SlideShare a Scribd company logo
1
Networking
Components and
Devices
2
 To complete our examination of networking on a
physical level, this chapter looks at the network
devices used to create networks.
 Hubs
 Switches
 Bridges
 Repeaters
 Routers
 Gateways
 CSU/DSU
 Wireless access points (WAPs)
 Modems
 Network interface cards (NICs)
 Transceivers
 Firewalls
3
Hubs
 Hubs are simple network devices, and their
simplicity is reflected in their low cost.
 Small hubs with four or five ports (often referred to
as workgroup hubs) provide everything needed to
create a small network.
 Most hubs are referred to as either active or
passive.
 Active regenerate a signal before forwarding it to all
the ports on the device and requires a power supply.
 Passive hubs, which today are seen only on older
networks, do not need power and they don't
regenerate the data signal.
4
5
 The basic function of a hub is to take data
from one of the connected devices and
forward it to all the other ports on the hub.
 The method of sending data to all systems
regardless of the intended recipient is
referred to as broadcasting.
 This method of operation is inefficient
because, in most cases, the data is intended
for only one of the connected devices.
 Due to the inefficiencies of the hub system
and the constantly increasing demand for
more bandwidth, hubs are slowly but surely
being replaced with switches.
6
7
Switches
 On the surface, a switch looks much like a
hub. Despite their similar appearance,
switches are far more efficient than hubs and
are far more desirable for today's network
environments.
 As with a hub, computers connect to a switch
via a length of twisted-pair cable. Multiple
switches are often interconnected to create
larger networks.
8
 Rather than forwarding data to all the connected
ports, a switch forwards data only to the port on
which the destination system is connected.
 It looks at the Media Access Control (MAC)
addresses of the devices connected to it to
determine the correct port. A MAC address is a
unique number that is stamped into every NIC. By
forwarding data only to the system to which the data
is addressed, the switch decreases the amount of
traffic on each network link dramatically.
9
10
 Collisions occur on the network when two devices attempt
to transmit at the same time. Such collisions cause the
performance of the network to degrade. By channeling
data only to the connections that should receive it,
switches reduce the number of collisions that occur on
the network.
 Switches can also further improve performance over the
performance of hubs by using a mechanism called full-
duplex. On a standard network connection, the
communication between the system and the hub is said
to be half-duplex.
 In a half-duplex connection, data can be either sent or
received on the wire but not at the same time. Because
switches manage the data flow on the connection, a
switch can operate in full-duplex mode. It can send and
receive data on the connection at the same time. In a full-
duplex connection, the maximum data throughput is
double that for a half-duplex connectionfor example,
10Mbps becomes 20Mbps, and 100Mbps becomes
200Mbps.
11
Switching Methods
 Cut-through
 the switch begins to forward the packet as soon as it is received.
 No error checking is performed on the packet,
 so the packet is moved through quickly.
 the switch can propagate errors
 30 times faster than store-and-forward switching
 Store-and-forward
 the switch waits to receive the entire packet before beginning
to forward it.
 also performs basic error checking.
 Fragment-free
 works by reading only the part of the packet that enables it to
identify fragments of a transmission.
 On some managed switches, you can select the switching
method you want to use.
12
Working with Hubs and
Switches
 Hubs and switches have two types of ports: medium
dependent interface (MDI) or uplink port and
medium dependent interface crossed (MDI-X).
 Uplink port allows you to connect two hubs and
switches to create larger networks.
13
Cable Crimping
 Two types of cables are used to connect devices to
hubs and switches: crossover cables and straight-
through cables.
 The difference between the two types is that in a
crossover cable, two of the wires are crossed; in a
straight-through cable, all the wires run straight
through.
 Crossover – PC to PC, Hub to Hub, Switch to Hub,
connects the same devices
 Straight-through – PC to Hub, PC to Switch,
connects different devices
14
15
16
Hub and Switch Indicator
Lights
 Both hubs and switches use light-emitting
diodes (LEDs) to indicate certain connection
conditions.
 At the very least, a link light on the hub will
indicate the existence of a live connection.
 On higher-end devices, additional lights might
indicate
 activity,
 the speed of the connection,
 whether the connection is at half- or full-
duplex,
 sometimes errors or collisions.
17
Managed Hubs and Switches
 A managed device has an interface through
which it can be configured to perform certain
special functions.
 For example, it may allow for port mirroring,
which can be useful for network monitoring,
or allow ports to be specified to operate at a
certain speed.
 managed devices are considerably more
expensive than unmanaged devices.
 Eg. Cisco Switches
18
Bridges
 Bridges are networking devices that connect
networks.
 Sometimes it is necessary to divide networks
into subnets to reduce the amount of traffic
on each larger subnet or for security reasons.
 Once divided, the bridge connects the two
subnets and manages the traffic flow
between them. Today, network switches have
largely replaced bridges.
19
20
 A bridge functions by blocking or forwarding data,
based on the destination MAC address written into
each frame of data.
 If the bridge believes the destination address is on a
network other than that from which the data was
received, it can forward the data to the other
networks to which it is connected.
 If the address is not on the other side of the bridge,
the data is blocked from passing. Bridges "learn" the
MAC addresses of devices on connected networks
by "listening" to network traffic and recording the
network from which the traffic originates.
 The advantages of bridges are simple and
significant. By preventing unnecessary traffic from
crossing onto other network segments, a bridge can
dramatically reduce the amount of network traffic on
a segment.
21
Repeater
 Repeaters are usually used to strengthen signals
going long distances.
 A repeater amplifies the signal it receives on one
port before it transmits it on other ports.
 Because the repeater does not check on the
contents of the data it receives or retransmits,
frames that are corrupted by noise and other
factors can also be repeated.
 The development of the hub replaced the
repeater for all practical purposes, because it
performs the same functions, and can include
additional features.
22
Routers
 Routers are network devices that literally route data
around the network.
 By examining data as it arrives, the router can
determine the destination address for the data; then,
by using tables of defined routes, the router
determines the best way for the data to continue its
journey.
 Unlike bridges and switches, which use the
hardware-configured MAC address to determine the
destination of the data, routers use the software-
configured network address to make decisions.
 This approach makes routers more functional than
bridges or switches, and it also makes them more
complex because they have to work harder to
determine the information.
23
24
 A router is used to provide connectivity across
wide area network (WAN) links and route
information between two LAN segments.
 The figure below shows a router with two LAN
ports (marked AUI 0 and AUI 1) and two WAN
ports (marked Serial 0 and Serial 1). This router is
capable of routing data between two LAN
segments and two WAN segments.
25
Dedicated Hardware Versus
Server-Based Routers
 A router can be either a dedicated hardware device
or a server system that has at least two network
interfaces installed in it.
 advantages of dedicated hardware routers:
 Typically faster than server-based routers
 Generally more reliable than server-based routers
 Easier to harden against attacks than server-based routing
solutions
 disadvantages of dedicated hardware routers:
 More expensive than server-based router solutions;
extra functionality may have to be purchased
 Often require specialized skills and knowledge to
manage them
 Limited to a small range of possible uses
26
When Do You Need to Use a
Router?
 Not every network needs a router.
 a simple switch-based LAN can provide all the file and
print sharing your business needs within the LAN.
 Situations in which a router might be needed:
 to resolve network congestion, you can divide
your network into multiple subnets and connect
them using a router.
 You want to connect to branch offices or other
wide area networks, such as the Internet.
 You want to be able to filter the network traffic
that passes between one LAN and the next, or
between your network and the Internet.
27
Gateways
 The term gateway is applied to any device, system, or software
application that can perform the function of translating data from
one format to another.
 Actually, the term gateway refers more to a network role than a
network device.
 For example, a router that can route data from an IPX network to
an IP network is, technically, a gateway.
 Another example of a gateway involves the Systems Network
Architecture (SNA) gateway, which converts the data format used
on a PC to that used on an IBM mainframe or minicomputer. A
system that acts as an SNA gateway sits between the client PC
and the mainframe and translates requests and replies from both
directions.
 The definition of gateways is vague, it's because there is no
definite answer. The function of a gateway is very specific, but
how the gateway functionality is implemented is not.
28
29
CSUs/DSUs
 A Channel Service Unit/Data Service Unit
(CSU/DSU) acts as a translator between the LAN
data format and the WAN data format.
 Such a conversion is necessary because the
technologies used on WAN links are different from
those used on LANs.
 A CSU/DSU has physical connections for the LAN
equipment, and another connection for a WAN.
Traditionally, the CSU/DSU has been in a separate
box from other networking equipment; however, the
increasing use of WAN links means that some router
manufacturers are now including the CSU/DSU
functionality in routers or are providing the
expansion capability to do so.
30
31
Modems
 Modem is a contraction of the terms modulator and
demodulator.
 Modems perform a simple function: They translate
digital signals from a computer into analog signals
that can travel across conventional phone lines.
 Modems provide a relatively slow method of
communication. In fact, the fastest modem available
on the market today has a maximum speed of
56Kbps.
 available as
 internal devices that plug into PCI/ISA slots
 external devices that plug into serial or USB ports;
 PCMCIA cards designed for use in laptops
32
33
Network Interface Cards (NICs)
 NICs are the mechanisms by which computers
connect to a network.
 NICs come in all shapes and sizes, and they come
in prices to suit all budgets.
 Known as network card, network adapter, and LAN
adapter, etc.
 When buying one consider
 Network compatibility – Ethernet/Token Ring
 Bus compatibility – PCI/ ISA /PCI-e
 Port compatibility – UTP/ Fibre
 Hardware compatibility – Easy to install / Recognized
by many OS’s
34
35
 A network interface typically has at
least two LEDs that indicate certain
conditions:
 Link light - indicates whether a
network connection exists between
the card and the switch/hub.
 Activity light - indicates network
activity.
 Speed light - indicates that the
interface is connected at a certain
speed.
36
Wireless Access Point (WAP)
 are a transmitter and receiver (transceiver)
device used for wireless LAN (WLAN) radio
signals.
 Depending on the size of the network, one or
more WAPs may be required. Additional
WAPs are used to allow access to more
wireless clients and to expand the range of
the wireless network.
 Communication depends on
 Distance between the client and the WAP
 Environmental conditions
37
38
Transceivers
 The term transceiver does not necessarily describe
a separate network device but rather an integrated
technology embedded in devices.
 transceiver = transmitter and a receiver
 device that receives data, converts it, and then
sends it to another location
 RF transceivers, fiber-optic transceivers, Ethernet
transceivers, are examples
 can also be used in pairs to insert a fiber segment
into copper networks
39
Fiber Optic Transceiver
40
Firewall
 a hardware or software system that is used to
separate one computer or network from another
one.
 The most common type is used to protect a
computer or an entire network from unauthorized
access from the Internet.
 can also be used to control the flow of data to and
from multiple networks within the same organization.
Firewalls
 can be programmed to filter data packets based on
the information that is contained in the packets.

More Related Content

What's hot

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
networking
networkingnetworking
networking
Pooja Dhiman
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
Humayoun Kabir
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
Gprs
GprsGprs
Dc lec-04 (categories of network)
Dc lec-04 (categories of network)Dc lec-04 (categories of network)
Dc lec-04 (categories of network)
diaryinc
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
DeepaDasarathan
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
Aarthi Raghavendra
 
Unit 4 bandwidth utilization
Unit 4 bandwidth utilizationUnit 4 bandwidth utilization
Unit 4 bandwidth utilization
Anjuman College of Engg. & Tech.
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
Şüheda Acar
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
mvenkat2016
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
guestfa1226
 
MANET.pptx
MANET.pptxMANET.pptx
MANET.pptx
ssuser476e50
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Small cells I : Femto cell
Small cells I :  Femto cellSmall cells I :  Femto cell
Small cells I : Femto cell
Madhumita Tamhane
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in BusinessNethan P
 
Mobile IP
Mobile IPMobile IP
Mobile IP
shankul07
 
Wireless LAN & 802.11ac Wi-Fi Fundamentals
Wireless LAN & 802.11ac Wi-Fi FundamentalsWireless LAN & 802.11ac Wi-Fi Fundamentals
Wireless LAN & 802.11ac Wi-Fi Fundamentals
Aruba, a Hewlett Packard Enterprise company
 

What's hot (20)

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
networking
networkingnetworking
networking
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Gprs
GprsGprs
Gprs
 
Dc lec-04 (categories of network)
Dc lec-04 (categories of network)Dc lec-04 (categories of network)
Dc lec-04 (categories of network)
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
Unit 4 bandwidth utilization
Unit 4 bandwidth utilizationUnit 4 bandwidth utilization
Unit 4 bandwidth utilization
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
MANET.pptx
MANET.pptxMANET.pptx
MANET.pptx
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Small cells I : Femto cell
Small cells I :  Femto cellSmall cells I :  Femto cell
Small cells I : Femto cell
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in Business
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Wireless LAN & 802.11ac Wi-Fi Fundamentals
Wireless LAN & 802.11ac Wi-Fi FundamentalsWireless LAN & 802.11ac Wi-Fi Fundamentals
Wireless LAN & 802.11ac Wi-Fi Fundamentals
 

Similar to 05 - Networking Components and Devices.ppt

Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
Siddique Ibrahim
 
Networking devices
Networking devicesNetworking devices
Networking devices
rehnuma rusha
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
TechLinu.com
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
EliasPetros
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
Akmal Cikmat
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
Raj vardhan
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
lovizabasharat
 
Networks
Networks   Networks
Networks
pavishkumarsingh
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
SankalpThaware
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
Gayan Geethanjana
 
network hardware
network hardwarenetwork hardware
network hardware
tumetr1
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)howare
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
Suprabha Sahoo
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
Sweta Kumari Barnwal
 

Similar to 05 - Networking Components and Devices.ppt (20)

Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Cna
CnaCna
Cna
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
 
Networks
Networks   Networks
Networks
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
 
Sem 1 Ch 5
Sem 1 Ch 5Sem 1 Ch 5
Sem 1 Ch 5
 
Network devices
Network devicesNetwork devices
Network devices
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
 
network hardware
network hardwarenetwork hardware
network hardware
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 

More from ssuserf7cd2b

English Communication (AEC-01).pdf
English Communication (AEC-01).pdfEnglish Communication (AEC-01).pdf
English Communication (AEC-01).pdf
ssuserf7cd2b
 
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
ssuserf7cd2b
 
Attachment_0 (2).pdf
Attachment_0 (2).pdfAttachment_0 (2).pdf
Attachment_0 (2).pdf
ssuserf7cd2b
 
Attachment_0.pdf
Attachment_0.pdfAttachment_0.pdf
Attachment_0.pdf
ssuserf7cd2b
 
Attachment_0 (1).pdf
Attachment_0 (1).pdfAttachment_0 (1).pdf
Attachment_0 (1).pdf
ssuserf7cd2b
 
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
ssuserf7cd2b
 
AdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.docAdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.doc
ssuserf7cd2b
 
VA118-15-N-0042-001.docx
VA118-15-N-0042-001.docxVA118-15-N-0042-001.docx
VA118-15-N-0042-001.docx
ssuserf7cd2b
 
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdfNoor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
ssuserf7cd2b
 
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
ssuserf7cd2b
 
Applications.docx
Applications.docxApplications.docx
Applications.docx
ssuserf7cd2b
 
Chapter-04.pdf
Chapter-04.pdfChapter-04.pdf
Chapter-04.pdf
ssuserf7cd2b
 
Chapter 2.pdf
Chapter 2.pdfChapter 2.pdf
Chapter 2.pdf
ssuserf7cd2b
 
StandardIPinSpace.pdf
StandardIPinSpace.pdfStandardIPinSpace.pdf
StandardIPinSpace.pdf
ssuserf7cd2b
 
04 - Networking Technologies.ppt
04 - Networking Technologies.ppt04 - Networking Technologies.ppt
04 - Networking Technologies.ppt
ssuserf7cd2b
 
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
ssuserf7cd2b
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
ssuserf7cd2b
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdf
ssuserf7cd2b
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
ssuserf7cd2b
 
03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt
ssuserf7cd2b
 

More from ssuserf7cd2b (20)

English Communication (AEC-01).pdf
English Communication (AEC-01).pdfEnglish Communication (AEC-01).pdf
English Communication (AEC-01).pdf
 
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ).pdf
 
Attachment_0 (2).pdf
Attachment_0 (2).pdfAttachment_0 (2).pdf
Attachment_0 (2).pdf
 
Attachment_0.pdf
Attachment_0.pdfAttachment_0.pdf
Attachment_0.pdf
 
Attachment_0 (1).pdf
Attachment_0 (1).pdfAttachment_0 (1).pdf
Attachment_0 (1).pdf
 
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdfThe Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
The Oxford Dictionary of English Grammar ( PDFDrive ) (1).pdf
 
AdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.docAdvancedSkillsforComm.-BookI.doc
AdvancedSkillsforComm.-BookI.doc
 
VA118-15-N-0042-001.docx
VA118-15-N-0042-001.docxVA118-15-N-0042-001.docx
VA118-15-N-0042-001.docx
 
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdfNoor-Book.com  دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
Noor-Book.com دليلك الكامل لمهارات الإتصال بالانجليزية.pdf
 
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
 
Applications.docx
Applications.docxApplications.docx
Applications.docx
 
Chapter-04.pdf
Chapter-04.pdfChapter-04.pdf
Chapter-04.pdf
 
Chapter 2.pdf
Chapter 2.pdfChapter 2.pdf
Chapter 2.pdf
 
StandardIPinSpace.pdf
StandardIPinSpace.pdfStandardIPinSpace.pdf
StandardIPinSpace.pdf
 
04 - Networking Technologies.ppt
04 - Networking Technologies.ppt04 - Networking Technologies.ppt
04 - Networking Technologies.ppt
 
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 
Protocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdfProtocol_specification_testing_and_verif.pdf
Protocol_specification_testing_and_verif.pdf
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt03 - Cabling Standards, Media, and Connectors.ppt
03 - Cabling Standards, Media, and Connectors.ppt
 

Recently uploaded

Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Subhajit Sahu
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Enterprise Wired
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
eddie19851
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 

Recently uploaded (20)

Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfUnleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdf
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 

05 - Networking Components and Devices.ppt

  • 2. 2  To complete our examination of networking on a physical level, this chapter looks at the network devices used to create networks.  Hubs  Switches  Bridges  Repeaters  Routers  Gateways  CSU/DSU  Wireless access points (WAPs)  Modems  Network interface cards (NICs)  Transceivers  Firewalls
  • 3. 3 Hubs  Hubs are simple network devices, and their simplicity is reflected in their low cost.  Small hubs with four or five ports (often referred to as workgroup hubs) provide everything needed to create a small network.  Most hubs are referred to as either active or passive.  Active regenerate a signal before forwarding it to all the ports on the device and requires a power supply.  Passive hubs, which today are seen only on older networks, do not need power and they don't regenerate the data signal.
  • 4. 4
  • 5. 5  The basic function of a hub is to take data from one of the connected devices and forward it to all the other ports on the hub.  The method of sending data to all systems regardless of the intended recipient is referred to as broadcasting.  This method of operation is inefficient because, in most cases, the data is intended for only one of the connected devices.  Due to the inefficiencies of the hub system and the constantly increasing demand for more bandwidth, hubs are slowly but surely being replaced with switches.
  • 6. 6
  • 7. 7 Switches  On the surface, a switch looks much like a hub. Despite their similar appearance, switches are far more efficient than hubs and are far more desirable for today's network environments.  As with a hub, computers connect to a switch via a length of twisted-pair cable. Multiple switches are often interconnected to create larger networks.
  • 8. 8  Rather than forwarding data to all the connected ports, a switch forwards data only to the port on which the destination system is connected.  It looks at the Media Access Control (MAC) addresses of the devices connected to it to determine the correct port. A MAC address is a unique number that is stamped into every NIC. By forwarding data only to the system to which the data is addressed, the switch decreases the amount of traffic on each network link dramatically.
  • 9. 9
  • 10. 10  Collisions occur on the network when two devices attempt to transmit at the same time. Such collisions cause the performance of the network to degrade. By channeling data only to the connections that should receive it, switches reduce the number of collisions that occur on the network.  Switches can also further improve performance over the performance of hubs by using a mechanism called full- duplex. On a standard network connection, the communication between the system and the hub is said to be half-duplex.  In a half-duplex connection, data can be either sent or received on the wire but not at the same time. Because switches manage the data flow on the connection, a switch can operate in full-duplex mode. It can send and receive data on the connection at the same time. In a full- duplex connection, the maximum data throughput is double that for a half-duplex connectionfor example, 10Mbps becomes 20Mbps, and 100Mbps becomes 200Mbps.
  • 11. 11 Switching Methods  Cut-through  the switch begins to forward the packet as soon as it is received.  No error checking is performed on the packet,  so the packet is moved through quickly.  the switch can propagate errors  30 times faster than store-and-forward switching  Store-and-forward  the switch waits to receive the entire packet before beginning to forward it.  also performs basic error checking.  Fragment-free  works by reading only the part of the packet that enables it to identify fragments of a transmission.  On some managed switches, you can select the switching method you want to use.
  • 12. 12 Working with Hubs and Switches  Hubs and switches have two types of ports: medium dependent interface (MDI) or uplink port and medium dependent interface crossed (MDI-X).  Uplink port allows you to connect two hubs and switches to create larger networks.
  • 13. 13 Cable Crimping  Two types of cables are used to connect devices to hubs and switches: crossover cables and straight- through cables.  The difference between the two types is that in a crossover cable, two of the wires are crossed; in a straight-through cable, all the wires run straight through.  Crossover – PC to PC, Hub to Hub, Switch to Hub, connects the same devices  Straight-through – PC to Hub, PC to Switch, connects different devices
  • 14. 14
  • 15. 15
  • 16. 16 Hub and Switch Indicator Lights  Both hubs and switches use light-emitting diodes (LEDs) to indicate certain connection conditions.  At the very least, a link light on the hub will indicate the existence of a live connection.  On higher-end devices, additional lights might indicate  activity,  the speed of the connection,  whether the connection is at half- or full- duplex,  sometimes errors or collisions.
  • 17. 17 Managed Hubs and Switches  A managed device has an interface through which it can be configured to perform certain special functions.  For example, it may allow for port mirroring, which can be useful for network monitoring, or allow ports to be specified to operate at a certain speed.  managed devices are considerably more expensive than unmanaged devices.  Eg. Cisco Switches
  • 18. 18 Bridges  Bridges are networking devices that connect networks.  Sometimes it is necessary to divide networks into subnets to reduce the amount of traffic on each larger subnet or for security reasons.  Once divided, the bridge connects the two subnets and manages the traffic flow between them. Today, network switches have largely replaced bridges.
  • 19. 19
  • 20. 20  A bridge functions by blocking or forwarding data, based on the destination MAC address written into each frame of data.  If the bridge believes the destination address is on a network other than that from which the data was received, it can forward the data to the other networks to which it is connected.  If the address is not on the other side of the bridge, the data is blocked from passing. Bridges "learn" the MAC addresses of devices on connected networks by "listening" to network traffic and recording the network from which the traffic originates.  The advantages of bridges are simple and significant. By preventing unnecessary traffic from crossing onto other network segments, a bridge can dramatically reduce the amount of network traffic on a segment.
  • 21. 21 Repeater  Repeaters are usually used to strengthen signals going long distances.  A repeater amplifies the signal it receives on one port before it transmits it on other ports.  Because the repeater does not check on the contents of the data it receives or retransmits, frames that are corrupted by noise and other factors can also be repeated.  The development of the hub replaced the repeater for all practical purposes, because it performs the same functions, and can include additional features.
  • 22. 22 Routers  Routers are network devices that literally route data around the network.  By examining data as it arrives, the router can determine the destination address for the data; then, by using tables of defined routes, the router determines the best way for the data to continue its journey.  Unlike bridges and switches, which use the hardware-configured MAC address to determine the destination of the data, routers use the software- configured network address to make decisions.  This approach makes routers more functional than bridges or switches, and it also makes them more complex because they have to work harder to determine the information.
  • 23. 23
  • 24. 24  A router is used to provide connectivity across wide area network (WAN) links and route information between two LAN segments.  The figure below shows a router with two LAN ports (marked AUI 0 and AUI 1) and two WAN ports (marked Serial 0 and Serial 1). This router is capable of routing data between two LAN segments and two WAN segments.
  • 25. 25 Dedicated Hardware Versus Server-Based Routers  A router can be either a dedicated hardware device or a server system that has at least two network interfaces installed in it.  advantages of dedicated hardware routers:  Typically faster than server-based routers  Generally more reliable than server-based routers  Easier to harden against attacks than server-based routing solutions  disadvantages of dedicated hardware routers:  More expensive than server-based router solutions; extra functionality may have to be purchased  Often require specialized skills and knowledge to manage them  Limited to a small range of possible uses
  • 26. 26 When Do You Need to Use a Router?  Not every network needs a router.  a simple switch-based LAN can provide all the file and print sharing your business needs within the LAN.  Situations in which a router might be needed:  to resolve network congestion, you can divide your network into multiple subnets and connect them using a router.  You want to connect to branch offices or other wide area networks, such as the Internet.  You want to be able to filter the network traffic that passes between one LAN and the next, or between your network and the Internet.
  • 27. 27 Gateways  The term gateway is applied to any device, system, or software application that can perform the function of translating data from one format to another.  Actually, the term gateway refers more to a network role than a network device.  For example, a router that can route data from an IPX network to an IP network is, technically, a gateway.  Another example of a gateway involves the Systems Network Architecture (SNA) gateway, which converts the data format used on a PC to that used on an IBM mainframe or minicomputer. A system that acts as an SNA gateway sits between the client PC and the mainframe and translates requests and replies from both directions.  The definition of gateways is vague, it's because there is no definite answer. The function of a gateway is very specific, but how the gateway functionality is implemented is not.
  • 28. 28
  • 29. 29 CSUs/DSUs  A Channel Service Unit/Data Service Unit (CSU/DSU) acts as a translator between the LAN data format and the WAN data format.  Such a conversion is necessary because the technologies used on WAN links are different from those used on LANs.  A CSU/DSU has physical connections for the LAN equipment, and another connection for a WAN. Traditionally, the CSU/DSU has been in a separate box from other networking equipment; however, the increasing use of WAN links means that some router manufacturers are now including the CSU/DSU functionality in routers or are providing the expansion capability to do so.
  • 30. 30
  • 31. 31 Modems  Modem is a contraction of the terms modulator and demodulator.  Modems perform a simple function: They translate digital signals from a computer into analog signals that can travel across conventional phone lines.  Modems provide a relatively slow method of communication. In fact, the fastest modem available on the market today has a maximum speed of 56Kbps.  available as  internal devices that plug into PCI/ISA slots  external devices that plug into serial or USB ports;  PCMCIA cards designed for use in laptops
  • 32. 32
  • 33. 33 Network Interface Cards (NICs)  NICs are the mechanisms by which computers connect to a network.  NICs come in all shapes and sizes, and they come in prices to suit all budgets.  Known as network card, network adapter, and LAN adapter, etc.  When buying one consider  Network compatibility – Ethernet/Token Ring  Bus compatibility – PCI/ ISA /PCI-e  Port compatibility – UTP/ Fibre  Hardware compatibility – Easy to install / Recognized by many OS’s
  • 34. 34
  • 35. 35  A network interface typically has at least two LEDs that indicate certain conditions:  Link light - indicates whether a network connection exists between the card and the switch/hub.  Activity light - indicates network activity.  Speed light - indicates that the interface is connected at a certain speed.
  • 36. 36 Wireless Access Point (WAP)  are a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals.  Depending on the size of the network, one or more WAPs may be required. Additional WAPs are used to allow access to more wireless clients and to expand the range of the wireless network.  Communication depends on  Distance between the client and the WAP  Environmental conditions
  • 37. 37
  • 38. 38 Transceivers  The term transceiver does not necessarily describe a separate network device but rather an integrated technology embedded in devices.  transceiver = transmitter and a receiver  device that receives data, converts it, and then sends it to another location  RF transceivers, fiber-optic transceivers, Ethernet transceivers, are examples  can also be used in pairs to insert a fiber segment into copper networks
  • 40. 40 Firewall  a hardware or software system that is used to separate one computer or network from another one.  The most common type is used to protect a computer or an entire network from unauthorized access from the Internet.  can also be used to control the flow of data to and from multiple networks within the same organization. Firewalls  can be programmed to filter data packets based on the information that is contained in the packets.