SlideShare a Scribd company logo
CONNECTIVITY
DEVICES
By: PRINCE KUMAR
CONTENTS…
 COMPUTER NETWORK
 IDENTIFICATION OF A NODE IN THE
NETWORK
 MEDIA & CONNECTORS
 CONNECTIVITY DEVICES
 TRANSCEIVER
 REPEATER
 HUB
 SWITCH
 BRIDGE
 ROUTER
 GATEWAY
COMPUTER NETWORK
 A computer network is collection of interlinked
nodes.
 The goals for which a computer network is
established_
 Communication
 Resource sharing
 Reliable environment
 To achieve goals a network involves_
 Message : Data content.
 Sender and Receiver: Nodes
 Media : Any thing though which the message is
transferred from sender to receiver.
 Protocols : Certain algorithms to control
communication.
IDENTIFICATION OF A NODE IN
THE NETWORK
 Each Node has an address
through which it is identified in
the network.
 NIC [Network Interface Card]:
An special device connected
on the motherboard of the
computer having a 6 digit
hexadecimal address [MAC
Address] by which it is
identified by matching the
logical address[IP Address] at
network support layers .
MEDIA & CONNECTORS
 Any thing though which the message is
transferred from sender to receiver is called as
Medium.
 It may be_
 Unguided: Air or Vaccum space.
 Guided: A physical way or link between nodes.
 E .g; Twisted pair cable (STP, UTP with RJ
connectors), Coaxial cable (with RG connectors) and
Fibre Optics.
MEDIA & CONNECTORS
RJ45
RG
CONNECTIVITY DEVICES
 The devices used to establish a network are
known as CONNECTIVITY DEVICES.
 They may be categories as_
 Networking Devices
 Within a network; HUB, SWITCH etc.
 Internetworking Devices.
 Between two or more networks; BRIDGE, ROUTER
etc
TRANSCEIVER
 A device that is able to receive as well as
transmit signals is known as TRANSCEIVER.
REPEATER
 A device having
capacity to repeat or
regenerate the
incoming signals.
 To make the signals
strength constant
during transmission.
 It is installed at
Physical layer in the
network.
HUB
 A HUB is a device used as
a central device in star
networks.
 It broadcasts the message
in the entire network,
because it can not keep
connected nodes
addresses.
 It is installed at Data link
Layer.
 It has 4-24 ports.
 It may be_
 ACTIVE : HUB with
Repeater.
HUB
SWITCH
 Like a HUB Switch is also a central device
used in star networks.
 By default it unicast the message because it
keeps the address information of all the
connected devices but when broadcasting is
allowed it also broadcasts.
 It has 4-32 ports normally but also available in
128-256 ports.
 Modern Switches have inbuilt Repeaters.
 Installed at Layer2 or Layer 3 as required and
reads MAC addresses.
SWITCH
BRIDGE
 A device to connect two or more LANs.
 It may be_
 Transparent : connects homogeneous LANs.
 Translational : connects heterogeneous LANs.
 It keeps the information about configurations of
all the networks connected via Bridge; such as
topologies and access techniques.
 Installed at Data link layer.
BRIDGE
ROUTER
 A device that routes the signals
between the nodes from source to
destination between two or more
similar networks.
 It is installed at the network layer
and capable to read IP addresses
of the nodes.
 It also keeps the information about
the neighbour routers or nodes to
maintain the flow of forwarding the
data packets and therefore this
routers are known as mini
computers.
ROUTER
 Routers have
repeaters.
 Routers have inbuilt
firewall that filtrates
the unwanted
contents in the data
packets.
 Routing techniques
are helpful to select a
path for transmission.
 Virtual circuit
 Datagram approach
ROUTER
 Some devices are used as Bridge as well as
Routers called BROUTERS.
 At a time it works either as a Bridge or as a
Router.
GATEWAYS
 Gateway is a internetworking device.
 It is used to interconnect two dissimilar networks.
 It is installed at application layer in the network.
 Also known as protocol converter.
THE END

More Related Content

What's hot

Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking Devices
Shubham Bathe
 
Networking devices
Networking devicesNetworking devices
Networking devices
NetProtocol Xpert
 
The difference between a hub, switch and router webopedia
The difference between a hub, switch and router   webopediaThe difference between a hub, switch and router   webopedia
The difference between a hub, switch and router webopedia
Harikiran Raju
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
Mahesh_Naidu
 
Network devices
Network devicesNetwork devices
Network devices
Tapan Khilar
 
Router vs switch
Router vs switchRouter vs switch
Router vs switchIT Tech
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
Clinton Dsouza
 
networking devices
networking devicesnetworking devices
networking devices
harish pillai
 
Networking devices
Networking devicesNetworking devices
Networking devices
Mubassir Ambekar
 
Networking devices
Networking devicesNetworking devices
Networking devices
Tayyab Hussain
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
Gayan Geethanjana
 
Network devices
Network devicesNetwork devices
Network devices
Aryan Kabra
 
Network switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegeNetwork switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom college
jackmakani
 
Basics of Gateway By Naveen Karn
 Basics of Gateway By Naveen Karn Basics of Gateway By Naveen Karn
Basics of Gateway By Naveen Karn
Naveen Karn
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986sherifmeetme
 
Network devices
Network devicesNetwork devices
Network devices
Ashok R
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
IT Tech
 

What's hot (20)

Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking Devices
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
The difference between a hub, switch and router webopedia
The difference between a hub, switch and router   webopediaThe difference between a hub, switch and router   webopedia
The difference between a hub, switch and router webopedia
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
Network devices
Network devicesNetwork devices
Network devices
 
Router vs switch
Router vs switchRouter vs switch
Router vs switch
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
 
networking devices
networking devicesnetworking devices
networking devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
 
Network devices
Network devicesNetwork devices
Network devices
 
Network switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegeNetwork switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom college
 
Basics of Gateway By Naveen Karn
 Basics of Gateway By Naveen Karn Basics of Gateway By Naveen Karn
Basics of Gateway By Naveen Karn
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
Network devices
Network devicesNetwork devices
Network devices
 
Network switches, functions & role in networks
Network switches, functions & role in networksNetwork switches, functions & role in networks
Network switches, functions & role in networks
 

Viewers also liked

basics of php
 basics of php basics of php
basics of php
PRINCE KUMAR
 
Nuevo presentación de microsoft power point
Nuevo presentación de microsoft power pointNuevo presentación de microsoft power point
Nuevo presentación de microsoft power point
Yessenia Correa
 
Nuevo presentación de microsoft power point
Nuevo presentación de microsoft power pointNuevo presentación de microsoft power point
Nuevo presentación de microsoft power point
Yessenia Correa
 
Why should I invest in property?
Why should I invest in property?Why should I invest in property?
Why should I invest in property?
Lifestyle Property People
 
Marketing strategy and implementation for Airtel
Marketing strategy and implementation for AirtelMarketing strategy and implementation for Airtel
Marketing strategy and implementation for Airtel
Merwyn D'souza
 
Orientación
OrientaciónOrientación
Orientación
jesus mendoza
 
Tarea 3 tecnologia new
Tarea 3 tecnologia newTarea 3 tecnologia new
Tarea 3 tecnologia new
anny0721
 
Alexis Straub Internship Outline
Alexis Straub Internship OutlineAlexis Straub Internship Outline
Alexis Straub Internship OutlineAlexis Straub
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
PRINCE KUMAR
 
Tarea 3 tecnologia new
Tarea 3 tecnologia newTarea 3 tecnologia new
Tarea 3 tecnologia new
anny0721
 
Tarea 3 tecnologia new
Tarea 3 tecnologia newTarea 3 tecnologia new
Tarea 3 tecnologia new
anny0721
 
Evolución de la Tecnología
Evolución de la TecnologíaEvolución de la Tecnología
Evolución de la Tecnología
Carolina Solis Real
 
Notice Reliability and Expectation Study
Notice Reliability and Expectation StudyNotice Reliability and Expectation Study
Notice Reliability and Expectation StudyTodd B. Hilsee
 
Palabras y imagenes (definitivo)
Palabras y imagenes (definitivo)Palabras y imagenes (definitivo)
Palabras y imagenes (definitivo)
Ángel de Castro Romero
 
EL ECUADOR
EL ECUADOREL ECUADOR
EL ECUADOR
Yessenia Correa
 
Operation maintenance management public meeting with audio
Operation  maintenance management public meeting with audioOperation  maintenance management public meeting with audio
Operation maintenance management public meeting with audio
snelltim2002
 
Hse new microsoft power point presentation
Hse new microsoft power point presentationHse new microsoft power point presentation
Hse new microsoft power point presentation
Samip Nathani nathani
 

Viewers also liked (20)

basics of php
 basics of php basics of php
basics of php
 
Nuevo presentación de microsoft power point
Nuevo presentación de microsoft power pointNuevo presentación de microsoft power point
Nuevo presentación de microsoft power point
 
Nuevo presentación de microsoft power point
Nuevo presentación de microsoft power pointNuevo presentación de microsoft power point
Nuevo presentación de microsoft power point
 
Why should I invest in property?
Why should I invest in property?Why should I invest in property?
Why should I invest in property?
 
FINAL SD (1)
FINAL SD (1)FINAL SD (1)
FINAL SD (1)
 
Marketing strategy and implementation for Airtel
Marketing strategy and implementation for AirtelMarketing strategy and implementation for Airtel
Marketing strategy and implementation for Airtel
 
Orientación
OrientaciónOrientación
Orientación
 
Tarea 3 tecnologia new
Tarea 3 tecnologia newTarea 3 tecnologia new
Tarea 3 tecnologia new
 
DEKROON RESUME
DEKROON RESUMEDEKROON RESUME
DEKROON RESUME
 
Alexis Straub Internship Outline
Alexis Straub Internship OutlineAlexis Straub Internship Outline
Alexis Straub Internship Outline
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
 
Tarea 3 tecnologia new
Tarea 3 tecnologia newTarea 3 tecnologia new
Tarea 3 tecnologia new
 
Tarea 3 tecnologia new
Tarea 3 tecnologia newTarea 3 tecnologia new
Tarea 3 tecnologia new
 
Evolución de la Tecnología
Evolución de la TecnologíaEvolución de la Tecnología
Evolución de la Tecnología
 
Notice Reliability and Expectation Study
Notice Reliability and Expectation StudyNotice Reliability and Expectation Study
Notice Reliability and Expectation Study
 
ENGINEER cv
ENGINEER cvENGINEER cv
ENGINEER cv
 
Palabras y imagenes (definitivo)
Palabras y imagenes (definitivo)Palabras y imagenes (definitivo)
Palabras y imagenes (definitivo)
 
EL ECUADOR
EL ECUADOREL ECUADOR
EL ECUADOR
 
Operation maintenance management public meeting with audio
Operation  maintenance management public meeting with audioOperation  maintenance management public meeting with audio
Operation maintenance management public meeting with audio
 
Hse new microsoft power point presentation
Hse new microsoft power point presentationHse new microsoft power point presentation
Hse new microsoft power point presentation
 

Similar to Connectivity devices

Network devices
Network devicesNetwork devices
Network devices
NoorNawaz12
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
prajapatidev644
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networking
Rameesh Paul
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)howare
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
lovizabasharat
 
Devices use in computer networking
Devices use in computer networkingDevices use in computer networking
Devices use in computer networking
EzekielHuggins110315
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
Varinder Singh Walia
 
network layer
network layernetwork layer
network layer
BishalWosti1
 
Devices.pptx
Devices.pptxDevices.pptx
Devices.pptx
HamidAsmat
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdf
SanjanaSingh158
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
Osama Yousaf
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
SankalpThaware
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
LemuelCondes4
 
Network devices
Network devicesNetwork devices
Network devices
Sonu Burnwal
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
Rahul P
 
Note: Introduction to Computer Networks
Note: Introduction to Computer Networks Note: Introduction to Computer Networks
Note: Introduction to Computer Networks
Hasibul Islam Nirob
 
Many types of networking devices 2.pdf
Many types of networking devices 2.pdfMany types of networking devices 2.pdf
Many types of networking devices 2.pdf
EIHEducation
 
Ccna
CcnaCcna

Similar to Connectivity devices (20)

Network devices
Network devicesNetwork devices
Network devices
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networking
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
 
Devices use in computer networking
Devices use in computer networkingDevices use in computer networking
Devices use in computer networking
 
W 10 introduction to network
W 10 introduction to networkW 10 introduction to network
W 10 introduction to network
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
 
network layer
network layernetwork layer
network layer
 
Devices.pptx
Devices.pptxDevices.pptx
Devices.pptx
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdf
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
Network devices
Network devicesNetwork devices
Network devices
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
Note: Introduction to Computer Networks
Note: Introduction to Computer Networks Note: Introduction to Computer Networks
Note: Introduction to Computer Networks
 
Many types of networking devices 2.pdf
Many types of networking devices 2.pdfMany types of networking devices 2.pdf
Many types of networking devices 2.pdf
 
Ccna
CcnaCcna
Ccna
 

More from PRINCE KUMAR

RIP vs OSPF
RIP vs OSPFRIP vs OSPF
RIP vs OSPF
PRINCE KUMAR
 
Graphs
GraphsGraphs
Graphs
PRINCE KUMAR
 
Polymorphism Using C++
Polymorphism Using C++Polymorphism Using C++
Polymorphism Using C++
PRINCE KUMAR
 
Fddi
FddiFddi
Binary search tree
Binary search treeBinary search tree
Binary search tree
PRINCE KUMAR
 
php
phpphp
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
PRINCE KUMAR
 
OSI layers
OSI layersOSI layers
OSI layers
PRINCE KUMAR
 
BUILDING WEBSITES ON WORDPRESS
BUILDING WEBSITES ON WORDPRESSBUILDING WEBSITES ON WORDPRESS
BUILDING WEBSITES ON WORDPRESS
PRINCE KUMAR
 

More from PRINCE KUMAR (9)

RIP vs OSPF
RIP vs OSPFRIP vs OSPF
RIP vs OSPF
 
Graphs
GraphsGraphs
Graphs
 
Polymorphism Using C++
Polymorphism Using C++Polymorphism Using C++
Polymorphism Using C++
 
Fddi
FddiFddi
Fddi
 
Binary search tree
Binary search treeBinary search tree
Binary search tree
 
php
phpphp
php
 
Tcp ip tutorial
Tcp ip tutorialTcp ip tutorial
Tcp ip tutorial
 
OSI layers
OSI layersOSI layers
OSI layers
 
BUILDING WEBSITES ON WORDPRESS
BUILDING WEBSITES ON WORDPRESSBUILDING WEBSITES ON WORDPRESS
BUILDING WEBSITES ON WORDPRESS
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Connectivity devices

  • 2. CONTENTS…  COMPUTER NETWORK  IDENTIFICATION OF A NODE IN THE NETWORK  MEDIA & CONNECTORS  CONNECTIVITY DEVICES  TRANSCEIVER  REPEATER  HUB  SWITCH  BRIDGE  ROUTER  GATEWAY
  • 3. COMPUTER NETWORK  A computer network is collection of interlinked nodes.  The goals for which a computer network is established_  Communication  Resource sharing  Reliable environment  To achieve goals a network involves_  Message : Data content.  Sender and Receiver: Nodes  Media : Any thing though which the message is transferred from sender to receiver.  Protocols : Certain algorithms to control communication.
  • 4. IDENTIFICATION OF A NODE IN THE NETWORK  Each Node has an address through which it is identified in the network.  NIC [Network Interface Card]: An special device connected on the motherboard of the computer having a 6 digit hexadecimal address [MAC Address] by which it is identified by matching the logical address[IP Address] at network support layers .
  • 5. MEDIA & CONNECTORS  Any thing though which the message is transferred from sender to receiver is called as Medium.  It may be_  Unguided: Air or Vaccum space.  Guided: A physical way or link between nodes.  E .g; Twisted pair cable (STP, UTP with RJ connectors), Coaxial cable (with RG connectors) and Fibre Optics.
  • 7. CONNECTIVITY DEVICES  The devices used to establish a network are known as CONNECTIVITY DEVICES.  They may be categories as_  Networking Devices  Within a network; HUB, SWITCH etc.  Internetworking Devices.  Between two or more networks; BRIDGE, ROUTER etc
  • 8. TRANSCEIVER  A device that is able to receive as well as transmit signals is known as TRANSCEIVER.
  • 9. REPEATER  A device having capacity to repeat or regenerate the incoming signals.  To make the signals strength constant during transmission.  It is installed at Physical layer in the network.
  • 10. HUB  A HUB is a device used as a central device in star networks.  It broadcasts the message in the entire network, because it can not keep connected nodes addresses.  It is installed at Data link Layer.  It has 4-24 ports.  It may be_  ACTIVE : HUB with Repeater.
  • 11. HUB
  • 12. SWITCH  Like a HUB Switch is also a central device used in star networks.  By default it unicast the message because it keeps the address information of all the connected devices but when broadcasting is allowed it also broadcasts.  It has 4-32 ports normally but also available in 128-256 ports.  Modern Switches have inbuilt Repeaters.  Installed at Layer2 or Layer 3 as required and reads MAC addresses.
  • 14. BRIDGE  A device to connect two or more LANs.  It may be_  Transparent : connects homogeneous LANs.  Translational : connects heterogeneous LANs.  It keeps the information about configurations of all the networks connected via Bridge; such as topologies and access techniques.  Installed at Data link layer.
  • 16. ROUTER  A device that routes the signals between the nodes from source to destination between two or more similar networks.  It is installed at the network layer and capable to read IP addresses of the nodes.  It also keeps the information about the neighbour routers or nodes to maintain the flow of forwarding the data packets and therefore this routers are known as mini computers.
  • 17. ROUTER  Routers have repeaters.  Routers have inbuilt firewall that filtrates the unwanted contents in the data packets.  Routing techniques are helpful to select a path for transmission.  Virtual circuit  Datagram approach
  • 18. ROUTER  Some devices are used as Bridge as well as Routers called BROUTERS.  At a time it works either as a Bridge or as a Router.
  • 19. GATEWAYS  Gateway is a internetworking device.  It is used to interconnect two dissimilar networks.  It is installed at application layer in the network.  Also known as protocol converter.