MOD 1 - Introduction to Computer Networks.pptx

1049465 8 views 65 slides Sep 24, 2024
Slide 1
Slide 1 of 65
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65

About This Presentation

A beginner guide to the introduction to Computer Networks.


Slide Content

CMT 107:-COMPUTER NETWORKS Module 1: Introduction to Computer Networks Module 1: Introduction to Computer Networks 1

Academic norms ( Pls read it, very important!!!) Choices have consequences. Class will be starting on time. Student lateness will be allowed 10 minutes after starting the class. During the learning process, all the hand phones must be off or silent . CAT dates will be announced a week earlier Plagiarism not allowed for all assignments and final examination. The attendance   minimum 75 percent of the total learning process Lectures will be offered on 50% bases online and 50% physical basis. Module 1: Introduction to Computer Networks 2

Learning Objectives What is a “Network”? Applications Components of a computer network Network Classifications Servers Computer Networking Models Protocol Concepts Analyzing Technical Goals and Tradeoffs IN Network Design Module 1: Introduction to Computer Networks 3

4 Goal of class Basic understanding of common modern networking technology and terminology Module 1: Introduction to Computer Networks

5 Not Goals of Class Deep understanding of networking Server administration Setting up your computer How to use email, web, etc. Troubleshooting (another Tech Briefing) TCP/IP details (another Tech Briefing) Module 1: Introduction to Computer Networks

6 What is a “Network”? A network is a way to get “stuff” between 2 or more “things” Examples: Mail, phone system, conversations, railroad system, highways and roads. Module 1: Introduction to Computer Networks

Network Definition A network can be defined as two or more computers connected together in such a way that they can share resources. The purpose of a network is to share resources. 7 Module 1: Introduction to Computer Networks

APPLICATIONS: Sharing of resources such as printers Sharing of expensive software's and database Communication from one computer to another computer Exchange of data and information among users via network Sharing of information over geographically wide areas. 8 Module 1: Introduction to Computer Networks

COMPONENTS OF COMPUTER NETWORK Two or more computers Cables as links between the computers A network interfacing card(NIC) on each computer Switches Software called operating system(OS) 9 Module 1: Introduction to Computer Networks

NETWORK BENEFITS The network provided to the users can be divided into two categories: Sharing Connectivity 10 Module 1: Introduction to Computer Networks

SHARING RESOURCES Types of resources are: Hardware : A network allows users to share many hardware devices such as printers , modems, fax machines, CD ROM, players, etc. Software : sharing software resources reduces the cost of software installation, saves space on hard disk. 11 Module 1: Introduction to Computer Networks

OTHER BENEFITS OF COMPUTER NETWORK Increased speed Reduced cost Improved security Centralized software managements Electronic mail Flexible access 12 Module 1: Introduction to Computer Networks

DISDAVATAGES OF NETWORKS High cost of installation Requires time for administration Failure of server Cable faults 13 Module 1: Introduction to Computer Networks

CLASSIFICATION OF AREA BY THEIR GEOGRAPHY 14 Module 1: Introduction to Computer Networks

LOCAL AREA NETWORK(LAN) LAN is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings. LAN’s are easy to design and troubleshoot Exchange of information and sharing of resources becomes easy because of LAN. In LAN all machines are connected to a single cable. 15 Module 1: Introduction to Computer Networks

Different types of topologies such as star, tree, bus, ring, etc Can be used It is usually a privately owned network. 16 Module 1: Introduction to Computer Networks

WIDE AREA NETWORK(WAN) When network spans over a large distance or when the computers to be connected to each other are at widely separated locations a local area network cannot be used. A wide area network(WAN) is installed. The communication between different users of WAN is established using leased telephone lines, satellite links and similar channels. 17 Module 1: Introduction to Computer Networks

It is cheaper and more efficient to use the phone network for the link. Most WAN networks are used to transfer large blocks of data between its users. 18 Module 1: Introduction to Computer Networks

PERSONAL AREA NETWORK(PAN) A personal area network is a computer network organized around an individual person. It generally consists of a mobile computer, a cell phone or personal digital assistant. PAN enables the communication among these devices. It can also be used for communication among personal devices themselves for connecting to a digital level network and internet. The PANs can be constructed using wireless or cables. 19 Module 1: Introduction to Computer Networks

CAMPUS AREA NETWORK(CAN) The campus area network is made up of an interconnection of LAN with limited geographical area. Network equipment's such as switches, routers and the transmission media i.e. optical fibre etc. are almost entirely owned by the campus owner. 20 Module 1: Introduction to Computer Networks

METROPOLITAN AREA NETWORK(MAN) It is in between LAN & WAN technology that covers the entire city. It uses similar technology as LAN. It can be a single network such as cable TV network, or a measure of connecting a number of LAN’s o a large network so that resources can be shared LAN to LAN as well as device to device. 21 Module 1: Introduction to Computer Networks

PARAMETERS OF LAN, WAN AND MAN i . Ownership of network Private Private or public Private or public Geographical area covered Small, Very large area. ii. Moderate Design and maintenance:- Easy/Not easy. 22 Module 1: Introduction to Computer Networks

iii. Communication medium :- a. Coaxial cable PSTN or satellite links b. Coaxial cables, PSTN, optical fibre , cables, wireless v. Bandwidth:- Low, High or moderate vi. Data rates(speed):- High, Low or moderate DISTINGUISH BETWEEN LAN,WAN,MAN 23 Module 1: Introduction to Computer Networks

NETWORK CLASSIFICATION BY THEIR COMPONENT ROLE: i . LOCAL AREA NETWORK ii. PEER TO PEER NETWORK iii. CLIENT SERVER NETWORK 24 Module 1: Introduction to Computer Networks

PEER TO PEER NETWORK In peer to peer network each computer is responsible for making its own resources available to other computers on the network. Each computer is responsible for setting up and maintaining its own security for these resources. 25 Module 1: Introduction to Computer Networks

Also each computer is responsible for accessing the required network resources from peer to peer relationships. Peer to peer network is useful for a small network containing less than 10 computers on a single LAN . In peer to peer network each computer can function as both client and server. Peer to peer networks do not have a central control system. There are no servers in peer networks. Peer networks are amplified into home group. 26 Module 1: Introduction to Computer Networks

ADVANTAGES & DISADVANTAGES OF PEER TO PEER NETWORK Advantages : Use less expensive computer hardware Easy to administer No NOS (Network Operating System) required More built in redundancy Easy setup & low cost 27 Module 1: Introduction to Computer Networks

Disadvantages: Not very secure No central point of storage or file archiving Additional load on computer because of resource sharing Hard to maintain version control 28 Module 1: Introduction to Computer Networks

CLIENT/SERVER NETWORK In client-server network relationships, certain computers act as server and other act as clients. A server is simply a computer, that available the network resources and provides service to other computers when they request it. A client is the computer running a program that requests the service from a server. Local area network(LAN) is based on client server network relationship.  29 Module 1: Introduction to Computer Networks

Client-Server Network Diagram Module 1: Introduction to Computer Networks 30

A client-server network is one in which all available network resources such as files, directories, applications and shared devices, are centrally managed and hosted and then are accessed by client. Client serve network are defined by the presence of servers on a network that provide security and administration of the network. 31 Module 1: Introduction to Computer Networks

ADVANTAGES AND DISADVANTAGES OF CLIENT- SERVER NETWORK Advantages : Very secure Better performance Centralized backup Very reliable 32 Module 1: Introduction to Computer Networks

Disadvantages Requires professional administration More hardware- intensive More software intensive Expensive dedicated software 33 Module 1: Introduction to Computer Networks

Servers A server is a computer or system that provides r esources, data, services, or programs to other computers, known as clients, over a network.  In theory, whenever computers share resources with client machines they are considered servers. There are many types of servers, including web servers, mail servers, and virtual servers. An individual system can provide resources and use them from another system at the same time. This means that a device could be both a server and a client at the same time. 34 Module 1: Introduction to Computer Networks

Server Diagram Module 1: Introduction to Computer Networks 35

Some of the first servers were mainframe computers or minicomputers. Minicomputers were much smaller than mainframe computers, hence the name. However, as technology progressed, they ended up becoming much larger than desktop computers, which made the term microcomputer somewhat farcical. 36 Module 1: Introduction to Computer Networks

TYPES OF SERVERS File server: These servers provide the services for storing, retrieving and moving the data. A user can read, write, exchange and manage the files with the help of file servers. Printer server : The printer server is used for controlling and managing printing on the network. It also offers the fax service to the network users.  37 Module 1: Introduction to Computer Networks

iii. Application server : The expensive software and additional computing power can be shared by the computers in a network with he help of application servers. iv. Message server : It is used to co-ordinate the interaction between users, documents and applications. The data can be used in the for of audio, video, binary, text or graphics. 38 Module 1: Introduction to Computer Networks

v. Database server : It is a type of application server. It allows the uses to access the centralised strong database. 39 Module 1: Introduction to Computer Networks

40 Computer Networking Models Models, also called protocol stacks, represented in layers, help to understand where things go right or wrong. OSI 7-layer model DOD 3-layer model Simplified 4/5-layer model Application Presentation Session Transport Network Data Physical Application Protocol Local Network (LAN) Transport Network Data Physical Application 1 2 3 4 5 6 7 OSI (Open Systems Interconnection) mnemonic: All People Seem To Need Data Processing. If you ever take a test on networking, you’ll have to now this, otherwise, use the simplified model. Module 1: Introduction to Computer Networks

41 Protocol Concepts Protocols are sets of rules. What do you want to do? (Application) Where are you going? (Addressing) How do you get there? (Media types) Did you get there? (Acknowledgments, Error checking) Module 1: Introduction to Computer Networks

42 Physical Layer (Layer 1) Nowadays: Pretty much just Cat 5 (or Cat 5e or Cat6) twisted pair copper wire and microwave (wireless). Other: Fiber (multi-mode or single-mode) coaxial copper (thick- and thin-net ) Cable Modem plain phone ( DSL) microwaves (wireless ethernet ), etc. Module 1: Introduction to Computer Networks

43 Twisted Pair (Cat 5/5e, Cat 6) Unshielded twisted pairs : Twists in wire keep down interference (from fluorescent lights, for example). Cat5e has more twists than Cat5, costs a bit more, works better for Gigabit, can exceed the 100m limitation for 100Mbit ethernet . Cat6 even more so. Cat3 and 4 are older , fewer twists, similar to phone, only good for 10Mbit. Phones work on Cat5/5e so current University standard is Cat5e (or Cat6 for special situations) everywhere. You can mix them, so don’t worry about buying Cat6 jumpers if you want. Good for up to 100m, we don’t like to go over 80m when wiring a building though. Standard connecter : RJ45. Star topology : each user gets their own path, easy to troubleshoot, costs more than a shared topology. Troubleshooting costs so much that bus and ring (shared) topologies are functionally dead. Module 1: Introduction to Computer Networks

44 Twisted Pair (continued) Common Terms : 10BaseT, 100BaseT, 1000BaseT. The “T” is for Twisted pair, the number is the speed, the base is “baseband” and ask someone with an EE degree what that means. 8 strands, 4 pairs : A couple of different standards, but 568A and 568B are the most common. Stanford uses 568B (for 568A, swap the labels for pairs 2 and 3, but no real functional difference): 1 2 3 4 5 6 7 8 Strands: Pairs: 1 (blue) 2 (orange) 3 (green) 4 (brown) 10BaseT and 100BaseT only use pairs 2 and 3, so you may see some cables with only 4 strands, but since 1000T (gigabit) uses all pairs, don’t keep those cables. 568B: Module 1: Introduction to Computer Networks

45 Physical: Wireless Terms : 802.11b, 802.11a, 802.11g (coming soon: 802.16 a.k.a. “ WiMax ”) Uses microwave radio waves in the 2.4Ghz (802.11b and g) and 5.4Ghz (802.11a and n) bands to transmit data. These are unregulated frequencies, so other things (cordless phones, etc.) can use the same frequencies, but hopefully one or the other is smart enough to hop frequencies to stay clear of the other. 802.11b and g devices can use the same access points easily. 802.11a requires separate (or dual) antennae. For the most part, completely and utterly insecure. Very easy to capture someone else’s data. Make sure your application is secure (SSL, SSH, etc.) Although 802.11b at 11Mbps is the slowest (both 802.11a and g claim 54Mbps, 12-20Mbps in practice) it’s the cheapest and most ubiquitous, so you’ll still find some at Stanford. New ITS wireless is 802.11g. Module 1: Introduction to Computer Networks

46 Data Layer (Layer 2) The data layer takes the 1’s and 0’s handed it by the Network layer and turns them into some kind of signal that can go over the physical layer (electrical current, light pulses, microwaves, etc.) It also takes this signal and turns it back into 1’s and 0’s to pass up the stack on the receiving end. If there might be more than 2 devices on the connection, some form of addressing scheme is required to get the packet to the right destination. Some data layers : Token Ring, FDDI, LocalTalk , and the overwhelmingly most common data layer protocol: Ethernet. Module 1: Introduction to Computer Networks

47 Data Layer: Ethernet CSMA/CD : Carrier Sense, Multiple Access, Collision Detect. Simple! Since Ethernet was designed to be on shared media, with 2 or more users, and the “more” part can be very big (that’s the “Multiple Access” part) you have to listen to see if anyone else is talking before you talk (Carrier Sense) and if you and someone else start talking at the same time, notice it (Collision Detect), say “excuse me” stop and try again later. A polite free for all with rules. Ethernet is 10Mbit (10 million bits per second) only. Fast ethernet , which has nearly the same rules, is 100Mbit only. Gigabit ethernet is 1000Mbit only. Some Network Interface Cards (NIC’s) can speak at 10 or 100 (and sometimes 10 or 100 or 1000) but each end has to be using the same speed or there’s no connection. 10Mbit at one end and 100Mbit at the other end won’t work. Module 1: Introduction to Computer Networks

48 Ethernet: Addressing Since there can be many users on an ethernet network, everyone has to have their own unique address. This is called the Media Access Control (or MAC) address, or sometimes ethernet address, physical address, adaptor address, hardware addres , etc. It’s a 12-digit (48 bit) hexadecimal address that is unique to that ethernet adaptor and no other in the world. It can be written as 00:30:65:83:fc:0a or 0030.6583.fc0a or 003065:83fc0a or 00-30-65-83-fc-0a but they all mean the same thing. The first 6 digits are the Vendor code, (003065 belongs to Apple), the last 6 are the individual inteface’s own. Like a car’s VIN. See http://coffer.com/mac_find/ to look up some vendor codes. Module 1: Introduction to Computer Networks

49 Ethernet: Finding your Address(es) On Windows 95/98, from the “run” menu type “ winipcfg ” On Windows NT, 2000, XP and Vista, open a command window and type “ipconfig /all” (Vista shows lots of extra junk). Make sure you get the one for the actual ethernet adaptor, not the loopback or PPP! On MacOS 9, open the TCP/IP control panel and select “Get info” On MacOS X and most Unix or Unix-like systems, from a terminal, type ifconfig -a. Instructions with nice pictures are at http://www.stanford.edu/services/ess/pc/sunet.html and http://www.stanford.edu/services/ess/mac/sunet.html Just type “ ess ” in your browser. Module 1: Introduction to Computer Networks

50 Ethernet addresses: now what? To send someone a message, start with a broadcast (FFFF.FFFF.FFFF) asking “where’s Bob?” Everyone’s supposed to look at broadcasts. “Bob” replies, in his reply, he includes his ethernet address. Since every ethernet packet has the destination and sender address listed, “Bob” knows your address (from your broadcast packet) so doesn’t have to start with a broadcast. For the rest of the conversation, you’ll put each other’s address as the destination (and yours as the sender), so the conversation can pass along the ethernet media between you. Who’s “Bob” and how did he get that name? That’s a layer 3 (Network) problem, layer 2 (Data) doesn’t care. Module 1: Introduction to Computer Networks

51 Hubs vs. Switches Hubs are shared media devices. Everyone sees everyone’s packets, you’re only supposed to pay attention to those specifically directed to you, or to broadcasts. Not too secure, but cheap. Most wireless still qualifies as a “hub,” while actual wired ethernet hubs are becoming hard to find. Switches aren’t shared, most of the time. The switch pays attention to the packets and makes a list of the “sender” ethernet addresses and makes a table (it removes old data after a while). When a packet comes along whose destination address is in the table (because that host has recently “talked” and identified itself) the packet only goes to that port. Unknown packets and broadcasts still go to all ports, but overall, there are nearly no collisions and is generally more secure. Switches are now much more common than hubs. Module 1: Introduction to Computer Networks

52 Network Layer (Layer 3) Network packets can be routed. This means they can be passed from one local network to another. Data layer packets can’t be routed, they’re local only. Your computer can only get data layer packets on its data layer interface, so network layer packets have to be stuffed inside the data layer packets. This is called “encapsulation” and is why a layered model is so handy. When you link computers up, via layers 1 (Physical) and 2 (Data) you get a network. When you link networks up, you get an internetwork. You need the Network layer (3) to get data between all the little networks (often called subnets) of your internetwork. There’s one internetwork so well known, it drops the “work” and gets a capital “I.” (There was a recent college Jeopardy final “answer” about the Internetwork!) Network Layer Protocols: Internet Protocol (IP) and some others that aren’t used any more (AppleTalk, Netware, etc.) Module 1: Introduction to Computer Networks

53 Network Layer: IP The Internet Protocol (IP) is the Network layer protocol used on the Internet! It’s so handy that most everyone uses it on all their networks big and small. Designed for huge, ever-expanding networks of networks. Works pretty well with unreliable links, routes can be re-built when links go down. ARP : Address Resolution Protocol. Turns an IP number into an ethernet number, very important. Instead of asking “Who’s Bob?” you ask “Who’s 172.19.4.15” and if you get a reply, associate the ethernet address with the IP address in your arp table, and now you can keep sending your data to the intended recipient via the correct ethernet address. Remember : the only packet you can actually send on ethernet is an ethernet packet, everything else has to be stuffed inside it. Module 1: Introduction to Computer Networks

54 IP Addressing IP addresses consists of 4 “octets” such as: 171.64.20.23 Each “octet” consists of numbers between 0 and 255 (or OO and FF in hex! Don’t ask why ethernet is in hex but IP isn’t, they just are.) It works sort of like the phone system, with “area codes” to the left, then “prefix” etc. but more flexible. On campus, your computer will know that “171.64.” means “Stanford” while it will figure out that “20” means “Pine Hall” and will learn that “23” means the computer called “networking.” It does this via subnet masking (in this case, 255.255.255.0), which isn’t covered in this class. Stanford’s Network ranges are: 171.64.0.0 through 171.67.255.255, 128.12.0.0 through 128.12.255.255 and a few others. Module 1: Introduction to Computer Networks

55 IP: Domain Name Resolution (DNS) Since most people find it easier to remember names instead of numbers, IP numbers can and almost always are associated with names. Your computer, however, needs a number, so the Domain Name System (DNS) exists to make everyone happy. A name, such as networking.stanford.edu tells you the first (or top) level domain (. edu , for educational institutions) the second level domain ( stanford ) and the actual host’s name (networking). If you want the number for a host name within stanford.edu, you’ll ask one of our DNS servers to give it to you. If you need to go outside stanford.edu, you’ll still ask our servers, but they’ll figure out which other server(s) should get your request, send it to them, and will send the reply back to you. Module 1: Introduction to Computer Networks

56 DNS Servers Since you need the DNS servers to turn names into numbers, you really need to know the numbers of the DNS servers. DHCP (Dynamic Host Configuration Protocol), not covered in this class, can hand this information to you automatically. Stanford’s main DNS servers for campus users are: Caribou, 171.64.7.55 Cassandra, 171.64.7.77 Cilantro, 171.64.7.99 Cicci, 171.64.7.121 We have others, but these are the most important ones for most campus people. Module 1: Introduction to Computer Networks

57 IP: Routing. “How do you get there from here?” As mentioned before, you can only send ethernet packets out of your ethernet interface, and ethernet packets stay on your local network. You can put an IP (Network layer) packet inside of an ethernet (data layer) packet, but somebody’s got to pass it along, and that somebody’s a router. Every IP number not on your local network will “belong” to your router in your ARP table. If you want to talk to someone outside your local network, you’ll send that ethernet packet to your router’s ethernet address and trust that it will work afterwards. It’s out of your hands now. You know what’s “local” or “not” by the subnet mask. Module 1: Introduction to Computer Networks

58 More routing Routers keep tables of networks, often many and often large. Routers know: 1- Networks directly connected to them (sometimes one or two, sometimes a hundred or more), 2- Networks connected to their “friends and neighbors” and 3- The “default route” for everything else. When your ethernet packet arrives at the router, it takes the Network packet (and all its contents), looks at the destination IP number, checks its tables, and sends a new ethernet (or other layer 2) packet (where the “sender” is now the router, not you) out the (hopefully) correct interface. That may go to the final host if it’s on one of the routers directly connected networks, or to another router, which does the same process, until your packet gets to the router responsible for that local network, who then sends your packet to to the intended host. Whether your final destination host is in the next building or on the other side of the world, it works the same way. Module 1: Introduction to Computer Networks

59 Who’s my router? We serve most people on campus with only a handful of routers, each one serving many different networks. We also “cheat,” in that we used to tell you on the main campus to use 171.64.1.1 (and perhaps 171.65.1.1, 171.66.1.1 and 171.67.1.1) which really isn’t your router, but is much easier to remember. Plus we use a subnet mask of 255.255.0.0, which is another “cheat.” When you try to talk to the “1.1” router, your actual router will intercept the packet and say: “That’s me, I’ll take care of that !” and you’ll be none the wiser. This “cheat” is called Proxy ARP, and isn’t really necessary any more. DHCP hands out the correct router and subnet mask, and the new departmental firewalls don’t support Proxy ARP, so we’re going to stop this cheat all over campus as soon as we can. Move to using DHCP, it makes your life easier! Module 1: Introduction to Computer Networks

60 It really can’t be a networking class without ping and traceroute Ping and Traceroute are two somewhat useful tools for looking at and learning about your network. Ping sends a small packet to a host which may or may not choose to reply to it, and times how long the packet takes to get back. Lack of a reply doesn’t indicate a problem with the host or network. Traceroute asks all routers along the path between you and the destination host if they’d like to respond to you , and times how long each of 3 requests take to get back to you. Some routers may not respond, but may still pass the traceroute packet along, and many hosts will not reply to the traceroute inquiry at all. Lack of a reply doesn’t indicate a problem with the host or network. Module 1: Introduction to Computer Networks

Analyzing Technical Goals and Tradeoffs IN Network Design In addition to determining the criteria for success, you should ascertain the consequences of failure: What will happen if the network design project fails or if the network, once installed, does not perform to specification? How visible is the project to upper-level management? Will the success (or possible failure) of the project be visible to executives? 61 Module 1: Introduction to Computer Networks

To what extent could unforeseen behavior of the new network disrupt business operations? In general, gather enough information to feel comfortable that you understand the extent and visibility of the network design project. 62 Module 1: Introduction to Computer Networks

63 Making Network Design Tradeoffs You should also make an effort to explain each topic, and to get the client to prioritize each of them. This will allow you to consider which side of an issue to emphasize when making choices about tradeoffs. Consider the way to allocate the budget for the project, or to determine which of the customer's goals are most important. Module 1: Introduction to Computer Networks

64 Resources Networking Web Page: http://www.stanford.edu/services/network/ Lots of links. Check out SUNet reports for lots of statistics on our network. LNA Guide: http://lnaguide.stanford.edu Go to “training” for this presentation and others. Stanford’s wireless networks: http://wirelessnet.stanford.edu Wireless Guest feature: http://wirelessguest.stanford.edu Essential Stanford Software: http://ess.stanford.edu Instructions with pictures on how to get your computer onto the network. Module 1: Introduction to Computer Networks

Questions? Module 1: Introduction to Computer Networks 65