1 Layered network protocols
Show
5 Internet layer
Activity: Compare IPv4 to IPv6By signing in and enrolling on this course you can view and complete all activities within the course, track your progress in My OpenLearn Create. and when you have completed a course, you can download and print a free Statement of Participation - which you can use to demonstrate your learning. 7.2.1 Switches
Activity: Data ratesResearch the data rates supported by the following Ethernet variants:
Interactive feature not available in single page view (see it in standard view). 7.2.3 Wireless Access Points (WAP)
8 Network address translation
IP addresses in packets
9 Using networks securely
12 ActivitiesActivity: Investigating your home networkBy signing in and enrolling on this course you can view and complete all activities within the course, track your progress in My OpenLearn Create. and when you have completed a course, you can download and print a free Statement of Participation - which you can use to demonstrate your learning. Activity: Network devices and protocols – Packet TracerWe connect our devices to the Internet and the Internet connects them all together. But what is the Internet made of? We say it interconnects all the devices, but how? Network devices are mainly hubs, switches or routers. There are lots of other specialist bits, but the bulk of the interconnectivity is done by switches and routers. In this course you have looked at client server models, web requests and emails. What do these messages look like and how are they sent? For each type of communication over the network there are a set of rules and specifications as to what format and order the information is sent. These are called protocols and they are fundamental in understanding how the Internet works. This Packet Tracer lab explores the devices and protocols used in computer networks. You will need: Activity: Password hintsCompanies do not store a user’s passwords in clear text – they send it through a scrambling algorithm to produce a 'hash', and the hash is then saved. The hash algorithm does not work in reverse, so you can't unscramble a hash to get the original password. When you enter your password the site uses the same algorithm to make a hash, which it then compares to the hash saved against your details. Some sites allow you to store password hints, and they save these as clear text. Adobe was hacked in 2013, and its hashed passwords and hints were stolen for thousands of customers. The hackers looked at all the hints that gave the same hash (hence were the same password). Because they had lots of hints for the same password it was easy to guess what they were. Can you guess the passwords used in this puzzle based on the stolen hints? 13 ResourcesFor more information, take a look at the following resources.
Interactive feature not available in single page view (see it in standard view).
Interactive feature not available in single page view (see it in standard view).
Interactive feature not available in single page view (see it in standard view).
Interactive feature not available in single page view (see it in standard view). 14 End of course quizNow it’s time to test what you’ve learned in a quiz. 15 AcknowledgementsGrateful acknowledgement is made to the following sources: Figure 1: Birmingham City University (BCU) Figure 2: Birmingham City University (BCU) Figure 3: Cisco Figure 4: Birmingham City University (BCU) Figure 5: Birmingham City University (BCU) Figure 6: CommScope. This file is licensed under the Creative Commons Attribution-Noncommercial-NoDerivatives Licence http://creativecommons.org/licenses/by-nc-nd/2.0/ Figure 7: tlsmith2000. This file is licensed under the Creative Commons Attribution-Share Alike Licence http://creativecommons.org/licenses/by-sa/2.0/ Figure 8: Bull3t Hughes. This file is licensed under the Creative Commons Attribution-Share Alike Licence http://creativecommons.org/licenses/by-sa/2.0/ Figure 9: Cisco Figure 10: Cisco/Birmingham City University (BCU) Figure 11: Cisco/Birmingham City University (BCU) Figure 12: Cisco/Birmingham City University (BCU) Figure 13: Cisco/Birmingham City University (BCU) Figure 14: Cisco/Birmingham City University (BCU) Figure 15: Cisco Figure 16: Cisco/Birmingham City University (BCU) Figure 17: Cisco/Birmingham City University (BCU) Figure 18: Cisco/Birmingham City University (BCU) Figure 19: Publisher unknown Figure 20: Cisco/BCU Figure 21: Birmingham City University (BCU) Figure 22: Birmingham City University (BCU) Figure 23: Birmingham City University (BCU) Figure 24: Birmingham City University (BCU) Figure 25: Birmingham City University (BCU) Figure 26: Publisher unknown Figure 27: Screenshot taken from Barclays, example of phishing. Every effort has been made to contact copyright holders. If any have been inadvertently overlooked the publishers will be pleased to make the necessary arrangements at the first opportunity. Which device is used to connect in network with another network that uses different protocols?Gateway. Gateway is a network device used to connect two or more dissimilar networks. In networking parlance, networks that use different protocols are dissimilar networks. A gateway usually is a computer with multiple NICs connected to different networks.
Which device is used to connect different protocols?Bridge[edit] “A device used to connect two separate Ethernet networks into one extended Ethernet. Bridges only forward packets between networks that are destined for the other network. Term used by Novell to denote a computer that accepts packets at the network layer and forward them to another network.”
Which network device connect different networks together?Routers link two or more different networks; these can consist of various types of LAN network segments. A router receives packets and selects the optimal route to forward the packet across the network. Routers create a table of all addresses of the devices, and this is called a routing table.
How do I connect two networks with different protocols?When we use different Networks of different technologies we can connect them by using interface i.e. GATEWAYS. But if there are two systems on the same network and using different protocols, and we want to connect them we use interface BRIDGE. There the right answer is bridge.
|