SlideShare a Scribd company logo
1
Networking Technologies
2
What’s Technology
 Whereas the topology of a network is the shape of the
network, the technology is the method of putting
information onto the network and controlling it based on
the physical components that are used and how they
operate within the network.
 The Institute of Electrical and Electronics Engineers (IEEE)
developed a set of standards called the 802 project (the
80th year and the second month). These are
 Ethernet
 Token Passing
 Wireless
 FDDI
3
Ethernet
 Ethernet is by far the most common
technology in use today.
 The Internet operates using Ethernet
technology.
 defined as 802.3 by the IEEE.
 Ethernet speeds include 3Mbps, 10Mbps,
100Mbps, and 1000Mbps.
 Ethernet uses an access method known as
Carrier Sense Multiple Access with Collision
Detection (CSMA/CD).
4
CSMA/CD
 On a network that uses CSMA/CD, when a system wants to send data
to another system, it first checks to see whether the network media is
free.
 It must do this because each piece of network media used in a LAN can
carry only one signal at a time. If the sending node detects that the
media is free, it transmits, and the data is sent to the destination. It
seems simple.
 Unfortunately, in networking, things do not always go as a planned.
The problem arises when two systems attempt to transmit at exactly
the same time.
 Collision detection works by detecting fragments of the transmission on
the network media that result when two systems try to talk at the
same time. The two systems wait for a randomly calculated amount of
time before attempting to transmit again. This amount of time is a
matter of milliseconds known as the backoff.
 When the backoff period has elapsed, the system attempts to transmit
again. If the system doesn't succeed on the second attempt, it keeps
retrying until it gives up and reports an error.
5
 The upside of CSMA/CD is that it has relatively low
overhead, meaning that not much is involved in the
workings of the system.
 The downside is that as more systems are added to
the network, more collisions occur, and the network
becomes slower.
 Despite its problems, CSMA/CD is an efficient system.
As a result, rather than replace it with some other
technology, workarounds have been created that
reduce the likelihood of collisions.
 One such strategy is the use of network switches that
create multiple collision domains and therefore
reduce the impact of collisions on performance.
6
Pros and Cons
 Advantages
 It has low overhead.
 Utilizes all available bandwidth when possible.
 Disadvantages
 Collisions degrade network performance.
 Priorities cannot be assigned to certain nodes.
 Performance degrades exponentially as devices
are added.
7
CSMA/CA
 The carrier-sense multiple access with collision avoidance (CSMA/CA)
access method uses signal avoidance rather than detection.
 On CSMA/CA networks, each computer signals its intent to transmit
data signals before any data is actually sent. When a networked system
detects a potential collision, it waits before sending out the
transmission allowing systems to avoid transmission collisions.
 The CSMA/CA access method uses a random backoff time and waits
before trying to send data on the network. When the backoff time
expires, the system will again "listen" to verify a clear channel on which
to transmit.
 If the media is still busy, another backoff interval is initiated that is less
than the first. The process continues until the wait time reaches zero,
and the media is clear.
 The CSMA/CA access method uses a "listen before talking" strategy.
8
9
Token Passing
 IEEE 802.5 standard
 On a token-passing network, a special packet called a
token is passed among the systems on the network.
 The network has only one token, and a system can
send data only when it has possession of the token.
 When the data arrives, the receiving computer sends
a verification message to the sending computer. The
sender then creates a new token, and the process
begins again.
 Standards dictate how long a system can have
control over the token.
10
11
Pros and Cons
 Adv
 lack of collisions.
 Even under heavy load conditions, the speed of a
token-passing system does not degrade in the
same way as a contention-based method such as
CSMA/CD.
 Disadv
 The creation and passing of the token generate
overhead on the network, which reduces the
maximum speed.
 The software and hardware requirements of
token-passing network technologies are more
complex and therefore more costly.
12
MSAU
 The physical layout of a ring network is
altogether different from logical topology.
 Ring networks are most commonly
implemented in a star configuration. In a
Token Ring network, a multistation access
unit (MSAU) is equivalent to a hub or switch
on an Ethernet network is implemented.
 The MSAU performs the token circulation
internally.
13
14
15
Wireless
 IEEE 802.11 standard
 The 802.11 standard has two common levels:
802.11b and 802.11g.
 The 802.11b standard offers speeds up to
11Mbps, and the 802.11g standard increases
the speed to 54Mbps. Both use an CSMA/CA.
 The media that 802.11 wireless networks use
is the 2.4GHz radio wave band.
16
17
FDDI
 Fiber Distributed Data Interface (FDDI) uses a token-
passing access method and a dual-ring topology.
 The media used by FDDI is typically fiber-optic cable,
but it can also use STP or UTP cable.
 FDDI communicates at a speed of 100 Mbps on
copper wire, but can communicate much faster on
fiber-optic cable.
 To avoid a single break in the ring that could disrupt
network connectivity, FDDI uses a dual-ring
configuration. If one computer or cable is damaged,
the other ring will form a single ring topology.
18
19
20
Characteristics of Cable Standards
 10Base2
 speeds of 10Mbps
 Baseband signaling
 total segment length of 185 (close to 200) meters
using thin coaxial (thinnet) cable.
 10Base5
 speeds of 10Mbps
 Baseband signaling
 total segment length of 500 meters using thick
coaxial (thicknet) cable.
21
 10BASE-T
 The “10” represents the maximum speed of 10Mbps; “BASE”
represents a baseband type of transmission in which only one
signal can be on the wire at any given time; “T” indicates that a
twisted-pair cable was used.
 The maximum length of any network segment using 10BASE-T is
100 meters.
 10BASE-FL
 10BASE-FL uses a fiber-optic cable to transmit the signal rather
than the copper twisted-pair cable.
 The speed of 10BASE-FL was still 10Mbps, but the maximum
transmission length could be up to 20 kilometers! Many of these
networks are still in use today where speed is not a concern but
maximum distance is a factor.
22
Fast Ethernet
 Fast Ethernet is the most commonly used network
design.
 It includes
 100BaseTX
 speed up to 100Mbps
 implemented with CAT5 UTP cable
 100 meter distance limitations
 100BaseFX
 speed up to 100Mbps
 uses fiber-optic cable
 412 meters for multimode fiber, 10,000 meters single-mode
fiber.
 uses SC or ST fiber connectors.
23
24
Gigabit Ethernet
 Has the basic 1000BaseX and 1000BaseT standards
 1000BaseX refers collectively to three distinct standards:
1000BaseLX, 1000BaseSX, and 1000BaseCX.
 1000BaseSX and 1000BaseLX are laser standards used
over fiber. LX refers to long wavelength laser, and SX
refers to short wavelength laser. Both the SX and LX wave
lasers can be supported over two types of multimode
fiber-optic cable
 Only LX wave lasers support the use of single-mode fiber.
 1000BaseCX uses shielded copper wire. Segment lengths
in 1000BaseCX are severely restricted; the maximum
cable distance is 25 meters. Because of the restricted
cable lengths, 1000BaseCX networks are not widely
implemented.
25
 1000BaseT, sometimes referred to as
1000BaseTX, is another Gigabit Ethernet
standard, over Category 5e/6 UTP cable.
 The standard allows for full-duplex
transmission using the four pairs of twisted
cable. To reach speeds of 1000Mbps over
copper, a data transmission speed of
250Mbps is achieved over each pair of
twisted-pair cable.
26
10 Gigabit Ethernet
 The newest and fastest cable standard is the 10G
standard.
 Designed primarily as a WAN and MAN connectivity
medium.
 The 10G standard allows a maximum transmission
speed of 10Gbps in a star topology.
 The 10G standard is currently subdivided into three
standards: 10GBASE-SR, 10GBASE-LR, and
10BASE-ER.
 All of these 10G standards use fiber-optic cable. The
major difference between the standards is the
maximum transmission distance.
27
28
Review
 Recognize the terminology used
when identifying cable standards
 Describe the characteristics of the
100BASE-TX standard.
 Know the characteristics of the
three 10G standards.
 Describe the characteristics of the
1000BASE-SX standard.

More Related Content

Similar to 04 - Networking Technologies.ppt

LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
fatma shabaen
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
Adeel Rasheed
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
Raj vardhan
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
Sujee Antony
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
Palanivel Kuppusamy
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
ssuser50c54b
 
Network protocols
Network protocolsNetwork protocols
Network protocols
IT Tech
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernetMohammad Waziruddin
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
Samit Singh
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
Aksum Institute of Technology(AIT, @Letsgo)
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
ChinmayWaingankar3
 
3.pptx
3.pptx3.pptx
3.pptx
kebeAman
 
LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
WILLA REYES
 
LAN
LANLAN
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational content
Olajide Kuku
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-Content
Olajide Kuku
 

Similar to 04 - Networking Technologies.ppt (20)

LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
NET1.PPT
NET1.PPTNET1.PPT
NET1.PPT
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernet
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
3.pptx
3.pptx3.pptx
3.pptx
 
LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
 
LAN
LANLAN
LAN
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational content
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-Content
 

More from ssuserf7cd2b

English Communication (AEC-01).pdf
English Communication (AEC-01).pdfEnglish Communication (AEC-01).pdf
English Communication (AEC-01).pdf
ssuserf7cd2b
 
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
ssuserf7cd2b
 
Attachment_0 (2).pdf
Attachment_0 (2).pdfAttachment_0 (2).pdf
Attachment_0 (2).pdf
ssuserf7cd2b
 
Attachment_0.pdf
Attachment_0.pdfAttachment_0.pdf
Attachment_0.pdf
ssuserf7cd2b
 
Attachment_0 (1).pdf
Attachment_0 (1).pdfAttachment_0 (1).pdf
Attachment_0 (1).pdf
ssuserf7cd2b
 
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
ssuserf7cd2b
 
AdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.docAdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.doc
ssuserf7cd2b
 
VA118-15-N-0042-001.docx
VA118-15-N-0042-001.docxVA118-15-N-0042-001.docx
VA118-15-N-0042-001.docx
ssuserf7cd2b
 
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdfNoor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
ssuserf7cd2b
 
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
ssuserf7cd2b
 
Applications.docx
Applications.docxApplications.docx
Applications.docx
ssuserf7cd2b
 
Chapter-04.pdf
Chapter-04.pdfChapter-04.pdf
Chapter-04.pdf
ssuserf7cd2b
 
Chapter 2.pdf
Chapter 2.pdfChapter 2.pdf
Chapter 2.pdf
ssuserf7cd2b
 
StandardIPinSpace.pdf
StandardIPinSpace.pdfStandardIPinSpace.pdf
StandardIPinSpace.pdf
ssuserf7cd2b
 
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
ssuserf7cd2b
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
ssuserf7cd2b
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdf
ssuserf7cd2b
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
ssuserf7cd2b
 
03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt
ssuserf7cd2b
 
02 - LANs, WANs, MANs.ppt
02 - LANs, WANs, MANs.ppt02 - LANs, WANs, MANs.ppt
02 - LANs, WANs, MANs.ppt
ssuserf7cd2b
 

More from ssuserf7cd2b (20)

English Communication (AEC-01).pdf
English Communication (AEC-01).pdfEnglish Communication (AEC-01).pdf
English Communication (AEC-01).pdf
 
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
 
Attachment_0 (2).pdf
Attachment_0 (2).pdfAttachment_0 (2).pdf
Attachment_0 (2).pdf
 
Attachment_0.pdf
Attachment_0.pdfAttachment_0.pdf
Attachment_0.pdf
 
Attachment_0 (1).pdf
Attachment_0 (1).pdfAttachment_0 (1).pdf
Attachment_0 (1).pdf
 
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
 
AdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.docAdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.doc
 
VA118-15-N-0042-001.docx
VA118-15-N-0042-001.docxVA118-15-N-0042-001.docx
VA118-15-N-0042-001.docx
 
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdfNoor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
 
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
 
Applications.docx
Applications.docxApplications.docx
Applications.docx
 
Chapter-04.pdf
Chapter-04.pdfChapter-04.pdf
Chapter-04.pdf
 
Chapter 2.pdf
Chapter 2.pdfChapter 2.pdf
Chapter 2.pdf
 
StandardIPinSpace.pdf
StandardIPinSpace.pdfStandardIPinSpace.pdf
StandardIPinSpace.pdf
 
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdf
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt
 
02 - LANs, WANs, MANs.ppt
02 - LANs, WANs, MANs.ppt02 - LANs, WANs, MANs.ppt
02 - LANs, WANs, MANs.ppt
 

Recently uploaded

Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
Sheldon Byron
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
thomasaolson2000
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
foismail170
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
FarzanaRbcomcs
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
23211a7274
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
nidm599
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
Hector Del Castillo, CPM, CPMM
 
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR GeneralistHeidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
HeidiLivengood
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
atwvhyhm
 
Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
Ben Woelk, CISSP, CPTC
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
foismail170
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
Manu Mitra
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
IrlanMalik
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
yuhofha
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 

Recently uploaded (20)

Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
 
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
欧洲杯买球平台-欧洲杯买球平台推荐-欧洲杯买球平台| 立即访问【ac123.net】
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
 
Digital Marketing Training In Bangalore
Digital  Marketing Training In BangaloreDigital  Marketing Training In Bangalore
Digital Marketing Training In Bangalore
 
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring ChapterHow Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
How Mentoring Elevates Your PM Career | PMI Silver Spring Chapter
 
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR GeneralistHeidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
原版制作(RMIT毕业证书)墨尔本皇家理工大学毕业证在读证明一模一样
 
Exploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical CommunicatorsExploring Career Paths in Cybersecurity for Technical Communicators
Exploring Career Paths in Cybersecurity for Technical Communicators
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 

04 - Networking Technologies.ppt

  • 2. 2 What’s Technology  Whereas the topology of a network is the shape of the network, the technology is the method of putting information onto the network and controlling it based on the physical components that are used and how they operate within the network.  The Institute of Electrical and Electronics Engineers (IEEE) developed a set of standards called the 802 project (the 80th year and the second month). These are  Ethernet  Token Passing  Wireless  FDDI
  • 3. 3 Ethernet  Ethernet is by far the most common technology in use today.  The Internet operates using Ethernet technology.  defined as 802.3 by the IEEE.  Ethernet speeds include 3Mbps, 10Mbps, 100Mbps, and 1000Mbps.  Ethernet uses an access method known as Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
  • 4. 4 CSMA/CD  On a network that uses CSMA/CD, when a system wants to send data to another system, it first checks to see whether the network media is free.  It must do this because each piece of network media used in a LAN can carry only one signal at a time. If the sending node detects that the media is free, it transmits, and the data is sent to the destination. It seems simple.  Unfortunately, in networking, things do not always go as a planned. The problem arises when two systems attempt to transmit at exactly the same time.  Collision detection works by detecting fragments of the transmission on the network media that result when two systems try to talk at the same time. The two systems wait for a randomly calculated amount of time before attempting to transmit again. This amount of time is a matter of milliseconds known as the backoff.  When the backoff period has elapsed, the system attempts to transmit again. If the system doesn't succeed on the second attempt, it keeps retrying until it gives up and reports an error.
  • 5. 5  The upside of CSMA/CD is that it has relatively low overhead, meaning that not much is involved in the workings of the system.  The downside is that as more systems are added to the network, more collisions occur, and the network becomes slower.  Despite its problems, CSMA/CD is an efficient system. As a result, rather than replace it with some other technology, workarounds have been created that reduce the likelihood of collisions.  One such strategy is the use of network switches that create multiple collision domains and therefore reduce the impact of collisions on performance.
  • 6. 6 Pros and Cons  Advantages  It has low overhead.  Utilizes all available bandwidth when possible.  Disadvantages  Collisions degrade network performance.  Priorities cannot be assigned to certain nodes.  Performance degrades exponentially as devices are added.
  • 7. 7 CSMA/CA  The carrier-sense multiple access with collision avoidance (CSMA/CA) access method uses signal avoidance rather than detection.  On CSMA/CA networks, each computer signals its intent to transmit data signals before any data is actually sent. When a networked system detects a potential collision, it waits before sending out the transmission allowing systems to avoid transmission collisions.  The CSMA/CA access method uses a random backoff time and waits before trying to send data on the network. When the backoff time expires, the system will again "listen" to verify a clear channel on which to transmit.  If the media is still busy, another backoff interval is initiated that is less than the first. The process continues until the wait time reaches zero, and the media is clear.  The CSMA/CA access method uses a "listen before talking" strategy.
  • 8. 8
  • 9. 9 Token Passing  IEEE 802.5 standard  On a token-passing network, a special packet called a token is passed among the systems on the network.  The network has only one token, and a system can send data only when it has possession of the token.  When the data arrives, the receiving computer sends a verification message to the sending computer. The sender then creates a new token, and the process begins again.  Standards dictate how long a system can have control over the token.
  • 10. 10
  • 11. 11 Pros and Cons  Adv  lack of collisions.  Even under heavy load conditions, the speed of a token-passing system does not degrade in the same way as a contention-based method such as CSMA/CD.  Disadv  The creation and passing of the token generate overhead on the network, which reduces the maximum speed.  The software and hardware requirements of token-passing network technologies are more complex and therefore more costly.
  • 12. 12 MSAU  The physical layout of a ring network is altogether different from logical topology.  Ring networks are most commonly implemented in a star configuration. In a Token Ring network, a multistation access unit (MSAU) is equivalent to a hub or switch on an Ethernet network is implemented.  The MSAU performs the token circulation internally.
  • 13. 13
  • 14. 14
  • 15. 15 Wireless  IEEE 802.11 standard  The 802.11 standard has two common levels: 802.11b and 802.11g.  The 802.11b standard offers speeds up to 11Mbps, and the 802.11g standard increases the speed to 54Mbps. Both use an CSMA/CA.  The media that 802.11 wireless networks use is the 2.4GHz radio wave band.
  • 16. 16
  • 17. 17 FDDI  Fiber Distributed Data Interface (FDDI) uses a token- passing access method and a dual-ring topology.  The media used by FDDI is typically fiber-optic cable, but it can also use STP or UTP cable.  FDDI communicates at a speed of 100 Mbps on copper wire, but can communicate much faster on fiber-optic cable.  To avoid a single break in the ring that could disrupt network connectivity, FDDI uses a dual-ring configuration. If one computer or cable is damaged, the other ring will form a single ring topology.
  • 18. 18
  • 19. 19
  • 20. 20 Characteristics of Cable Standards  10Base2  speeds of 10Mbps  Baseband signaling  total segment length of 185 (close to 200) meters using thin coaxial (thinnet) cable.  10Base5  speeds of 10Mbps  Baseband signaling  total segment length of 500 meters using thick coaxial (thicknet) cable.
  • 21. 21  10BASE-T  The “10” represents the maximum speed of 10Mbps; “BASE” represents a baseband type of transmission in which only one signal can be on the wire at any given time; “T” indicates that a twisted-pair cable was used.  The maximum length of any network segment using 10BASE-T is 100 meters.  10BASE-FL  10BASE-FL uses a fiber-optic cable to transmit the signal rather than the copper twisted-pair cable.  The speed of 10BASE-FL was still 10Mbps, but the maximum transmission length could be up to 20 kilometers! Many of these networks are still in use today where speed is not a concern but maximum distance is a factor.
  • 22. 22 Fast Ethernet  Fast Ethernet is the most commonly used network design.  It includes  100BaseTX  speed up to 100Mbps  implemented with CAT5 UTP cable  100 meter distance limitations  100BaseFX  speed up to 100Mbps  uses fiber-optic cable  412 meters for multimode fiber, 10,000 meters single-mode fiber.  uses SC or ST fiber connectors.
  • 23. 23
  • 24. 24 Gigabit Ethernet  Has the basic 1000BaseX and 1000BaseT standards  1000BaseX refers collectively to three distinct standards: 1000BaseLX, 1000BaseSX, and 1000BaseCX.  1000BaseSX and 1000BaseLX are laser standards used over fiber. LX refers to long wavelength laser, and SX refers to short wavelength laser. Both the SX and LX wave lasers can be supported over two types of multimode fiber-optic cable  Only LX wave lasers support the use of single-mode fiber.  1000BaseCX uses shielded copper wire. Segment lengths in 1000BaseCX are severely restricted; the maximum cable distance is 25 meters. Because of the restricted cable lengths, 1000BaseCX networks are not widely implemented.
  • 25. 25  1000BaseT, sometimes referred to as 1000BaseTX, is another Gigabit Ethernet standard, over Category 5e/6 UTP cable.  The standard allows for full-duplex transmission using the four pairs of twisted cable. To reach speeds of 1000Mbps over copper, a data transmission speed of 250Mbps is achieved over each pair of twisted-pair cable.
  • 26. 26 10 Gigabit Ethernet  The newest and fastest cable standard is the 10G standard.  Designed primarily as a WAN and MAN connectivity medium.  The 10G standard allows a maximum transmission speed of 10Gbps in a star topology.  The 10G standard is currently subdivided into three standards: 10GBASE-SR, 10GBASE-LR, and 10BASE-ER.  All of these 10G standards use fiber-optic cable. The major difference between the standards is the maximum transmission distance.
  • 27. 27
  • 28. 28 Review  Recognize the terminology used when identifying cable standards  Describe the characteristics of the 100BASE-TX standard.  Know the characteristics of the three 10G standards.  Describe the characteristics of the 1000BASE-SX standard.