LAN Protocols...made easy!

Since single-protocol networks are quickly becoming a thing of the past, protocol knowledge has become crucial for today's networking professional. Users now demand transparent access to resources in diversified operating systems.

This seven-hour seminar gives you the opportunity to compare and contrast the key features that surround today's major LAN and WAN protocols. Presented in understandable terminology, this course will clearly explain complex functions and structures of layered protocols.



You Will Learn...

Jargon, Protocols, Standards, and Issues



Course Outline

Networking Protocol Fundamentals

To ease into the fundamentals of network protocols, we will begin with a discussion of protocol suites (aka "layers" or "architectures") which serve to define the communications logic for modern networking. This will include:

Physical Interface

The Physical Layer specifies the electrical connections between the transmission medium and the computer system. It describes how many wires are used to carry the signals; the size and shape of the connectors or adapters between the transmission medium and the communications circuit; the speed at which data is transmitted; and whether data (represented by voltages on a line, modification of radio waves, or light pulses) is allowed to flow in both directions and, if so, whether the flow can be in both directions simultaneously.

Link Level Transmission Procedures

The Link Level (or Data Link Layer) must establish and control the physical path of communication to the next node. This includes error detection and correction, defining the beginning and end of the data field, resolving competing requests for a shared communications link (deciding who can use the circuit and when), and ensuring that all forms of data can be sent across the circuit.

Network Layer Protocols

The Network Layer is responsible for end-to-end message routing of packets or blocks of information. It also collects billing and accounting information, and routes messages. We will explore these and the security processes that can be applied to this layer.

Transport Layer

The Transport Layer helps provide end-to-end message accountability. It also breaks a long message into smaller transmission blocks, if necessary, and enables its peer on the receiving side to reconstruct the message. We'll explore these responsibilities when we discuss:

Network Management

Once a network is installed and operational, it must be managed. Proper management keeps the network components functioning in an optimal way. Statistics derived from network activity is typically utilized to plan network expansion and WAN integration. This section will concentrate on common network management practices.

High Performance LAN Protocols

As newer technology is developed, it is crucial for us to explore these processes that provide speed, flexibility and connectivity to high-speed WAN architectures. Within this section we will discuss:

IBM SNA Networking

A mainstay of IBM's communications networks is the family of 3270 terminals. The family consists of a variety of terminals, printers, and cluster controllers. The communication protocol used for 3270 devices is synchronous data link control, or SDLC. While the 3270 devices have been around for quite some time, 3270 emulation can be effected through a communication server or through individual LAN nodes. SNA users communicate through sessions and this section will discuss the various types in use today.



Recommended Background

This course is recommended for networking professionals who need a fundamental understanding of today's major protocols including: Network Engineers and Managers, Systems Analysts, and Technicians. Our "The Basics of Data Comm: What you really need to know" course provides an excellent foundation for this seminar.


|Return to AR&D Homepage |Online Data Communications Glossary


Contact us

Copyright ©1997 - 2011 Ara Research & Development.
All Rights Reserved. AR&D liability, trademark and document use rules apply. Your interactions with this site are in accordance with our privacy statement.