SlideShare a Scribd company logo
Guide to Networking Essentials,
6th
Edition
Chapter 2: Network Hardware Essentials
Copyright © 2012 Cengage Learning. All rights reserved. 2
Objectives
2
• Describe the basic operation of network repeaters
and hubs
• Explain the purpose of network switches
• Summarize the operation of wireless access points
• Describe the basic operation of network interface
cards
• Explain the function of routers
Copyright © 2012 Cengage Learning. All rights reserved. 3
Network Repeaters and Hubs
• Early networks didn’t use interconnecting devices
• Severely limited the total cable length and number
of computers
Copyright © 2012 Cengage Learning. All rights reserved. 4
Network Repeaters and Hubs
• Some problems were resolved with a device called
a repeater
– A repeater receives bit signals generated by NICs and other
devices, strengthens them, and then “repeats” them to other
parts of the network
• A repeater enables you to connect computers
whose distance from one another would make
communication impossible
• A traditional repeater has two ports or connections
that you can use to extend your network
Copyright © 2012 Cengage Learning. All rights reserved. 5
Network Repeaters and Hubs
A repeater extends the length of a network
Copyright © 2012 Cengage Learning. All rights reserved. 6
Multiport Repeaters and Hubs
• A multiport repeater is just a repeater with several
ports to which you can connect cabling
• Also referred to as a hub
• Receives bit signals generated from a connected
computer on one of its ports
• Cleans the signal by filtering out electrical noise
• Regenerates the signal to full strength
• Transmits the regenerated signal to all other ports
a computer (or other network device) is connected
to
Copyright © 2012 Cengage Learning. All rights reserved. 7
Multiport Repeaters and Hubs
A multiport repeater or hub
Copyright © 2012 Cengage Learning. All rights reserved. 8
Hubs and Network Bandwidth
• Amount of data that can be transferred in an interval is
network bandwidth
– Network bandwidth is usually measured in bits per second
(bps) and networks operate at speeds from 10 million bps up to
10 gigabit per second (Gbps)
• Hubs share bandwidth with all other connected
computers
– Only one computer can successfully transmit data at a time
– Creates a problem on today’s networks due to an increased
dependency on file sharing and the Internet
• Bandwidth sharing – when all computers connected to
the hub must share the amount of bandwidth the hub
provides
Copyright © 2012 Cengage Learning. All rights reserved. 9
Hub Indicator Lights
• Power, link status, network activity, collisions
• Uplink port – port used to connect two hubs
together or hub to a switch
• Simulation 3: Basic operation of a hub
Copyright © 2012 Cengage Learning. All rights reserved. 10
Network Switches
• Looks just like a hub
• Instead of simply regenerating incoming bit signals a
switch, actually reads data in the message, determines
which port the destination device is connected to, and
forwards the message to only that port
• Basic Switch Operation
– Data is sent onto the medium one frame at a time
– The beginning of each frame has the destination MAC address
– Switch reads the addresses:
• Keeps a record of which computer is on which port (switching
table)
• Forwards the frame to the port where the destination MAC can be
found
Copyright © 2012 Cengage Learning. All rights reserved. 11
Network Switches
Switches maintain a switching table
Copyright © 2012 Cengage Learning. All rights reserved. 12
Network Switches
Steps of switch operation:
1. The switch receives a frame.
2. The switch reads the source and destination MAC
addresses.
3. The switch looks up the destination MAC address in
its switching table.
4. The switch forwards the frame to the port where the
computer owning the MAC address is found.
5. The switching table is updated with the source MAC
address and port information.
• Simulation 4: Basic operation of a switch
Copyright © 2012 Cengage Learning. All rights reserved. 13
Switches and Network Bandwidth
• Each port gets dedicated bandwidth
– Instead of having to share bandwidth with all ports
• Many conversations can occur simultaneously
• Can operate in full-duplex mode
– Can send and receive data simultaneously
• Hubs can only operate in half-duplex mode
– Can send or receive (but not both) at one time
• Switches are the preferred device because of
these advantages
Copyright © 2012 Cengage Learning. All rights reserved. 14
Switch Indicator Lights
• Like hubs, switches have indicator lights
• Switches have link status indicators and activity
indicators
• May also have indicators for whether the switch is
operating in full-duplex or half-duplex mode
• Switches can be connected to one another so that
your LAN can grow beyond the limitations of ports
on a single switch
– Some switches have a dedicated port for uplinking to another
switch
Copyright © 2012 Cengage Learning. All rights reserved. 15
Wireless Access Points
• The heart of a wireless network is the wireless
access point (AP)
• APs operate similarly to a hub without wires
• All communication passes through the AP
• Most small business and home networks use a
device typically called a wireless router that
combines the functions of an AP, a switch, and a
router
• Wireless LANs usually attached to wired networks
Copyright © 2012 Cengage Learning. All rights reserved. 16
Wireless Access Points
A wireless router
Copyright © 2012 Cengage Learning. All rights reserved. 17
Basic AP Operation
• Similar to a wired hub
• All stations hear all data being transmitted
• Extra step is required: receiving device sends an
acknowledgment back to the sending device to indicate
successful reception
• Some configurations require additional handshaking:
– sending station must send a request to send (RTS) message
and receive a clear to send (CTS) message before transmitting
– The RTS/CTS “handshake” lets all other stations know that
another station is about to transmit
Copyright © 2012 Cengage Learning. All rights reserved. 18
Wireless APs and Network Bandwidth
• All the extra chatter required to send data in a
wireless network slows communication
• The effective bandwidth is about half of effective
bandwidth found on physical networks
• Most APs operate from 11Mbps to several hundred
Mbps
Copyright © 2012 Cengage Learning. All rights reserved. 19
Network Interface Cards
• Provide a connection from computer to medium
• Incoming messages: Receives bit signals and
assembles them into frames
– Verifies the destination address
– Removes frame header and sends the resulting packet to the
network protocol
• Outgoing messages: receive packets from network
protocol
– Creates frames by adding MAC addresses and error check
– Converts frame into bit signals suitable for the medium and
transmits them
Copyright © 2012 Cengage Learning. All rights reserved. 20
Network Interface Cards
A NIC handles incoming data from the network medium
Copyright © 2012 Cengage Learning. All rights reserved. 21
Network Interface Cards
• Attaching a computer to a network requires a
network interface card (NIC) to create and mediate
the connection between a computer and the
networking medium
– Networking medium might be copper wire, fiber-optic cable, or
airwaves
• Most NICs are built into a computer’s motherboard
– Occasionally fail or additional NICs are needed for an
application
– It is important to know how to install a new NIC
Copyright © 2012 Cengage Learning. All rights reserved. 22
Network Interface Cards
A NIC handles outgoing data to be sent to the network medium
Copyright © 2012 Cengage Learning. All rights reserved. 23
NICs and MAC addresses
 NIC manufacturers ensure that every NIC they produce
has a unique address because networks won’t function
correctly if duplicate MAC addresses exist
 MAC address is stored in read-only memory (ROM) on
the NIC
 Also called the burned-in address (BIA)
 Two 24-bit hexadecimal numbers
– 24-bit manufacturer ID called OUI
– 24-bit serial number assigned by the manufacturer
 48-bit address expressed in 12 hexadecimal digits:
04-40-31-5B-1A-C4
Copyright © 2012 Cengage Learning. All rights reserved. 24
The NIC as a Gatekeeper
• When a frame arrives at a NIC, the NIC checks the
frame’s destination MAC address to see whether it
matches its built-in MAC address
• NIC only permits inbound communications if the
destination MAC:
– Matches the NIC’s burned-in address
– Is a broadcast address (ff-ff-ff-ff-ff-ff)
– NIC is in a special mode called promiscuous
• When the destination MAC address matches the BIA of
a NIC, it’s a unicast frame
Copyright © 2012 Cengage Learning. All rights reserved. 25
The NIC as a Gatekeeper
• When the destination is the broadcast address,
it’s a broadcast frame
– Broadcast frames are intended to be processed by all
computers on the network
• Promiscuous mode – turns off the gatekeeper
functions and enables the NIC to process all
frames it sees
• Simulation 5: How a NIC works
Copyright © 2012 Cengage Learning. All rights reserved. 26
NIC Indicator Lights
• NICs have indicator lights to show status
information
– Usually a link status indicator and an activity indicator
• The link light is usually green when the NIC has a
valid connection to the network medium
• Some NICs support multiple speeds
– There is usually a separate light for each speed so that you can
determine at what speed the NIC is connected to the hub or
switch
– In other cases the light is a different color for each speed, such
as amber for 100 Mbps and green for 1000 Mbps
Copyright © 2012 Cengage Learning. All rights reserved. 27
Selecting a NIC
• Average user may never have to install a NIC because they
are often built into motherboard
• However, an additional NIC or a faster NIC may need to be
installed
• When selecting a NIC you need to select correct bus
interface
– The connection the NIC makes to the motherboard is the bus
connection
– Peripheral Component Interconnect (PCI) are most common
• The NIC driver (software) must be available for your OS
• Desktop NICs versus server NICs
– For desktops, a standard NIC is good enough
– For servers, consider a NIC with onboard memory and multiple ports and
performs faster
Copyright © 2012 Cengage Learning. All rights reserved. 28
NIC Drivers
• Most OSs ship with drivers for wide range of NICs
• Most NICs include drivers for the most common OSs
– In most cases you only need to install the NIC and restart your
computer
– If the OS has a suitable driver available, it is installed
automatically
• After installation, Windows 7 shows your installed NIC
as a Network Connection
• In Windows, each connection is assigned a name as in
“Local Area Connection”, “Local Area Connection 2”
– You can rename these
NIC Drivers
Copyright © 2012 Cengage Learning. All rights reserved. 29
Copyright © 2012 Cengage Learning. All rights reserved. 30
Wireless NICs
• Wireless NICs must be chosen according to type of
wireless AP being used
• Typical ones are Wireless-g, Wireless-n or 802.11 b/g
– The letter g, n, and b refer to the wireless networking standard
the device supports
• Wireless NICs connect to network using service set
identifier (SSID)
– SSID is the name assigned to the wireless network
• You may also need to enter a security key or a
username and password, depending on the network’s
security configuration
Copyright © 2012 Cengage Learning. All rights reserved. 31
Routers
• Most complex device
• Connect LANs together to create an
internetwork
Copyright © 2012 Cengage Learning. All rights reserved. 32
Routers
• Routers are devices that enable multiple LANs to
communicate with one another by forwarding
packets from one LAN to another
Copyright © 2012 Cengage Learning. All rights reserved. 33
Routers
• The following are the differences between routers
and switches
– Routers connect LANs; switches connect computers
– Routers work with logical (IP) addresses’ switches
work with physical (MAC) addresses
– Routers work with packets; switches with frames
– Routers don’t forward broadcasts; switches do
– Routers use routing tables; switches use switching
tables
Copyright © 2012 Cengage Learning. All rights reserved. 34
Routers Connect LANs
• As computers are added to a LAN, effective
communication can suffer
– Broadcast traffic is forwarded to all members of a LAN and can
cause a network to become congested
• The picture on the next slide shows 3 different
groups of users and 3 different servers all
connected by switches
– Since they are connected by switches, they are all part of the
same LAN and all broadcast traffic will be heard by all devices
Copyright © 2012 Cengage Learning. All rights reserved. 35
Routers Connect LANs
Copyright © 2012 Cengage Learning. All rights reserved. 36
Routers Connect LANs
• The picture on the next slide shows a better
solution for the previous network
• The administrator groups users and servers
together based on their department or function
– The router is used to create 3 separate LANs in order to
contain broadcast traffic and facilitate more effective
communication in each department LAN
Copyright © 2012 Cengage Learning. All rights reserved. 37
Routers Connect LANs
Copyright © 2012 Cengage Learning. All rights reserved. 38
Routers Create Broadcast Domains
• The scope of devices to which broadcast frames are
forwarded is called a broadcast domain
– Each router interface in a network creates another broadcast domain
Copyright © 2012 Cengage Learning. All rights reserved. 39
Routers Work with IP Addresses and
Routing Tables
• Routers maintain routing tables composed of IP
network addresses and interface pairs to determine
where to forward packets on an internetwork
Copyright © 2012 Cengage Learning. All rights reserved. 40
Routers Work with IP Addresses and
Routing Tables
• What happens when a router isn’t connected to the
network the packet is addressed to?
• The picture on the following slide shows what the
routing table would look like on each router
between the source and destination networks
Copyright © 2012 Cengage Learning. All rights reserved. 41
Routers Work with IP Addresses and
Routing Tables
Copyright © 2012 Cengage Learning. All rights reserved. 42
Routers Work with IP Addresses and
Routing Tables
• Default route — where to send a packet when the
router doesn’t have an entry in its routing table
• Network unreachable — Message sent when the
network can’t be found and there is no default route
• Default gateway — In a computer’s IP address
configuration – the IP address of the computer’s
router
• Simulation 6: Router operation in a simple internetwork
Copyright © 2012 Cengage Learning. All rights reserved. 43
Chapter Summary
• Network repeaters and hubs take incoming bit signals
and repeat those signals at their original strength out all
connected ports
• Network switches interconnect multiple computers just
as hubs do
• Switches use switching tables to determine which MAC
address can be found on which port
• Access points are a central device in a wireless network
and perform a similar function to hubs
• Network interface cards create and mediate the
connection between the computer and network medium
Copyright © 2012 Cengage Learning. All rights reserved. 44
Chapter Summary
• Wireless NICs perform the same function as wired
NICs
• Routers connect LANs to one another and forward
packets from one LAN to another according to the
destination network specified by the destination IP
address in the packet
• Unlike hubs and switches, routers do not forward
broadcast frames

More Related Content

What's hot

Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
APSU
 
Net essentials6e ch1
Net essentials6e ch1Net essentials6e ch1
Net essentials6e ch1
APSU
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
APSU
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
APSU
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
Vaughan Olufemi ACIB, AICEN, ANIM
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
Osama Yousaf
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
Khan Yousafzai
 
9781111306366 ppt ch8
9781111306366 ppt ch89781111306366 ppt ch8
9781111306366 ppt ch8
Dr. Ahmed Al Zaidy
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15
Chakamru Pak
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer server
Abenezer Abiti
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
Tuan Yang
 
Networking
Networking Networking
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
Herson Franz Ugale
 
Ch07
Ch07Ch07
Chapter10
Chapter10Chapter10
Chapter10
Muhammad Ahad
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Buntha Chhay
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Zainurin Suparman
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Vinnu Vinod Kvk
 

What's hot (19)

Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
 
Net essentials6e ch1
Net essentials6e ch1Net essentials6e ch1
Net essentials6e ch1
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
9781111306366 ppt ch8
9781111306366 ppt ch89781111306366 ppt ch8
9781111306366 ppt ch8
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer server
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
 
Networking
Networking Networking
Networking
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
 
Ch07
Ch07Ch07
Ch07
 
Chapter10
Chapter10Chapter10
Chapter10
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 

Similar to Net essentials6e ch2

NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
bwire sedrick
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
Dinuak Jayawardena
 
LAN Demo
LAN DemoLAN Demo
LAN Demo
alcsoft
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
Jyoti Akhter
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their working
rockingprashik
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
tazbeedrahman
 
Networking Related
Networking RelatedNetworking Related
Networking Related
ZunAib Ali
 
Web technology
Web technologyWeb technology
Web technology
Rotract CLUB of BSAU
 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2
binakasehun2026
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
Suprabha Sahoo
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
Chandrakant Divate
 
Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 
Topology.ppt
Topology.pptTopology.ppt
Topology.ppt
AyansaErgiba2
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
N.CH Karthik
 
Ch 5-network devices
Ch 5-network devicesCh 5-network devices
Ch 5-network devices
gaurav sardhara
 
Basic networking
Basic networkingBasic networking
Data communication
Data communicationData communication
Data communication
Rakibul Islam
 
CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.ppt
Undeadban2
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
ssuser06ea42
 

Similar to Net essentials6e ch2 (20)

NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
LAN Demo
LAN DemoLAN Demo
LAN Demo
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their working
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
Web technology
Web technologyWeb technology
Web technology
 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Topology.ppt
Topology.pptTopology.ppt
Topology.ppt
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Ch 5-network devices
Ch 5-network devicesCh 5-network devices
Ch 5-network devices
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Data communication
Data communicationData communication
Data communication
 
CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.ppt
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 

More from APSU

Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfers
APSU
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
APSU
 
Chapter 9.access to judicial review
Chapter 9.access to judicial reviewChapter 9.access to judicial review
Chapter 9.access to judicial review
APSU
 
Chapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsChapter 8.administrative agency hearings
Chapter 8.administrative agency hearings
APSU
 
Chapter 7.informal proceedings
Chapter 7.informal proceedingsChapter 7.informal proceedings
Chapter 7.informal proceedings
APSU
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planning
APSU
 
Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)
APSU
 
Chapter 4 pp
Chapter 4 ppChapter 4 pp
Chapter 4 pp
APSU
 
Chapter 3.agency discretion
Chapter 3.agency discretionChapter 3.agency discretion
Chapter 3.agency discretion
APSU
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative law
APSU
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagency
APSU
 
Chapter1
Chapter1Chapter1
Chapter1
APSU
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1
APSU
 
Unit 1
Unit 1Unit 1
Unit 1
APSU
 
Time management
Time managementTime management
Time management
APSU
 
Research
ResearchResearch
Research
APSU
 
21st century learner
21st century learner21st century learner
21st century learner
APSU
 
21st century learner
21st century learner21st century learner
21st century learner
APSU
 

More from APSU (18)

Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfers
 
Net essentials6e ch9
Net essentials6e ch9Net essentials6e ch9
Net essentials6e ch9
 
Chapter 9.access to judicial review
Chapter 9.access to judicial reviewChapter 9.access to judicial review
Chapter 9.access to judicial review
 
Chapter 8.administrative agency hearings
Chapter 8.administrative agency hearingsChapter 8.administrative agency hearings
Chapter 8.administrative agency hearings
 
Chapter 7.informal proceedings
Chapter 7.informal proceedingsChapter 7.informal proceedings
Chapter 7.informal proceedings
 
Chapter 6.investigations and information planning
Chapter 6.investigations and information planningChapter 6.investigations and information planning
Chapter 6.investigations and information planning
 
Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)Chapter 5.agency rules and regulations(1)
Chapter 5.agency rules and regulations(1)
 
Chapter 4 pp
Chapter 4 ppChapter 4 pp
Chapter 4 pp
 
Chapter 3.agency discretion
Chapter 3.agency discretionChapter 3.agency discretion
Chapter 3.agency discretion
 
Chapter2.development of administrative law
Chapter2.development of administrative lawChapter2.development of administrative law
Chapter2.development of administrative law
 
Chapter1.admin law&adminagency
Chapter1.admin law&adminagencyChapter1.admin law&adminagency
Chapter1.admin law&adminagency
 
Chapter1
Chapter1Chapter1
Chapter1
 
Logi pp 1
Logi pp 1Logi pp 1
Logi pp 1
 
Unit 1
Unit 1Unit 1
Unit 1
 
Time management
Time managementTime management
Time management
 
Research
ResearchResearch
Research
 
21st century learner
21st century learner21st century learner
21st century learner
 
21st century learner
21st century learner21st century learner
21st century learner
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 

Net essentials6e ch2

  • 1. Guide to Networking Essentials, 6th Edition Chapter 2: Network Hardware Essentials
  • 2. Copyright © 2012 Cengage Learning. All rights reserved. 2 Objectives 2 • Describe the basic operation of network repeaters and hubs • Explain the purpose of network switches • Summarize the operation of wireless access points • Describe the basic operation of network interface cards • Explain the function of routers
  • 3. Copyright © 2012 Cengage Learning. All rights reserved. 3 Network Repeaters and Hubs • Early networks didn’t use interconnecting devices • Severely limited the total cable length and number of computers
  • 4. Copyright © 2012 Cengage Learning. All rights reserved. 4 Network Repeaters and Hubs • Some problems were resolved with a device called a repeater – A repeater receives bit signals generated by NICs and other devices, strengthens them, and then “repeats” them to other parts of the network • A repeater enables you to connect computers whose distance from one another would make communication impossible • A traditional repeater has two ports or connections that you can use to extend your network
  • 5. Copyright © 2012 Cengage Learning. All rights reserved. 5 Network Repeaters and Hubs A repeater extends the length of a network
  • 6. Copyright © 2012 Cengage Learning. All rights reserved. 6 Multiport Repeaters and Hubs • A multiport repeater is just a repeater with several ports to which you can connect cabling • Also referred to as a hub • Receives bit signals generated from a connected computer on one of its ports • Cleans the signal by filtering out electrical noise • Regenerates the signal to full strength • Transmits the regenerated signal to all other ports a computer (or other network device) is connected to
  • 7. Copyright © 2012 Cengage Learning. All rights reserved. 7 Multiport Repeaters and Hubs A multiport repeater or hub
  • 8. Copyright © 2012 Cengage Learning. All rights reserved. 8 Hubs and Network Bandwidth • Amount of data that can be transferred in an interval is network bandwidth – Network bandwidth is usually measured in bits per second (bps) and networks operate at speeds from 10 million bps up to 10 gigabit per second (Gbps) • Hubs share bandwidth with all other connected computers – Only one computer can successfully transmit data at a time – Creates a problem on today’s networks due to an increased dependency on file sharing and the Internet • Bandwidth sharing – when all computers connected to the hub must share the amount of bandwidth the hub provides
  • 9. Copyright © 2012 Cengage Learning. All rights reserved. 9 Hub Indicator Lights • Power, link status, network activity, collisions • Uplink port – port used to connect two hubs together or hub to a switch • Simulation 3: Basic operation of a hub
  • 10. Copyright © 2012 Cengage Learning. All rights reserved. 10 Network Switches • Looks just like a hub • Instead of simply regenerating incoming bit signals a switch, actually reads data in the message, determines which port the destination device is connected to, and forwards the message to only that port • Basic Switch Operation – Data is sent onto the medium one frame at a time – The beginning of each frame has the destination MAC address – Switch reads the addresses: • Keeps a record of which computer is on which port (switching table) • Forwards the frame to the port where the destination MAC can be found
  • 11. Copyright © 2012 Cengage Learning. All rights reserved. 11 Network Switches Switches maintain a switching table
  • 12. Copyright © 2012 Cengage Learning. All rights reserved. 12 Network Switches Steps of switch operation: 1. The switch receives a frame. 2. The switch reads the source and destination MAC addresses. 3. The switch looks up the destination MAC address in its switching table. 4. The switch forwards the frame to the port where the computer owning the MAC address is found. 5. The switching table is updated with the source MAC address and port information. • Simulation 4: Basic operation of a switch
  • 13. Copyright © 2012 Cengage Learning. All rights reserved. 13 Switches and Network Bandwidth • Each port gets dedicated bandwidth – Instead of having to share bandwidth with all ports • Many conversations can occur simultaneously • Can operate in full-duplex mode – Can send and receive data simultaneously • Hubs can only operate in half-duplex mode – Can send or receive (but not both) at one time • Switches are the preferred device because of these advantages
  • 14. Copyright © 2012 Cengage Learning. All rights reserved. 14 Switch Indicator Lights • Like hubs, switches have indicator lights • Switches have link status indicators and activity indicators • May also have indicators for whether the switch is operating in full-duplex or half-duplex mode • Switches can be connected to one another so that your LAN can grow beyond the limitations of ports on a single switch – Some switches have a dedicated port for uplinking to another switch
  • 15. Copyright © 2012 Cengage Learning. All rights reserved. 15 Wireless Access Points • The heart of a wireless network is the wireless access point (AP) • APs operate similarly to a hub without wires • All communication passes through the AP • Most small business and home networks use a device typically called a wireless router that combines the functions of an AP, a switch, and a router • Wireless LANs usually attached to wired networks
  • 16. Copyright © 2012 Cengage Learning. All rights reserved. 16 Wireless Access Points A wireless router
  • 17. Copyright © 2012 Cengage Learning. All rights reserved. 17 Basic AP Operation • Similar to a wired hub • All stations hear all data being transmitted • Extra step is required: receiving device sends an acknowledgment back to the sending device to indicate successful reception • Some configurations require additional handshaking: – sending station must send a request to send (RTS) message and receive a clear to send (CTS) message before transmitting – The RTS/CTS “handshake” lets all other stations know that another station is about to transmit
  • 18. Copyright © 2012 Cengage Learning. All rights reserved. 18 Wireless APs and Network Bandwidth • All the extra chatter required to send data in a wireless network slows communication • The effective bandwidth is about half of effective bandwidth found on physical networks • Most APs operate from 11Mbps to several hundred Mbps
  • 19. Copyright © 2012 Cengage Learning. All rights reserved. 19 Network Interface Cards • Provide a connection from computer to medium • Incoming messages: Receives bit signals and assembles them into frames – Verifies the destination address – Removes frame header and sends the resulting packet to the network protocol • Outgoing messages: receive packets from network protocol – Creates frames by adding MAC addresses and error check – Converts frame into bit signals suitable for the medium and transmits them
  • 20. Copyright © 2012 Cengage Learning. All rights reserved. 20 Network Interface Cards A NIC handles incoming data from the network medium
  • 21. Copyright © 2012 Cengage Learning. All rights reserved. 21 Network Interface Cards • Attaching a computer to a network requires a network interface card (NIC) to create and mediate the connection between a computer and the networking medium – Networking medium might be copper wire, fiber-optic cable, or airwaves • Most NICs are built into a computer’s motherboard – Occasionally fail or additional NICs are needed for an application – It is important to know how to install a new NIC
  • 22. Copyright © 2012 Cengage Learning. All rights reserved. 22 Network Interface Cards A NIC handles outgoing data to be sent to the network medium
  • 23. Copyright © 2012 Cengage Learning. All rights reserved. 23 NICs and MAC addresses  NIC manufacturers ensure that every NIC they produce has a unique address because networks won’t function correctly if duplicate MAC addresses exist  MAC address is stored in read-only memory (ROM) on the NIC  Also called the burned-in address (BIA)  Two 24-bit hexadecimal numbers – 24-bit manufacturer ID called OUI – 24-bit serial number assigned by the manufacturer  48-bit address expressed in 12 hexadecimal digits: 04-40-31-5B-1A-C4
  • 24. Copyright © 2012 Cengage Learning. All rights reserved. 24 The NIC as a Gatekeeper • When a frame arrives at a NIC, the NIC checks the frame’s destination MAC address to see whether it matches its built-in MAC address • NIC only permits inbound communications if the destination MAC: – Matches the NIC’s burned-in address – Is a broadcast address (ff-ff-ff-ff-ff-ff) – NIC is in a special mode called promiscuous • When the destination MAC address matches the BIA of a NIC, it’s a unicast frame
  • 25. Copyright © 2012 Cengage Learning. All rights reserved. 25 The NIC as a Gatekeeper • When the destination is the broadcast address, it’s a broadcast frame – Broadcast frames are intended to be processed by all computers on the network • Promiscuous mode – turns off the gatekeeper functions and enables the NIC to process all frames it sees • Simulation 5: How a NIC works
  • 26. Copyright © 2012 Cengage Learning. All rights reserved. 26 NIC Indicator Lights • NICs have indicator lights to show status information – Usually a link status indicator and an activity indicator • The link light is usually green when the NIC has a valid connection to the network medium • Some NICs support multiple speeds – There is usually a separate light for each speed so that you can determine at what speed the NIC is connected to the hub or switch – In other cases the light is a different color for each speed, such as amber for 100 Mbps and green for 1000 Mbps
  • 27. Copyright © 2012 Cengage Learning. All rights reserved. 27 Selecting a NIC • Average user may never have to install a NIC because they are often built into motherboard • However, an additional NIC or a faster NIC may need to be installed • When selecting a NIC you need to select correct bus interface – The connection the NIC makes to the motherboard is the bus connection – Peripheral Component Interconnect (PCI) are most common • The NIC driver (software) must be available for your OS • Desktop NICs versus server NICs – For desktops, a standard NIC is good enough – For servers, consider a NIC with onboard memory and multiple ports and performs faster
  • 28. Copyright © 2012 Cengage Learning. All rights reserved. 28 NIC Drivers • Most OSs ship with drivers for wide range of NICs • Most NICs include drivers for the most common OSs – In most cases you only need to install the NIC and restart your computer – If the OS has a suitable driver available, it is installed automatically • After installation, Windows 7 shows your installed NIC as a Network Connection • In Windows, each connection is assigned a name as in “Local Area Connection”, “Local Area Connection 2” – You can rename these
  • 29. NIC Drivers Copyright © 2012 Cengage Learning. All rights reserved. 29
  • 30. Copyright © 2012 Cengage Learning. All rights reserved. 30 Wireless NICs • Wireless NICs must be chosen according to type of wireless AP being used • Typical ones are Wireless-g, Wireless-n or 802.11 b/g – The letter g, n, and b refer to the wireless networking standard the device supports • Wireless NICs connect to network using service set identifier (SSID) – SSID is the name assigned to the wireless network • You may also need to enter a security key or a username and password, depending on the network’s security configuration
  • 31. Copyright © 2012 Cengage Learning. All rights reserved. 31 Routers • Most complex device • Connect LANs together to create an internetwork
  • 32. Copyright © 2012 Cengage Learning. All rights reserved. 32 Routers • Routers are devices that enable multiple LANs to communicate with one another by forwarding packets from one LAN to another
  • 33. Copyright © 2012 Cengage Learning. All rights reserved. 33 Routers • The following are the differences between routers and switches – Routers connect LANs; switches connect computers – Routers work with logical (IP) addresses’ switches work with physical (MAC) addresses – Routers work with packets; switches with frames – Routers don’t forward broadcasts; switches do – Routers use routing tables; switches use switching tables
  • 34. Copyright © 2012 Cengage Learning. All rights reserved. 34 Routers Connect LANs • As computers are added to a LAN, effective communication can suffer – Broadcast traffic is forwarded to all members of a LAN and can cause a network to become congested • The picture on the next slide shows 3 different groups of users and 3 different servers all connected by switches – Since they are connected by switches, they are all part of the same LAN and all broadcast traffic will be heard by all devices
  • 35. Copyright © 2012 Cengage Learning. All rights reserved. 35 Routers Connect LANs
  • 36. Copyright © 2012 Cengage Learning. All rights reserved. 36 Routers Connect LANs • The picture on the next slide shows a better solution for the previous network • The administrator groups users and servers together based on their department or function – The router is used to create 3 separate LANs in order to contain broadcast traffic and facilitate more effective communication in each department LAN
  • 37. Copyright © 2012 Cengage Learning. All rights reserved. 37 Routers Connect LANs
  • 38. Copyright © 2012 Cengage Learning. All rights reserved. 38 Routers Create Broadcast Domains • The scope of devices to which broadcast frames are forwarded is called a broadcast domain – Each router interface in a network creates another broadcast domain
  • 39. Copyright © 2012 Cengage Learning. All rights reserved. 39 Routers Work with IP Addresses and Routing Tables • Routers maintain routing tables composed of IP network addresses and interface pairs to determine where to forward packets on an internetwork
  • 40. Copyright © 2012 Cengage Learning. All rights reserved. 40 Routers Work with IP Addresses and Routing Tables • What happens when a router isn’t connected to the network the packet is addressed to? • The picture on the following slide shows what the routing table would look like on each router between the source and destination networks
  • 41. Copyright © 2012 Cengage Learning. All rights reserved. 41 Routers Work with IP Addresses and Routing Tables
  • 42. Copyright © 2012 Cengage Learning. All rights reserved. 42 Routers Work with IP Addresses and Routing Tables • Default route — where to send a packet when the router doesn’t have an entry in its routing table • Network unreachable — Message sent when the network can’t be found and there is no default route • Default gateway — In a computer’s IP address configuration – the IP address of the computer’s router • Simulation 6: Router operation in a simple internetwork
  • 43. Copyright © 2012 Cengage Learning. All rights reserved. 43 Chapter Summary • Network repeaters and hubs take incoming bit signals and repeat those signals at their original strength out all connected ports • Network switches interconnect multiple computers just as hubs do • Switches use switching tables to determine which MAC address can be found on which port • Access points are a central device in a wireless network and perform a similar function to hubs • Network interface cards create and mediate the connection between the computer and network medium
  • 44. Copyright © 2012 Cengage Learning. All rights reserved. 44 Chapter Summary • Wireless NICs perform the same function as wired NICs • Routers connect LANs to one another and forward packets from one LAN to another according to the destination network specified by the destination IP address in the packet • Unlike hubs and switches, routers do not forward broadcast frames