SlideShare a Scribd company logo
1 of 7
Computer Architecture: 
Core Hardware 
Chapter 11 
Networking 
Eric Vanderburg 
Eric Vanderburg – Core Hardware © 2005
Eric Vanderburg – Core Hardware © 2005 
OSI Model 
• Application 
• Presentation 
• Session 
• Transport 
• Network 
• Datalink 
• Physical
Eric Vanderburg – Core Hardware © 2005 
Topologies 
• Bus 
• Ring 
• Star 
• Mesh
Eric Vanderburg – Core Hardware © 2005 
Devices 
• Repeater 
• Hub 
• Bridge 
• Switch 
• Router 
• Gateway 
• Cables
Architectures 
• Ethernet 
• Token Ring 
• FDDI 
• WiFi 
Eric Vanderburg – Core Hardware © 2005
Eric Vanderburg – Core Hardware © 2005 
Protocols 
• TCP/IP 
• IPX/SPX 
• AppleTalk 
• NetBEUI
Eric Vanderburg – Core Hardware © 2005 
Protocols 
• TCP/IP 
• IPX/SPX 
• AppleTalk 
• NetBEUI

More Related Content

What's hot

Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)hypervnu
 
Moving to Cloud for Good: Alexander Tsirel, HiveTec
Moving to Cloud for Good: Alexander Tsirel, HiveTecMoving to Cloud for Good: Alexander Tsirel, HiveTec
Moving to Cloud for Good: Alexander Tsirel, HiveTecOpenStack
 
The Path to 100+ IXes
The Path to 100+ IXesThe Path to 100+ IXes
The Path to 100+ IXesAPNIC
 
KubeCon EU 2019 Review
KubeCon EU 2019 ReviewKubeCon EU 2019 Review
KubeCon EU 2019 ReviewGarrethDavies
 
SIGFOX basics for Intel IoT Roadshow
SIGFOX basics for Intel IoT RoadshowSIGFOX basics for Intel IoT Roadshow
SIGFOX basics for Intel IoT RoadshowNicolas Lesconnec
 
Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]Nicolas Lesconnec
 
ZipLink-E Data Sheet
ZipLink-E Data SheetZipLink-E Data Sheet
ZipLink-E Data SheetScott Shelton
 
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...Romeo Kienzler
 

What's hot (8)

Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)
 
Moving to Cloud for Good: Alexander Tsirel, HiveTec
Moving to Cloud for Good: Alexander Tsirel, HiveTecMoving to Cloud for Good: Alexander Tsirel, HiveTec
Moving to Cloud for Good: Alexander Tsirel, HiveTec
 
The Path to 100+ IXes
The Path to 100+ IXesThe Path to 100+ IXes
The Path to 100+ IXes
 
KubeCon EU 2019 Review
KubeCon EU 2019 ReviewKubeCon EU 2019 Review
KubeCon EU 2019 Review
 
SIGFOX basics for Intel IoT Roadshow
SIGFOX basics for Intel IoT RoadshowSIGFOX basics for Intel IoT Roadshow
SIGFOX basics for Intel IoT Roadshow
 
Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]
 
ZipLink-E Data Sheet
ZipLink-E Data SheetZipLink-E Data Sheet
ZipLink-E Data Sheet
 
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
 

Viewers also liked

Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric VanderburgEric Vanderburg
 
Power point lesson 02
Power point lesson 02Power point lesson 02
Power point lesson 02heidirobison
 
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgComputer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgEric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgEric Vanderburg
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarPerla Pelicano Corpez
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010Frya Lora
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingAlvin Francisco
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Materialparagatol258
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Eric Vanderburg
 
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012Harold Wong
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 

Viewers also liked (20)

Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 
Power point lesson 02
Power point lesson 02Power point lesson 02
Power point lesson 02
 
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgComputer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
 
1.4 network
1.4 network1.4 network
1.4 network
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
 
Upgrading the Computer Component
Upgrading the Computer ComponentUpgrading the Computer Component
Upgrading the Computer Component
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnar
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
 
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
 
Handtools
HandtoolsHandtools
Handtools
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgEric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatEric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology managementEric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technologyEric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challengesEric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: RoboticsEric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercisesEric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgEric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgEric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgEric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg

  • 1. Computer Architecture: Core Hardware Chapter 11 Networking Eric Vanderburg Eric Vanderburg – Core Hardware © 2005
  • 2. Eric Vanderburg – Core Hardware © 2005 OSI Model • Application • Presentation • Session • Transport • Network • Datalink • Physical
  • 3. Eric Vanderburg – Core Hardware © 2005 Topologies • Bus • Ring • Star • Mesh
  • 4. Eric Vanderburg – Core Hardware © 2005 Devices • Repeater • Hub • Bridge • Switch • Router • Gateway • Cables
  • 5. Architectures • Ethernet • Token Ring • FDDI • WiFi Eric Vanderburg – Core Hardware © 2005
  • 6. Eric Vanderburg – Core Hardware © 2005 Protocols • TCP/IP • IPX/SPX • AppleTalk • NetBEUI
  • 7. Eric Vanderburg – Core Hardware © 2005 Protocols • TCP/IP • IPX/SPX • AppleTalk • NetBEUI