physical server, server operating system (OS) and software used to facilitate HTTP communication.
A Web server is also known as an Internet server.


Reference:

Techopedia.com. (2017). What is an Application Server? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/432/application-server [Accessed 23 May 2017].


Techopedia.com. (2017). What is a Communications Server? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/18429/communications-server [Accessed 23 May 2017].


Techopedia.com. (2017). What is a Domain Controller? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/4193/domain-controller [Accessed 23 May 2017].


Techopedia.com. (2017). What is a Fax Server? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/15227/fax-server [Accessed 23 May 2017].


Techopedia.com. (2017). What is a Print Server (PSERVER)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/3619/print-server-pserver [Accessed 23 May 2017].


Techopedia.com. (2017). What is an Email Server (MTA)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/1660/email-server [Accessed 23 May 2017].


Techopedia.com. (2017). What is a Web Server? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/4928/web-server [Accessed 23 May 2017].


SearchNetworking. (2017). What is file server? - Definition from WhatIs.com. [online] Available at: http://searchnetworking.techtarget.com/definition/file-server [Accessed 23 May 2017].

Thursday, May 4, 2017

CN Topic 3: Wireless Network

Explained wireless network and Wifi identify the advantages of wireless network.

Wireless networks are computer networks that are not connected by cables of any kind.

Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.

Advantages of a Wireless Network


  •  Users can move around freely within the area of the network with their laptops, handheld devices etc and get an internet connection.
  • Users are also able to share files and other resources with other devices that are connected to the network without having to be cabled to a port.
  • Not having to lay lots of cables and put them through walls etc. can be a considerable advantage in terms of time and expense. It also makes it easier to add extra devices to the network, as no new cabling is needed.
  • If you are a business such as a cafĂ©, having a wireless network that is accessible to customers can bring you extra business. Customers generally love wireless networks because they are convenient.
  • Wireless networks can sometimes handle a larger amount of users because they are not limited by a specific number of connection ports.
  • Instant transfer of information to social media is made much easier. For instance, taking a photograph and uploading it to Facebook can generally be done much quicker with wireless technology.

List all of the wireless devices in your home and college. Briefly explain the purpose of each the purpose of each device

Smartphone - its is used to surf internet
Laptops - it is used to surf internet
Computers - it is used to surf internet
Printers - its is connected with another device


research the IEEE 802.11g and 802.11n standards. Explain the key points of each standard including the data rates & make comparison between the two standards.

The 802.11g specification is a standard for wireless local area networks (WLANs) that offers transmission over relatively short distances at up to 54 megabits per second (Mbps).

802.11n is a specification for wireless LAN (WLAN) communications. 802.11n, an addition to the 802.11 family of standards, will increase wireless local area network(WLAN) speed, improve reliability and extend the range of wireless transmissions.

Differences 802.11g and 802.11n
802.11a:
    • Operates in the 2.4GHz radio spectrum.
    • Speed: Up to 54Mbps
    • Range: 100 feet
    • Prone to interference (it shares airspace with cell phones, Bluetooth, security radios, and other devices).
802.11a:
    • Operates in the 2.4 or 5GHz radio spectrum
    • Speed: Up to 700Mbs
    • Range: 50 feet
    • Because 802.11b and 802.11g use the same radio technologies and portions of the spectrum, they are compatible with one another. But because the 802.11n standard has yet to be ratified by WECA, it may not be completely compatible with 802.11b and 802.11g.

Explain the different wireless network security risks and give the possible solution in order to avoid these risks.

·        Modulation Spectrum Technique:  The technique of spectrum modulation which wads used in the early technology of WiFi has very low security that anyone can use your network and hack your code of activity.
Solution: The solution which scientist suggest for this problem is that we can use latest model or technology of modulation spectrum to protect the WiFi fro such problem.

·        Change Default Passwords: Some hackers also hack your default password that was assign by manufacturers. Hackers used all the default passwords and hack your WiFi network.
Solution: When you use the WiFi system you should change the default password as soon as possible and set a new password of your choice.

·        Wireless Equivalent Privacy (WEP): Some people also suggest for using Wireless Equivalent Privacy WEP to have a secure working on WiFi network. Sometimes it is very insecure to use WEP technology because it is very easy to break the encryption of WEP.
Solution: This security problem of WiFi can be reduced by upgrading the wireless encryption to Virtual Private Network (VPN).

·        Crackers: One of the major problems of WiFi security are crackers.
Solutions:  We can prevent the crackers by using the no. of methods of recovery of WiFi security such as placement of access points in the desired area, as WiFi is the combination of both wireless and the wired devices so, by dividing the both portions in the different segments we can avoid such problem of crackers.

·        Service Set Identifier (SSID):
Another major security problem of WiFi security is breaking of service set identifier SSID. It is very easy and convenient to break the service set identifier SSID by anyone with the help of any kind of sniffing tool.
Solution: This problem of WiFi can be overcome by using the encryption technology such as RADIUS etc. By applying encryption of data we can protect our SSID.

Find at least 4 wireless networking protocols and explained each examples.

Bluetooth is a telecommunications industry specification that describes how mobile phones, computers and personal digital assistants (PDAs) can be easily interconnected using a short-range wireless connection. 
Ultra wideband (also known as UWB or digital pulse wireless) is a wireless technology for transmitting large amounts of digital data over a wide spectrum of frequency bands with very low power for a short distance (up to 230 feet) and carrying signals through doors and other obstacles that tend to reflect signals at more limited bandwidths and a higher power.
WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices can be used for Internet access. Designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN, Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wi-Fi standard, 802.11. Another security standard for users of computers equipped with Wi-Fi wireless connection is Wi-Fi Protected Access (WPA). It is an improvement on, and is expected to replace, the original Wi-Fi security standard, WEP.
802.11 is an evolving family of specifications for WLANs developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE). There are several specifications in the family, and new ones are occasionally added.

Reference:

Techopedia.com. (2017). What is Wireless Network? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/26186/wireless-network [Accessed 2 May 2017].


Webopedia.com. (2017). What is Wi-Fi (Wireless Networking)? Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/W/Wi_Fi.html [Accessed 2 May 2017].


TurboFuture. (2017). Wireless Network vs Wired Network: Advantages and Disadvantages. [online] Available at: https://turbofuture.com/computers/Wireless-Network-vs-Wired-Network-Advantages-and-Disadvantages [Accessed 5 May 2017].


SearchMobileComputing. (2017). What is 802.11g? - Definition from WhatIs.com. [online] Available at: http://searchmobilecomputing.techtarget.com/definition/80211g [Accessed 5 May 2017].


SearchMobileComputing. (2017). What is 802.11n? - Definition from WhatIs.com. [online] Available at: http://searchmobilecomputing.techtarget.com/definition/80211n [Accessed 5 May 2017].


Att.com. (2017). Differences between 802.11a, 802.11b, 802.11g and 802.11n. [online] Available at: https://www.att.com/support_static_files/KB/KB3895.html [Accessed 5 May 2017].


SearchNetworking. (2017). Wireless protocols learning guide. [online] Available at: http://searchnetworking.techtarget.com/tutorial/Wireless-protocols-learning-guide [Accessed 5 May 2017].




Wednesday, April 26, 2017

CN summary topic 2

IP (Internet Protocols) Address
is an identifier for a computer or device on a TCP/IP network.

The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. For example, 1.160.10.240 could be an IP address.

Class A - supports 16 million hosts on each of 126 networks
Class B - supports 65,000 hosts on each of 16,000 networks
Class C - supports 254 hosts on each of 2 million networks


Subnet
A portion of a network that shares a common address component.

Subnet Mask
is a mask used to determine what subnet an IP address belongs to.

NIC (Network Interface Card)
is an expansion board you insert into a computer so the computer can be connected to a network.

Monday, April 24, 2017

Computer Network

Differences between MAC and IP address.

IP address - is the address assigned to your mobile,printer or computer by the network that uses Internet protocol for communication . IP can change with the change in network.

MAC(Media Access Control) address - is your machine address. MAC address cannot be changed (Fixed address). The device will have communication with the local area network or any network using this address .



An IP Address header Sections:

Version—A 4-bit field that identifies the IP version being used. The current version is 4, and this version is referred to as IPv4.

Length—A 4-bit field containing the length of the IP header in 32-bit increments. The minimum length of an IP header is 20 bytes, or five 32-bit increments. The maximum length of an IP header is 24 bytes, or six 32-bit increments. Therefore, the header length field should contain either 5 or 6.

Type of Service (ToS)—The 8-bit ToS uses 3 bits for IP Precedence, 4 bits for ToS with the last bit not being used. The 4-bit ToS field, although defined, has never been used.
IP Precedence— A 3-bit field used to identify the level of service a packet receives in the network.

Differentiated Services Code Point (DSCP)—A 6-bit field used to identify the level of service a packet receives in the network. DSCP is a 3-bit expansion of IP precedence with the elimination of the ToS bits.

Total Length—Specifies the length of the IP packet that includes the IP header and the user data. The length field is 2 bytes, so the maximum size of an IP packet is 216 – 1 or 65,535 bytes.

Identifier, Flags, and Fragment Offset—As an IP packet moves through the Internet, it might need to cross a route that cannot handle the size of the packet. The packet will be divided, or fragmented, into smaller packets and reassembled later. These fields are used to fragment and reassemble packets.

Time to Live (TTL)—It is possible for an IP packet to roam aimlessly around the Internet. If there is a routing problem or a routing loop, then you don't want packets to be forwarded forever. A routing loop is when a packet is continually routed through the same routers over and over. The TTL field is initially set to a number and decremented by every router that is passed through. When TTL reaches 0 the packet is discarded.

Protocol—In the layered protocol model, the layer that determines which application the data is from or which application the data is for is indicated using the Protocol field. This field does not identify the application, but identifies a protocol that sits above the IP layer that is used for application identification.

Header Checksum—A value calculated based on the contents of the IP header. Used to determine if any errors have been introduced during transmission.

Source IP Address—32-bit IP address of the sender.

Destination IP Address—32-bit IP address of the intended recipient.


Options and Padding—A field that varies in length from 0 to a multiple of 32-bits. If the option values are not a multiple of 32-bits, 0s are added or padded to ensure this field contains a multiple of 32 bits.


IP Address Classes


ClassAddress RangeSupports
Class A1.0.0.1 to 126.255.255.254Supports 16 million hosts on each of 127 networks.
Class B128.1.0.1 to 191.255.255.254Supports 65,000 hosts on each of 16,000 networks.
Class C192.0.1.1 to 223.255.254.254Supports 254 hosts on each of 2 million networks.
Class D224.0.0.0 to 239.255.255.255Reserved for multicast groups.
Class E240.0.0.0 to 254.255.255.254Reserved for future use, or Research and Development Purposes.

IPv4 public address and IPv6 private address

IP version 4 public address (IPV4)
is a public IP address is the address that is assigned to a computing device to allow direct access over the Internet. 

IP version 6 private address (IPV6)
is a private IP address is the address space allocated by InterNIC to allow organizations to create their own private network.

Difference IPV4 and IPV6

IPv4 used to to identify devices on a network through an addressing system. it is also designed for use in interconnected systems of packet-switched computer communication networks

IPv6 is designed to allow the Internet to grow steadily, both in terms of the number of hosts connected and the total amount of data traffic transmitted.




Difference TCP and UDP


Image result for differences TCP and UDP



Subnet and Subnet Addressing


A subnet (short for "subnetwork") is an identifiably separate part of an organization's network. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network (LAN).Subnet addressing allows us to split one IP network address into smaller multiple physical networks known as subnetworks. Some of the node numbers are used as a subnet number instead.


VLSM


A Variable Length Subnet Mask (VLSM) is a numerical masking sequence, or IP address subset, based on overall network requirements. A VLSM allows a network administrator to use long masks for networks with few hosts and short masks for networks with multiple hosts. A VLSM is used with a VLSM router and must have routing protocol support.



Reference:

SearchNetworking. (2017). What is subnet (subnetwork)? - Definition from WhatIs.com. [online] Available at: http://searchnetworking.techtarget.com/definition/subnet [Accessed 20 Apr. 2017].


Parkhurst, W. (2017). IP Header Format > Internet Addressing and Routing First Step. [online] Ciscopress.com. Available at: http://www.ciscopress.com/articles/article.asp?p=348253&seqNum=4 [Accessed 20 Apr. 2017].



Webopedia.com. (2017). What is The Difference Between IPv6 and IPv4? - Webopedia.com. [online] Available at: http://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html [Accessed 20 Apr. 2017].

Iplocation.net. (2017). What is the difference between public and private IP address?. [online] Available at: https://www.iplocation.net/public-vs-private-ip-address [Accessed 20 Apr. 2017].

Sunday, April 16, 2017

Computer Network Topic 2 Lecture 2

OSI Model Protocols:
Application Layer
-DHCP (Dynamic Host Configuration Protocol)
is a protocol for assigning dynamic IP addresses to devices on a network.

-FTP (File Transfer Protocol)
is a standard Internet protocol for transmitting files between computers on the Internet over TCP/IP connections.

-SMTP (Simple Mail Transfer Protocol)
is the standard protocol for sending emails across the Internet.

-POP3 (Post Office Protocol version 3)
is a standard mail protocol used to receive emails from a remote server to a local email client.

-IMAP (Internet Message Access Protocol)
is a mail protocol used for accessing email on a remote web server from a local client.

-HTTP (Hypertext Transfer Protocol)
is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the World Wide Web.

Presentation Layer
-AFP (AppleTalk Filing Protocol)
is a Mac OS file protocol that allows users to access outside system files.

-SMB (Server Message Block)
is a message format used by DOS and Windows to share files, directories and devices.

-NCP (NetWare Core Protocol)
is the file-sharing protocol between server and client(s) on a Novell NetWare network.

-SSL (Secure Sockets Layer) 
is a computer networking protocol for securing connections between network application clients and servers over an insecure network, such as the internet.

-MIME (Multipurpose Internet Mail Extensions)
is a specification for formatting non-ASCII messages so that they can be sent over the Internet.

Transport Layer
-TCP (Transmission Control Protocol
is a standard that defines how to establish and maintain a network conversation via which application programs can exchange data.

-UDP (User Datagram Protocol)
is a transport layer protocol defined for use with the IP network layer protocol.

-NetBEUI (NetBIOS Extended User Interface) 
is a new, extended version of NetBIOS, the program that lets computers communicate within a local area network.

-SPX (Sequenced Packet Exchange) 
is the protocol for handling packet sequencing in a Novell NetWare network.

-ATP (Autonomous Transport Protocol)
 is to maintain a reliable transport connection between two endpoints, identified by content identifiers, independent of their physical locations

Network Layer
-IP (Internet Protocol) 
is the method or protocol by which data is sent from one computer to another on the Internet.

-OSPF (Open Shortest Path First)
is a router protocol used to find the best path for packets as they pass through a set of connected networks.

-BGP (Border Gateway Protocol)
is a routing protocol used to transfer data and information between different host gateways, the Internet or autonomous systems.

-NetBEUI (NetBIOS Extended User Interface) 
is a new, extended version of NetBIOS, the program that lets computers communicate within a local area network.

-DDP (Datagram Delivery Protocol),
is an AppleTalk protocol that helps ensure that packets are sent in the proper order and that they are received.


Data Link Layer
-Ethernet
is a link layer protocol in the TCP/IP stack, describing how networked devices can format data for transmission to other network devices on the same network segment, and how to put that data out on the network connection.


-Token ring
is a local area network (LAN) in which all computers are connected in a ring or star topology and pass one or more logical tokens from host to host.

-FDDI (Fiber Distributed Data Interface) 
is a set of ANSI and ISO standards for data transmission on fiber optic lines in a local area network (LAN) that can extend in range up to 200 km (124 miles).

-IEEE 802.11(wlan,wifi) (Institute of Electrical and Electronic Engineers)
 is the set of technical guidelines for implementing Wi-Fi.

-ATM (asynchronous transfer mode) 
is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology.

-PPP (Point-to-Point Protocol) 
is a family of computer networking protocols that provide a standard way to transport multiprotocol data over point-to-point links.

-HDLC (High-level Data Link Control) 
is a group of protocols or rules for transmitting data between network points (sometimes called nodes).


Reference:

Webopedia.com. (2017). Dynamic Host Configuration Protocol (DHCP)? Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/D/DHCP.html [Accessed 17 Apr. 2017].


SearchEnterpriseWAN. (2017). What is File Transfer Protocol (FTP)? - Definition from WhatIs.com. [online] Available at: http://searchenterprisewan.techtarget.com/definition/File-Transfer-Protocol [Accessed 17 Apr. 2017].


Swestcom.com. (2017). What is POP3, IMAP, SMPT, MAPI, HTTPS RPC?. [online] Available at: http://www.swestcom.com/support/q4.htm [Accessed 17 Apr. 2017].


SearchWinDevelopment. (2017). What is HTTP (Hypertext Transfer Protocol)? - Definition from WhatIs.com. [online] Available at: http://searchwindevelopment.techtarget.com/definition/HTTP [Accessed 17 Apr. 2017].


Techopedia.com. (2017). What is AppleTalk Filing Protocol (AFP)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/25674/appletalk-filing-protocol-afp [Accessed 17 Apr. 2017].


Webopedia.com. (2017). What is Server Message Block (SMB)? Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/S/SMB.html [Accessed 17 Apr. 2017].


Webopedia.com. (2017). What is NCP? Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/N/NCP.html [Accessed 17 Apr. 2017].


SearchSecurity. (2017). What is Secure Sockets Layer (SSL)? - Definition from WhatIs.com. [online] Available at: http://searchsecurity.techtarget.com/definition/Secure-Sockets-Layer-SSL [Accessed 17 Apr. 2017].


Webopedia.com. (2017). What is MIME? Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/M/MIME.html [Accessed 17 Apr. 2017].


SearchNetworking. (2017). What is TCP (Transmission Control Protocol)? - Definition from WhatIs.com. [online] Available at: http://searchnetworking.techtarget.com/definition/TCP [Accessed 17 Apr. 2017].


Webopedia.com. (2017). What is NetBEUI? Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/N/Netbeui.html [Accessed 17 Apr. 2017].


SearchWindowsServer. (2017). What is NetBEUI (NetBIOS Extended User Interface)? - Definition from WhatIs.com. [online] Available at: http://searchwindowsserver.techtarget.com/definition/NetBEUI-NetBIOS-Extended-User-Interface [Accessed 17 Apr. 2017].


Webopedia.com. (2017). What is SPX? Webopedia Definition. [online] Available at: http://www.webopedia.com/TERM/S/SPX.html [Accessed 17 Apr. 2017].


SearchUnifiedCommunications. (2017). What is Internet Protocol? - Definition from WhatIs.com. [online] Available at: http://searchunifiedcommunications.techtarget.com/definition/Internet-Protocol [Accessed 17 Apr. 2017].


Computerhope.com. (2017). What is DDP (Datagram Delivery Protocol)?. [online] Available at: http://www.computerhope.com/jargon/d/ddp.htm [Accessed 17 Apr. 2017].


SearchEnterpriseWAN. (2017). What is OSPF (Open Shortest Path First)? - Definition from WhatIs.com. [online] Available at: http://searchenterprisewan.techtarget.com/definition/OSPF [Accessed 17 Apr. 2017].


Techopedia.com. (2017). What is Border Gateway Protocol (BGP)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/6193/border-gateway-protocol-bgp [Accessed 17 Apr. 2017].


SearchNetworking. (2017). What is token ring? - Definition from WhatIs.com. [online] Available at: http://searchnetworking.techtarget.com/definition/Token-Ring [Accessed 17 Apr. 2017].


SearchNetworking. (2017). What is FDDI (Fiber Distributed Data Interface)? - Definition from WhatIs.com. [online] Available at: http://searchnetworking.techtarget.com/definition/FDDI [Accessed 17 Apr. 2017].


Techopedia.com. (2017). What is IEEE 802.11? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/24967/ieee-80211 [Accessed 17 Apr. 2017].


SearchNetworking. (2017). What is ATM (asynchronous transfer mode)? - Definition from WhatIs.com. [online] Available at: http://searchnetworking.techtarget.com/definition/ATM [Accessed 17 Apr. 2017].


SearchNetworking. (2017). What is PPP (Point-to-Point Protocol)? - Definition from WhatIs.com. [online] Available at: http://searchnetworking.techtarget.com/definition/PPP [Accessed 17 Apr. 2017].


SearchNetworking. (2017). What is HDLC (High-level Data Link Control)? - Definition from WhatIs.com. [online] Available at: http://searchnetworking.techtarget.com/definition/HDLC [Accessed 17 Apr. 2017].


Cs.umd.edu. (2017). [online] Available at: https://www.cs.umd.edu/~telsayed/publications/atp/atp_mw003.pdf [Accessed 17 Apr. 2017].


Topic 7: Wireles Network Hardware

Wireless Router is a device in a wireless local area network ( WLAN ) that determines the next network point to which a  packet  should be...