SlideShare a Scribd company logo
Network DevicesNetwork Devices
ObjectivesObjectives
• Explain the uses, advantages, and
disadvantages of repeaters
• Explain the uses, advantages, and
disadvantages of hubs
• Define network segmentation
• Explain network segmentation using
bridges
RepeatersRepeaters
• The number of nodes on a network and the
length of cable used influence the quality of
communication on the network
• Attenuation
– Natural degradation of a transmitted signal over
distance
• Repeaters work against attenuation by repeating
signals that they receive on a network
- Typically cleaning and regenerating the digital
transmission in the process
RepeatersRepeaters
Figure 2-1:
Repeater
RepeatersRepeaters
• Note that on analog networks, devices that boost
the signal are called amplifiers
• These devices do not have the same signal
regeneration capabilities as repeaters because
they must maintain the shape of the received
signal
– Therefore, noise tends to amplified with the signal
RepeatersRepeaters
• Repeaters work in the Physical layer (layer 1)
• On optical networks, signal amplification is
handled by optical repeaters
• Some repeaters can be used to connect two
physically different types of cabling
RepeaterRepeater
HubsHubs
• Generic connection device used to tie several
networking cables together to create a link
between different stations on a network
• Hubs that are plugged into electric power are
called active hubs
• A hub that merely connects different cables on a
network and provides no signal regeneration is
called a passive hub and is not a repeater
• Active hubs
– Amplify or repeat signals that pass through them
• Passive hub
– Merely connects cables on a network and provides
no signal regeneration
HubsHubs
• “Hub” is a generic term applied to many different
network-connection devices
• If a hub in some way segments or subdivides the
traffic on a network, it is an intelligent, or
switching, hub
Hubs
Hubs, are simple devices that interconnect
groups of users.
Hubs forward any data packets they receive over one port
from one workstation—including e-mail, word processing
documents, spreadsheets, graphics, or print requests—to all of
their remaining ports.
All users connected to a single hub sharing
the hub’s bandwidth or data-carrying capacity.
Examples of Cisco hub products:
Cisco Micro Hub series
Cisco FastHub® series
HubsHubs
• Topology
– Usually refers to the physical layout of network
cable and devices
– When all stations are connected to a central hub,
the topology is known as a star because of its
appearance
HubsHubs
Figure 2-2:
Star topology
Advantages and Disadvantages ofAdvantages and Disadvantages of
Repeaters and HubsRepeaters and Hubs
• Advantages of using repeaters on your
network:
– Repeaters can extend a network’s total distance
– Repeaters do not seriously impact network
performance
– Certain repeaters can connect networks using
different physical media
Advantages and Disadvantages ofAdvantages and Disadvantages of
Repeaters and HubsRepeaters and Hubs
• Disadvantages of using repeaters on your network:
– Repeaters cannot connect different network
architectures, such as Token Ring and Ethernet
– Repeaters do not reduce network traffic
* They repeat everything they received
– Repeaters do not segment the network
– Do not reformat data structures
• Cannot connect networks that require different
types of frames
Advantages and Disadvantages ofAdvantages and Disadvantages of
Repeaters and HubsRepeaters and Hubs
• Because repeaters do not segment a network,
devices separated only by a repeater are
susceptible to data packet collision, since they are
part of the same collision domain
• Collision domain
– In Ethernet networking, a single segment on a
network
Network SegmentationNetwork Segmentation
• Segmentation
– Process of breaking a network into smaller broadcast
or collision domains
• Segment
– Part of a network that is divided logically or physically
from the rest of the network
• When network administrators place too many nodes
on the same network segment
– Causes the number of collisions to increase
Network SegmentationNetwork Segmentation
BridgesBridges
• Operate at the Data Link layer of the OSI model
• Filters traffic between network segments by
examining the destination MAC address
– Based on this destination MAC address, the bridge either
forwards or discards the frame
– When a client sends a broadcast frame to the entire
network, the bridge will always forward the frame
– Reduce network traffic by keeping local traffic on the
local segment
BridgesBridges
• Broadcast frame
– Frame destined for all computers on the network
Transparent BridgesTransparent Bridges
• Also called learning bridges because they build a
table of MAC addresses as they receive frames
– This means that they “learn” which addresses are on which
segments
• The bridge uses the source MAC addresses to
determine which addresses are on which segments
– By determining a frame’s origin, the bridge knows where
to send frames in the future
• Ethernet networks mainly use transparent bridges
Advantages and Disadvantages ofAdvantages and Disadvantages of
BridgesBridges
• Advantages of using a bridge include:
– Bridges can extend a network by acting as a repeater
– Bridges can reduce network traffic on a segment by
subdividing network communications
– Bridges increase the available bandwidth to individual
nodes because fewer nodes share a collision domain
– Bridges reduce the likelihood of network collisions
– Some bridges connect networks using different media
types and architectures
Advantages and Disadvantages ofAdvantages and Disadvantages of
BridgesBridges
• Disadvantages of using a bridge include:
– Because bridges do more than repeaters by
viewing the MAC addresses, the extra processing
makes them slower than repeaters
* Extra processing by viewing MAC addresses
– Bridges forward broadcast frames
indiscriminately, so they do not filter broadcast
traffic
– Bridges are more expensive than repeaters
Advantages and Disadvantages ofAdvantages and Disadvantages of
BridgesBridges
• Because bridges forward broadcast traffic, it
can be a major disadvantage on a network
during a broadcast storm
• Broadcast storm
– Excessive broadcast messages to every host on the
network, launched by multiple computers
– When two or more stations engage in the
transmission of excessive broadcast traffic
SwitchesSwitches
• Increase network performance by reducing the
number of packets transmitted to the rest of
the network
• Like bridges, operate at the Data Link layer of
the OSI model
• In an Ethernet network, computers are usually
connected directly to a switch
SwitchesSwitches
• Bandwidth
– Available capacity of a network
• Contention
– Condition that occurs when computers on a
network must share the available capacity of the
network wire with other computers
SwitchesSwitches
• Advantages of switches include:
– Switches increase available network bandwidth
– With switches, there is reduced workload on
individual computers
– Switches increase network performance
– There are fewer frame collisions because switches
create collision domains for each connection
– Switches have an unlimited number of ports and
connect directly to workstations
SwitchesSwitches
• Disadvantages of switches include:
– Switches are significantly more expensive than
bridges
– Network connectivity problems can be difficult to
trace through a switch
– Broadcast traffic may be troublesome
RoutersRouters
• Provide filtering and network traffic control
on LANs and WANs
• Can connect multiple segments and multiple
networks
– Networks connected by routers are called
internetworks because they create a larger
network of interconnected, smaller networks
RoutersRouters
• When a router is introduced into a network, it
creates more networks
• Routers create collision domains and they also
create broadcast domains because a router will
not pass broadcast traffic
– A broadcast domain is a group of network devices
that will receive LAN broadcast traffic from each
other
Routers not only connect networks in a single location or
set of buildings, but they provide interfaces— or
“sockets”—for connecting to wide-area network (WAN)
services.
Examples of Cisco router products:
Cisco 700 series
Cisco 1000 series
Cisco 1600 series
Cisco 2500 series
Cisco 2600 series
Cisco 3600 series
Cisco 4500 series
Physical versus Logical AddressesPhysical versus Logical Addresses
• Subnetwork
– Portion of the network created by manipulating a
network address and breaking it down into smaller
parts
• IP address
– 32-bit binary address used on TCP/IP networks
– Consists of a host portion and a network portion
Physical versus Logical AddressesPhysical versus Logical Addresses
• Notice that
each port
(connection)
on the router
has its own
unique IP
address
Figure 2-5:
Router
Advantages and Disadvantages ofAdvantages and Disadvantages of
RoutersRouters
• Advantages of routers:
– Routers can connect different network
architectures
– Routes can choose the best path across the
network using dynamic routing techniques
– Routers can create collision domains by
segmenting the network
– Routers reduce network traffic because they do
not retransmit network broadcast traffic
Advantages and Disadvantages ofAdvantages and Disadvantages of
RoutersRouters
• Disadvantages of routers:
– Routers work only with routable network protocols
– Routers are more expensive than bridges or repeaters
– Dynamic router communication causes additional
network overhead
– Routers are slower than bridges or switches because
they must analyze a data transmission from the
Physical through the Network layer
BroutersBrouters
• Device that functions as:
– A bridge for nonroutable protocols
– A router for routable protocols
• Operates at both the Data Link and Network
layers
GatewaysGateways
• Gateways
– Combination of hardware and software
– Translate between different protocols on a
network
• Latency
– Delay on a network caused by a variety of factors
A gateway provides a LAN with access to a
different type of network, an internetwork,
a mainframe computer, or a particular type
of operating environment.
A gateway serves to connect networks with very
different architectures, for example, a LAN and
an X.25 packet-switching service. Gateways are
also used to provide access to special services,
such as e-mail (electronic mail), fax, and Telex.
Gateways can operate at several of the higher OSI
Reference Model levels, most
notably at the session, presentation, and application
layers.
In doing their work, gateways may change the
representation of data before passing it on. For example, a
gateway may convert from ASCII to EBCDIC on the way
to an IBM mainframe, encrypting or decrypting data
between the source and destination environments.
Gateways also must do protocol conversion, since the
different environments
connected by a gateway will generally use different
protocol families.
Chapter SummaryChapter Summary
• Network administrators use devices to control
and extend usable size of a network
• Repeaters work against attenuation by cleaning
and repeating signals that they receive on a
network
• A hub ties several networking cables together to
create a link between different stations on a
network
Chapter SummaryChapter Summary
• Bridges and switches are devices commonly used to
segment networks
• Routers provide filtering and network-traffic control
on LANs and WANs
• A brouter is a hybrid device that functions both as
bridge for nonroutable protocol and a router for
routable protocols
• Gateways are usually a combination of hardware and
software and are used to translate between different
protocols
Hub
Routers
Compared to switches and bridges, routers are
smarter.
. Based on a network roadmap called a “routing table,”
routers can help ensure that packets are traveling the
most efficient paths to their destinations.
If a link between two routers goes
down, the sending router can determine an alternate
route to keep traffic moving.
Routers also provide links between networks that
speak different languages—or, in computer speak—
networks that use different “protocols.” Examples
include IP (Internet Protocol) and AppleTalk.
Network devices (2)
Network devices (2)

More Related Content

What's hot

linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
saigopinadh bodigiri
 
go back n protocol
go back n protocolgo back n protocol
go back n protocol
shivani monga
 
Chap5 slides
Chap5 slidesChap5 slides
Chap5 slides
BaliThorat1
 
Midpoint circle algo
Midpoint circle algoMidpoint circle algo
Midpoint circle algoMohd Arif
 
System interconnect architecture
System interconnect architectureSystem interconnect architecture
System interconnect architecture
Gagan Kumar
 
COMPUTER NETWORKS NOTES Unit 4
COMPUTER NETWORKS NOTES  Unit 4 COMPUTER NETWORKS NOTES  Unit 4
COMPUTER NETWORKS NOTES Unit 4
sudhakce
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
ankita pandey
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
Harshita Yadav
 
NP completeness
NP completenessNP completeness
NP completeness
Amrinder Arora
 
Sliding window
 Sliding window Sliding window
Sliding windowradhaswam
 
Parallel algorithms
Parallel algorithmsParallel algorithms
Parallel algorithmsguest084d20
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
raksharao
 
Rarp
RarpRarp
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 
Basic communication operations - One to all Broadcast
Basic communication operations - One to all BroadcastBasic communication operations - One to all Broadcast
Basic communication operations - One to all Broadcast
RashiJoshi11
 
Elements of dynamic programming
Elements of dynamic programmingElements of dynamic programming
Elements of dynamic programming
Tafhim Islam
 
NLP_KASHK:Smoothing N-gram Models
NLP_KASHK:Smoothing N-gram ModelsNLP_KASHK:Smoothing N-gram Models
NLP_KASHK:Smoothing N-gram Models
Hemantha Kulathilake
 
Handover management
Handover managementHandover management
Handover management
Hashmatullah Pashai
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 

What's hot (20)

linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
 
go back n protocol
go back n protocolgo back n protocol
go back n protocol
 
Chap5 slides
Chap5 slidesChap5 slides
Chap5 slides
 
Midpoint circle algo
Midpoint circle algoMidpoint circle algo
Midpoint circle algo
 
System interconnect architecture
System interconnect architectureSystem interconnect architecture
System interconnect architecture
 
COMPUTER NETWORKS NOTES Unit 4
COMPUTER NETWORKS NOTES  Unit 4 COMPUTER NETWORKS NOTES  Unit 4
COMPUTER NETWORKS NOTES Unit 4
 
EULER AND FERMAT THEOREM
EULER AND FERMAT THEOREMEULER AND FERMAT THEOREM
EULER AND FERMAT THEOREM
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
NP completeness
NP completenessNP completeness
NP completeness
 
Sliding window
 Sliding window Sliding window
Sliding window
 
Parallel algorithms
Parallel algorithmsParallel algorithms
Parallel algorithms
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Rarp
RarpRarp
Rarp
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Basic communication operations - One to all Broadcast
Basic communication operations - One to all BroadcastBasic communication operations - One to all Broadcast
Basic communication operations - One to all Broadcast
 
Elements of dynamic programming
Elements of dynamic programmingElements of dynamic programming
Elements of dynamic programming
 
NLP_KASHK:Smoothing N-gram Models
NLP_KASHK:Smoothing N-gram ModelsNLP_KASHK:Smoothing N-gram Models
NLP_KASHK:Smoothing N-gram Models
 
Handover management
Handover managementHandover management
Handover management
 
Network Layer
Network LayerNetwork Layer
Network Layer
 

Viewers also liked

Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
Using information
Using informationUsing information
Using information
mrscjrobertson
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
Zuhaib Zaroon
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Avishek Maitra
 
Networking topics like ISP,DNS etc
Networking topics like ISP,DNS etcNetworking topics like ISP,DNS etc
Networking topics like ISP,DNS etcKamlesh Nishad
 
Deployment guide1
Deployment guide1Deployment guide1
Deployment guide1
Programmer
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
Annajab
 
Computer network
Computer networkComputer network
Computer network
Rahul Das
 
Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 
HUB Presentation
HUB PresentationHUB Presentation
HUB Presentation
Connie Eberhart
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
Mahesh_Naidu
 
Presentation on basic networking
Presentation on basic networkingPresentation on basic networking
Presentation on basic networking
qshamim07
 
Basic networking
Basic networkingBasic networking
Basic networking
ajeeshr3
 
Highlights in Computer History
Highlights in Computer HistoryHighlights in Computer History
Highlights in Computer HistoryBuffalo Seminary
 
8. internal components of router
8. internal components of router8. internal components of router
8. internal components of routerSwarndeep Singh
 
Networking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and DisadvantagesNetworking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and Disadvantages
Anit Thapaliya
 

Viewers also liked (20)

Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Using information
Using informationUsing information
Using information
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
 
Connecting devices ece 702
Connecting devices ece 702Connecting devices ece 702
Connecting devices ece 702
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 
Switch y hub
Switch y hubSwitch y hub
Switch y hub
 
Networking topics like ISP,DNS etc
Networking topics like ISP,DNS etcNetworking topics like ISP,DNS etc
Networking topics like ISP,DNS etc
 
Deployment guide1
Deployment guide1Deployment guide1
Deployment guide1
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
 
Computer network
Computer networkComputer network
Computer network
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
HUB Presentation
HUB PresentationHUB Presentation
HUB Presentation
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
Presentation on basic networking
Presentation on basic networkingPresentation on basic networking
Presentation on basic networking
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Highlights in Computer History
Highlights in Computer HistoryHighlights in Computer History
Highlights in Computer History
 
8. internal components of router
8. internal components of router8. internal components of router
8. internal components of router
 
Networking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and DisadvantagesNetworking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and Disadvantages
 

Similar to Network devices (2)

Network devices
Network devicesNetwork devices
Network devices
Dhani Ahmad
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
Jyoti Akhter
 
Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02
Aman Jaiswal
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
21viveksingh
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
Aswini Badatya
 
CCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONCCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATION
Shankar Ghorpade
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
itwkd
 
Unit 1
Unit 1Unit 1
Unit 1
sasi
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
Kamal Acharya
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
suchita74
 
Networking dcoer
Networking dcoerNetworking dcoer
Networking dcoer
Rahul More_Rahul2008
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
Aneesh Nelavelly
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
Syaiful Ahdan
 
Basic Network cisco depth of basic knowledge I. All technologies.pdf
Basic Network cisco depth of basic knowledge I. All technologies.pdfBasic Network cisco depth of basic knowledge I. All technologies.pdf
Basic Network cisco depth of basic knowledge I. All technologies.pdf
Course11
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
DrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
DrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
DrPreethiD1
 

Similar to Network devices (2) (20)

Network devices
Network devicesNetwork devices
Network devices
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
 
CCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONCCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATION
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Media Access Layer
Media Access LayerMedia Access Layer
Media Access Layer
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Networking dcoer
Networking dcoerNetworking dcoer
Networking dcoer
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
presentation on type of toplogy and network
presentation on type of toplogy and networkpresentation on type of toplogy and network
presentation on type of toplogy and network
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
 
Basic Network cisco depth of basic knowledge I. All technologies.pdf
Basic Network cisco depth of basic knowledge I. All technologies.pdfBasic Network cisco depth of basic knowledge I. All technologies.pdf
Basic Network cisco depth of basic knowledge I. All technologies.pdf
 
Network devices
Network devicesNetwork devices
Network devices
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 

More from Dhani Ahmad

Strategic planning
Strategic planningStrategic planning
Strategic planning
Dhani Ahmad
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
Dhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
Dhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
Dhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
Dhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
Dhani Ahmad
 
The need for security
The need for securityThe need for security
The need for security
Dhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security audit
Dhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologies
Dhani Ahmad
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
Dhani Ahmad
 
Secure
SecureSecure
Secure
Dhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
Dhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management i
Dhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
Dhani Ahmad
 
Physical security
Physical securityPhysical security
Physical security
Dhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
Dhani Ahmad
 

More from Dhani Ahmad (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Information system
Information systemInformation system
Information system
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Network devices (2)

  • 2. ObjectivesObjectives • Explain the uses, advantages, and disadvantages of repeaters • Explain the uses, advantages, and disadvantages of hubs • Define network segmentation • Explain network segmentation using bridges
  • 3. RepeatersRepeaters • The number of nodes on a network and the length of cable used influence the quality of communication on the network • Attenuation – Natural degradation of a transmitted signal over distance • Repeaters work against attenuation by repeating signals that they receive on a network - Typically cleaning and regenerating the digital transmission in the process
  • 5. RepeatersRepeaters • Note that on analog networks, devices that boost the signal are called amplifiers • These devices do not have the same signal regeneration capabilities as repeaters because they must maintain the shape of the received signal – Therefore, noise tends to amplified with the signal
  • 6. RepeatersRepeaters • Repeaters work in the Physical layer (layer 1) • On optical networks, signal amplification is handled by optical repeaters • Some repeaters can be used to connect two physically different types of cabling
  • 8. HubsHubs • Generic connection device used to tie several networking cables together to create a link between different stations on a network • Hubs that are plugged into electric power are called active hubs • A hub that merely connects different cables on a network and provides no signal regeneration is called a passive hub and is not a repeater
  • 9. • Active hubs – Amplify or repeat signals that pass through them • Passive hub – Merely connects cables on a network and provides no signal regeneration
  • 10. HubsHubs • “Hub” is a generic term applied to many different network-connection devices • If a hub in some way segments or subdivides the traffic on a network, it is an intelligent, or switching, hub
  • 11. Hubs Hubs, are simple devices that interconnect groups of users. Hubs forward any data packets they receive over one port from one workstation—including e-mail, word processing documents, spreadsheets, graphics, or print requests—to all of their remaining ports. All users connected to a single hub sharing the hub’s bandwidth or data-carrying capacity. Examples of Cisco hub products: Cisco Micro Hub series Cisco FastHub® series
  • 12. HubsHubs • Topology – Usually refers to the physical layout of network cable and devices – When all stations are connected to a central hub, the topology is known as a star because of its appearance
  • 14. Advantages and Disadvantages ofAdvantages and Disadvantages of Repeaters and HubsRepeaters and Hubs • Advantages of using repeaters on your network: – Repeaters can extend a network’s total distance – Repeaters do not seriously impact network performance – Certain repeaters can connect networks using different physical media
  • 15. Advantages and Disadvantages ofAdvantages and Disadvantages of Repeaters and HubsRepeaters and Hubs • Disadvantages of using repeaters on your network: – Repeaters cannot connect different network architectures, such as Token Ring and Ethernet – Repeaters do not reduce network traffic * They repeat everything they received – Repeaters do not segment the network – Do not reformat data structures • Cannot connect networks that require different types of frames
  • 16. Advantages and Disadvantages ofAdvantages and Disadvantages of Repeaters and HubsRepeaters and Hubs • Because repeaters do not segment a network, devices separated only by a repeater are susceptible to data packet collision, since they are part of the same collision domain • Collision domain – In Ethernet networking, a single segment on a network
  • 17. Network SegmentationNetwork Segmentation • Segmentation – Process of breaking a network into smaller broadcast or collision domains • Segment – Part of a network that is divided logically or physically from the rest of the network • When network administrators place too many nodes on the same network segment – Causes the number of collisions to increase
  • 19. BridgesBridges • Operate at the Data Link layer of the OSI model • Filters traffic between network segments by examining the destination MAC address – Based on this destination MAC address, the bridge either forwards or discards the frame – When a client sends a broadcast frame to the entire network, the bridge will always forward the frame – Reduce network traffic by keeping local traffic on the local segment
  • 20. BridgesBridges • Broadcast frame – Frame destined for all computers on the network
  • 21.
  • 22. Transparent BridgesTransparent Bridges • Also called learning bridges because they build a table of MAC addresses as they receive frames – This means that they “learn” which addresses are on which segments • The bridge uses the source MAC addresses to determine which addresses are on which segments – By determining a frame’s origin, the bridge knows where to send frames in the future • Ethernet networks mainly use transparent bridges
  • 23. Advantages and Disadvantages ofAdvantages and Disadvantages of BridgesBridges • Advantages of using a bridge include: – Bridges can extend a network by acting as a repeater – Bridges can reduce network traffic on a segment by subdividing network communications – Bridges increase the available bandwidth to individual nodes because fewer nodes share a collision domain – Bridges reduce the likelihood of network collisions – Some bridges connect networks using different media types and architectures
  • 24. Advantages and Disadvantages ofAdvantages and Disadvantages of BridgesBridges • Disadvantages of using a bridge include: – Because bridges do more than repeaters by viewing the MAC addresses, the extra processing makes them slower than repeaters * Extra processing by viewing MAC addresses – Bridges forward broadcast frames indiscriminately, so they do not filter broadcast traffic – Bridges are more expensive than repeaters
  • 25. Advantages and Disadvantages ofAdvantages and Disadvantages of BridgesBridges • Because bridges forward broadcast traffic, it can be a major disadvantage on a network during a broadcast storm • Broadcast storm – Excessive broadcast messages to every host on the network, launched by multiple computers – When two or more stations engage in the transmission of excessive broadcast traffic
  • 26. SwitchesSwitches • Increase network performance by reducing the number of packets transmitted to the rest of the network • Like bridges, operate at the Data Link layer of the OSI model • In an Ethernet network, computers are usually connected directly to a switch
  • 27. SwitchesSwitches • Bandwidth – Available capacity of a network • Contention – Condition that occurs when computers on a network must share the available capacity of the network wire with other computers
  • 28. SwitchesSwitches • Advantages of switches include: – Switches increase available network bandwidth – With switches, there is reduced workload on individual computers – Switches increase network performance – There are fewer frame collisions because switches create collision domains for each connection – Switches have an unlimited number of ports and connect directly to workstations
  • 29. SwitchesSwitches • Disadvantages of switches include: – Switches are significantly more expensive than bridges – Network connectivity problems can be difficult to trace through a switch – Broadcast traffic may be troublesome
  • 30. RoutersRouters • Provide filtering and network traffic control on LANs and WANs • Can connect multiple segments and multiple networks – Networks connected by routers are called internetworks because they create a larger network of interconnected, smaller networks
  • 31. RoutersRouters • When a router is introduced into a network, it creates more networks • Routers create collision domains and they also create broadcast domains because a router will not pass broadcast traffic – A broadcast domain is a group of network devices that will receive LAN broadcast traffic from each other
  • 32. Routers not only connect networks in a single location or set of buildings, but they provide interfaces— or “sockets”—for connecting to wide-area network (WAN) services. Examples of Cisco router products: Cisco 700 series Cisco 1000 series Cisco 1600 series Cisco 2500 series Cisco 2600 series Cisco 3600 series Cisco 4500 series
  • 33. Physical versus Logical AddressesPhysical versus Logical Addresses • Subnetwork – Portion of the network created by manipulating a network address and breaking it down into smaller parts • IP address – 32-bit binary address used on TCP/IP networks – Consists of a host portion and a network portion
  • 34. Physical versus Logical AddressesPhysical versus Logical Addresses • Notice that each port (connection) on the router has its own unique IP address Figure 2-5: Router
  • 35. Advantages and Disadvantages ofAdvantages and Disadvantages of RoutersRouters • Advantages of routers: – Routers can connect different network architectures – Routes can choose the best path across the network using dynamic routing techniques – Routers can create collision domains by segmenting the network – Routers reduce network traffic because they do not retransmit network broadcast traffic
  • 36. Advantages and Disadvantages ofAdvantages and Disadvantages of RoutersRouters • Disadvantages of routers: – Routers work only with routable network protocols – Routers are more expensive than bridges or repeaters – Dynamic router communication causes additional network overhead – Routers are slower than bridges or switches because they must analyze a data transmission from the Physical through the Network layer
  • 37. BroutersBrouters • Device that functions as: – A bridge for nonroutable protocols – A router for routable protocols • Operates at both the Data Link and Network layers
  • 38. GatewaysGateways • Gateways – Combination of hardware and software – Translate between different protocols on a network • Latency – Delay on a network caused by a variety of factors
  • 39. A gateway provides a LAN with access to a different type of network, an internetwork, a mainframe computer, or a particular type of operating environment. A gateway serves to connect networks with very different architectures, for example, a LAN and an X.25 packet-switching service. Gateways are also used to provide access to special services, such as e-mail (electronic mail), fax, and Telex.
  • 40. Gateways can operate at several of the higher OSI Reference Model levels, most notably at the session, presentation, and application layers. In doing their work, gateways may change the representation of data before passing it on. For example, a gateway may convert from ASCII to EBCDIC on the way to an IBM mainframe, encrypting or decrypting data between the source and destination environments. Gateways also must do protocol conversion, since the different environments connected by a gateway will generally use different protocol families.
  • 41. Chapter SummaryChapter Summary • Network administrators use devices to control and extend usable size of a network • Repeaters work against attenuation by cleaning and repeating signals that they receive on a network • A hub ties several networking cables together to create a link between different stations on a network
  • 42. Chapter SummaryChapter Summary • Bridges and switches are devices commonly used to segment networks • Routers provide filtering and network-traffic control on LANs and WANs • A brouter is a hybrid device that functions both as bridge for nonroutable protocol and a router for routable protocols • Gateways are usually a combination of hardware and software and are used to translate between different protocols
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48. Hub
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54. Routers Compared to switches and bridges, routers are smarter. . Based on a network roadmap called a “routing table,” routers can help ensure that packets are traveling the most efficient paths to their destinations. If a link between two routers goes down, the sending router can determine an alternate route to keep traffic moving.
  • 55. Routers also provide links between networks that speak different languages—or, in computer speak— networks that use different “protocols.” Examples include IP (Internet Protocol) and AppleTalk.