Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
All but the most basic of networks require devices to provide connectivity and functionality. Understanding how these networking devices operate and identifying the tasks they perform are important skills for any network administrator and requirements for a Network+ candidate.
This brief guide introduces usually used networking devices that you may encounter in your career as Network Administrator. This guide is also useful for BCS students and for passionate network learners.
Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
All but the most basic of networks require devices to provide connectivity and functionality. Understanding how these networking devices operate and identifying the tasks they perform are important skills for any network administrator and requirements for a Network+ candidate.
This brief guide introduces usually used networking devices that you may encounter in your career as Network Administrator. This guide is also useful for BCS students and for passionate network learners.
group of computers connected with each other to share information or resources. A network can be small or a large. it can be created in a building or spread all over the world. Networks are main source of communication all over the world. The most common resource shared today is connection to the Internet.
Classification of Networks
Major Types of Networks
Topologies of Network for Local Area Networks
P2P Networks
Client to Server Network
Mesh topology
star topology
bus topology
Network technology refers to the various methods and protocols used to transmit data and information between devices over a network, such as the internet or a local area network (LAN). Examples of network technologies include Ethernet, TCP/IP, and Wi-Fi. These technologies are used to connect devices such as computers, servers, routers, and switches, allowing them to communicate and exchange information.Networking is the practice of connecting devices, such as computers, servers, and mobile devices, to allow them to communicate and exchange information. This can be done over a variety of networks, such as a local area network (LAN), a wide area network (WAN), or the internet. Networking enables the sharing of resources, such as files and printers, and facilitates communication, such as email and instant messaging.
Networks can be wired or wireless, and can vary in size from a small home network to a large enterprise network spanning multiple locations. Networking technologies and protocols, such as Ethernet, TCP/IP, and Wi-Fi, are used to connect devices and transmit data. Networking is essential for connecting devices in today's digital age, and is used in many industries, including business, education, and healthcare.
For beginners in Computer Networking field, know about basics about what is Computer Networks, what are ways through which we can communicate, what is meant by protocols, he famous OSI its layers and TCP/IP and its layers, What makes a Networking Device, basic topologies of Computer Networks, special purpose network devices like Switch, routers, repeter, bridges and hub, and basics of networking methods, basics of ethernet, TCP its characteristics, UDP, TCP vs UDP, One would wonder what happens when information particular to each layer is read by the corresponding protocols at target machine or why is it required?
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Mark John Lado, MIT
The parts of speech are the basic categories into which words are classified based on their grammatical functions and properties.
When creating the objectives for a capstone project, it is important to use strong and action-oriented verbs that clearly communicate what you want to achieve.
Optimizing Embedded System Device Communication with Network Topology DesignMark John Lado, MIT
Optimizing Embedded System Device Communication with Network Topology Design
System Architecture: A Network Topology for Embedded Systems Device
A Comprehensive Handout by Mark John P. Lado, 2023
Abstract:
The importance of system architecture and network topology in the design and development of embedded systems devices is discussed in this context. The design of the device's hardware, firmware, software, and communication interfaces is included in the system architecture, while the physical connections and communication interfaces between the components are referred to as network topology. Optimization of performance, improvement of reliability, reduction of power consumption, enabling of scalability, and ensuring security can be achieved with a well-designed system architecture and network topology. The creation of an effective system architecture and network topology requires defining the requirements, identifying the system components and interfaces, designing the network topology, choosing the communication protocol, considering security, and testing and validating the design. Additionally, some commonly used shapes for creating system architecture and network topology diagrams for embedded systems devices are presented in this context.
Introduction
Modern technology features ubiquitous embedded systems, from consumer electronics to industrial automation, where designing and developing embedded systems involves critical consideration of system architecture and network topology. The system architecture, which includes the device's hardware, firmware, software, and communication interfaces, and network topology, referring to the physical connections and communication interfaces between components, play a vital role. Optimizing performance, improving reliability, reducing power consumption, enabling scalability, and ensuring security are benefits of effective system architecture and network topology. The importance of system architecture and network topology in designing and developing embedded systems devices is discussed in this context. Also provided is guidance on how to create an effective system architecture and network topology and some commonly used shapes for creating system architecture and network topology diagrams.
Embedded Systems IO Peripherals Wireless Communication.pdfMark John Lado, MIT
Embedded Systems
- I/O Peripherals
- Wireless Communication
- Networks
Mark John Lado, 2023
www.markjohn.cf
Microprocessors are commonly used in conjunction with input/output (I/O) peripherals, which allow for communication between the microprocessor and external devices. These peripherals can include sensors, actuators, displays, and other devices that are used to interface with the outside world.
One of the most common I/O peripherals used with microprocessors is sensors. Microprocessors can be programmed to receive and process data from various types of sensors, such as temperature sensors, pressure sensors, and proximity sensors. The microprocessor can then use this data to make decisions and provide output signals to other systems.
Another common I/O peripheral used with microprocessors is actuators. Microprocessors can be used to control the operation of various types of actuators, such as motors, valves, and solenoids. These actuators can be controlled based on input signals received from sensors or other external devices, allowing for precise control of various systems.
Moreover, microprocessors are also used in conjunction with displays, which can provide information to the user or display system status information. Microprocessors can control the operation of displays, allowing for the display of text, graphics, and other information in a variety of formats.
In addition to these applications, microprocessors can also be used with other types of I/O peripherals, such as switches, buttons, and keyboards, which allow for user input into the system. Microprocessors can be programmed to receive and process input signals from these devices, allowing for user interaction with the system.
In conclusion, microprocessors are commonly used in conjunction with I/O peripherals, which allow for communication between the microprocessor and external devices. These peripherals can include sensors, actuators, displays, and other devices that are used to interface with the outside world. Microprocessors provide intelligent control over these peripherals, allowing for precise control and interaction with various systems. As technology continues to advance, we can expect to see even more innovative applications of microprocessors in I/O peripheral technology, providing even greater functionality and efficiency in a wide range of systems.
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Mark John Lado, MIT
Implementing the 6S Lean Methodology for Streamlined Computer System Maintenance and Troubleshooting
Which is which? The 5S or 6S lean methodology?
The 5S and 6S lean methodologies are both tools used to organize and optimize workplaces, but the 6S methodology builds upon the 5S methodology by adding the sixth "S" of "Safety".
The 5S methodology focuses on organizing the workplace to improve efficiency and productivity, while the 6S methodology expands on this by prioritizing safety and adding steps for sustaining improvements. The 6S methodology aims to create a safer and more efficient work environment by emphasizing the importance of maintaining a clean and organized workplace, establishing standard operating procedures, and implementing continuous improvement strategies.
In summary, the main difference between the 5S and 6S methodologies is that the 6S methodology adds an emphasis on safety and continuous improvement, making it a more comprehensive approach to workplace optimization.
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...Mark John Lado, MIT
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation SQuaRE Quality Model
The ISO/IEC 25010:2011 standard provides a framework for evaluating
the quality of software products. It is intended for use by anyone
involved in the development, acquisition, or evaluation of software,
including software developers, software testers, project managers, and
quality assurance professionals.
The Software Quality Requirements and Evaluation (SQuaRE)
Quality Model is a set of international standards developed by
the International Organization for Standardization (ISO) for
evaluating and managing the quality of software products. The
SQuaRE Quality Model is based on the ISO/IEC 25010:2011
standard, which defines a set of quality characteristics and
sub-characteristics that can be used to evaluate a software
product's quality.
4 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
4 Module - Operating Systems Configuration and Use
More on https://www.markjohn.cf/courses
This course will deliberate on the basics of an operating system, which may include Computer Memory, the Operating System, its Graphical User Interface, The Windows Operating System, and Desktop, Operating System Installation.
3 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
3 Module - Operating Systems Configuration and Use
More on https://www.markjohn.cf/courses
This course will deliberate on the basics of an operating system, which may include Computer Memory, the Operating System, its Graphical User Interface, The Windows Operating System, and Desktop, Operating System Installation.
1 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
1 Module - Operating Systems Configuration and Use
More on https://www.markjohn.cf/courses
This course will deliberate on the basics of an operating system, which may include Computer Memory, the Operating System, its Graphical User Interface, The Windows Operating System, and Desktop, Operating System Installation.
2 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
2 Module - Operating Systems Configuration and Use
More on https://www.markjohn.cf/courses
This course will deliberate on the basics of an operating system, which may include Computer Memory, the Operating System, its Graphical User Interface, The Windows Operating System, and Desktop, Operating System Installation.
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
CT 318 Microprocessor Systems
This course provides understanding the architecture of microprocessor-based systems: registers, study of microprocessor operation, assembly language, arithmetic operations, and interfacing.
INTENDED LEARNING OUTCOMES
1. Explain the principles of LEDs which use in a broad range of LED devices with using digital and analog outputs.
2. Distinguish functions and parameters use in digital and analog outputs.
3. Apply skills in electrical, electronics and programming, to develop various LED devices.
At the end of the course, the students are able to:
1. Perform modern electronic systems with microprocessor/microcontroller, digital logic, and digital interfaces.
2. Recognize usefulness of microprocessor/microcontroller platform to develop AI, IoT and Embedded Systems. (PO1, PO6, PO7, PO8) CLO 3. Develop knowledge, skills and techniques necessary in Industry-based professional practice.
4. Apply automation by means of microprocessor/microcontroller platforms.
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
CT 318 Microprocessor Systems
This course provides understanding the architecture of microprocessor-based systems: registers, study of microprocessor operation, assembly language, arithmetic operations, and interfacing.
INTENDED LEARNING OUTCOMES
1. Explain the principles of LEDs which use in a broad range of LED devices with using digital and analog outputs.
2. Distinguish functions and parameters use in digital and analog outputs.
3. Apply skills in electrical, electronics and programming, to develop various LED devices.
At the end of the course, the students are able to:
1. Perform modern electronic systems with microprocessor/microcontroller, digital logic, and digital interfaces.
2. Recognize usefulness of microprocessor/microcontroller platform to develop AI, IoT and Embedded Systems. (PO1, PO6, PO7, PO8) CLO 3. Develop knowledge, skills and techniques necessary in Industry-based professional practice.
4. Apply automation by means of microprocessor/microcontroller platforms.
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
CT 318 Microprocessor Systems
This course provides understanding the architecture of microprocessor-based systems: registers, study of microprocessor operation, assembly language, arithmetic operations, and interfacing.
INTENDED LEARNING OUTCOMES
1. Explain the principles of LEDs which use in a broad range of LED devices with using digital and analog outputs.
2. Distinguish functions and parameters use in digital and analog outputs.
3. Apply skills in electrical, electronics and programming, to develop various LED devices.
At the end of the course, the students are able to:
1. Perform modern electronic systems with microprocessor/microcontroller, digital logic, and digital interfaces.
2. Recognize usefulness of microprocessor/microcontroller platform to develop AI, IoT and Embedded Systems. (PO1, PO6, PO7, PO8) CLO 3. Develop knowledge, skills and techniques necessary in Industry-based professional practice.
4. Apply automation by means of microprocessor/microcontroller platforms.
Dart is a programming language designed for client development, such as for the web and mobile apps. It is developed by Google and can also be used to build server and desktop applications. Dart is an object-oriented, class-based, garbage-collected language with C-style syntax.
Dart is an open-source general-purpose programming language. It is originally developed by Google and later approved as a standard by ECMA.
Computer Programming 2 - Lecture Presentation
Through a lecture discussion, the students can:
1. describe what is a CRUD;
2. relate a TPS’s major operations;
3. assess the importance of CRUD in each TPS; and
4. explain how to use CRUD;
Computer hacking and security - Social Responsibility of IT Professional by M...Mark John Lado, MIT
Computer hacking and security - Social Responsibility of IT Professional by Mark John Lado and Franklin Lasdoce
*******
Technology is science or knowledge put into practical use to solve problems or invent useful tools. A computer is one of the examples of technology it is a programmable electronic device that accepts raw data as input and processes it with a set of instructions (a program) to produce the result as an output.
Technology is robust, where hacking is now common, there are two different types of hacking, ethical hacking, and unethical hacking.
The Same Tools Are Used By Both Hackers And Ethical Hackers. The Only Difference Is That Hackers Use Tools To Steal Or Destroy Information Whereas Ethical Hackers Use the Same Tools To Safeguard Systems From “Hackers With Malicious Intent”. Ethical Hacking Is Legal And Hacking Is Done With Permission From The Client.
Computer Security Is The Protection Of Computer Systems And Networks From Information Disclosure, Theft Of Or Damage To Their Hardware, Software, Or Electronic Data, As Well As From The Disruption Or Misdirection Of The Services They Provide.
************
At the end of this topic, you will be able to;
1. Tell the definition of Computer Hacking
2. Recognize the Ethical hacking and Unethical hacking
3. Illustrate the penetration tester do
4. Summarize the top Skills Required for Cybersecurity Jobs
5. Define Computer Security
6. Recite the different types of Computer Security
7. Describe the importance of Computer Security
8. Summarize the objectives for computer security in any organization
9. Discover in securing your Computer from Unauthorized Access
10. Relate the 15 Best practices for Computer Security and Cyber Security
11. Recognize the Social Engineering and Cyber Attacks
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...Mark John Lado, MIT
Adaption of the new technology is a prerequisite for the business's survival and to meet the quality standard. The public address system is widely used in all areas of living; it helps the host speaker to easily disperse the desired messages. This study aimed to develop a wireless digital broadcasting with voice alarm and text-to-speech (TTS) feature that can wirelessly transmit audio signals from the main campus to its satellite campus over long distances. Also, the prototype has a TTS feature that can offer high-quality and stable speech. The main campus is the Colegio de San Antonio de Padua (CSAP) located at Guinsay, Danao City Cebu, Philippines with a satellite campus at Barangay Suba, Danao City, with a distance of not less than four kilometers and not greater than five kilometers from the main campus. The researcher used the descriptive developmental method of research as the systematic study of designing, developing, and evaluating programs that must meet the criteria of internal consistency and effectiveness. The rapid prototyping model was used during the system development while the criteria in McCall’s Factor Model were used to test the system according to its usability, applicability, and efficiency.
LEARNING TOPIC:
DNS
Two types of lookup in DNS
Three types of zone in DNS the port no of DNS
The port number of DNS
Nslookup
Active Directory And Domain
LDAP
Active Directory
Group Policy
Software publishing and assigning
*****************************************
At the end of the lesson, the students will be able to;
A. know the system administrator – DNS, and active directory and domain
B. appreciate the role of system administration in terms of DNS, and Active directory And Domain
C. give meaning of each terminologies in system administration in terms of DNS, and Active directory And Domain
IT Security and Management - Prelim Lessons by Mark John LadoMark John Lado, MIT
Learning topics:
1. ACCESS CONTROL
2. ASSET MANAGEMENT
3. BUSINESS CONTINUITY
--------------------------------------------------
By the end of this chapter, learners will be able to;
Know about access control.
Differentiate the physical and logical access control.
Engage with different examples of access control.
Apply the role of access control in their future projects.
Recognize about asset management.
Distinguish the three goals of an asset management program.
Engage with different types of IT asset Management.
Elaborate about business continuity.
Engage with the types of business continuity.
Know about the steps for building and executing of business continuity.
Familiarize the business continuity strategy.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2. COMPUTER NETWORK
• Network consists of two or more entities, or objects, sharing resources and information.
• A computer network consists of two or more computing devices that are connected in order to
share the components of your network (its resources) and the information you store there.
• A computer network can be as simple as two or more computers communicating.
• A computer network is a collection of computers and devices connected together via
communication devices and transmission media. For examples it may connect computers,
printers and scanners.
6. THE IMPORTANCE / ADVANTAGE OF COMPUTER
NETWORKS
• Sharing of devices such as printer and scanner
• Sharing of program / software
• Sharing of files
• Sharing of data
• Sharing of information
• Sharing of single high-speed internet connection
• Can access server centered database
• Better communication using internet services such as email, mailing list and Internet Relay
Chat (IRC)
is an application layer protocol that facilitates
communication in the form of text . Example is the
Computerhope.com
7. • Computers on a network are sometimes called
nodes. Computers and devices that allocate
resources for a network are called servers.
8. Types of
Computer
Network
LAN MAN WAN
Network
Architecture
Client / Server Peer to Peer
Network
Topologies
Star Ring Bus
Network
Communication
Technology
Intranet Extranet Internet
15. DIFFERENTIATE BETWEEN THE TYPES OF COMPUTER
NETWORK
Different LAN MAN WAN
Cost Low Optic High Higher
Network Size Small Larger Largest
Speed Fastest Slower Slowest
Transmission Media Twisted-pair Twisted-pair
Fiber-optic cables
Fiber-optic
Radio wave
Satellite
Number of Computers Smallest Large Largest
16. NETWORK ARCHITECTURE
• Network Architecture is the overall design of a computer network that
describes how a computer network is configured and what strategies are
being used.
• It is mainly focuses on the function of the networks.
• It is also known as network model or network design.
• Two main network architecture.
Client/Server Network
Peer to Peer Network
Network
Architecture
21. STAR NETWORK
• Star networks are one of the most common computer network topologies. In
its simplest form, a star network consists of one central switch, hub or
computer, which acts as a conduit to transmit messages. This consists of a
central node, to which all other nodes are connected; this central node
provides a common connection point for all nodes through a hub.
• In star topology, every node (computer workstation or any other peripheral) is
connected to a central node called a hub or switch. The switch is the server
and the peripherals are the clients.
22.
23. ADVANTAGES
• Star networks are very reliable because if one computer or its connection
breaks it doesn’t affect the other computers and their connections.
DISADVANTAGES
• An expensive network layout to install because of the amount of
cables needed.
• If the server crashes or stops working then no computers will be able
to access the network.
24. BUS NETWORK
• is a network topology in which nodes are directly connected to a common
linear (or branched) half-duplex link called a bus.
• Duplex
A duplex communication system is a point-to-point system composed of two
connected parties or devices that can communicate with one another in both
directions. "Duplex" comes from "duo" that means "two", and "plex" that means
"weave" or "fold"; thus, a duplex system has two clearly defined paths, with each path
carrying information in only one direction: A to B over one path, and B to A over the
other. There are two types of duplex communication systems: full-duplex and half-
duplex.
25. • In a full duplex system, both parties can communicate with each other
simultaneously. An example of a full-duplex device is a telephone; the parties
at both ends of a call can speak and be heard by the other party
simultaneously.
26.
27.
28. • A host on a bus network is called a station or workstation. In a bus network,
every station receives all network traffic, and the traffic generated by each
station has equal transmission priority. A bus network forms a single network
segment and collision domain. In order for nodes to transmit on the same bus
simultaneously, they use a media access control technology such as carrier
sense multiple access (CSMA) or a bus master.
• Listen to the line. Send if line is free.
• If collision occurs – pick a random waiting time and try again at that
time.
• If any link or segment of the bus is severed, all network transmission ceases
due to signal bounce caused by the lack of a terminating resistor.
31. ADVANTAGES
• Easy to connect a computer or peripheral to a linear bus
• Requires less cable length than a star topology resulting in
lower costs
• It works well for small networks.
• Easy to Extend
32. DISADVANTAGES
• Entire network shuts down if there is a break in the main cable.
• Terminators are required at both ends of the backbone cable.
• Difficult to identify the problem if the entire network shuts down.
• Not meant to be used as a stand-alone solution in a large building.
• It is slow when more devices are added into the network.
• If a main cable is damaged then network will fail or be split into two networks.
• It is difficult to detect trouble at an individual station.
33. RING NETWORK
• A ring network is a network topology in which each node connects to exactly
two other nodes, forming a single continuous pathway for signals through
each node - a ring. Data travel from node to node, with each node along the
way handling every packet.
34. ADVANTAGES
• Very orderly network where every device has access to the token and the
opportunity to transmit
• Performs better than a bus topology under heavy network load
• Does not require a central node to manage the connectivity between the
computers
• Due to the point to point line configuration of devices with a device on either
side (each device is connected to its immediate neighbor), it is quite easy to
install and reconfigure since adding or removing a device requires moving just
two connections.
• Point to point line configuration makes it easy to identify and isolate faults.
• Reconfiguration for line faults of bidirectional rings can be very fast, as
switching happens at a high level, and thus the traffic does not require
individual rerouting
35. DISADVANTAGES
• One malfunctioning workstation can create problems for the entire
network. This can be solved by using a dual ring or a switch that
closes off the break.
• Moving, adding and changing the devices can affect the network
• Communication delay is directly proportional to number of nodes in
the network
• Bandwidth is shared on all links between devices
36. • Hubs, switches, and routers are all devices that let you connect one or more
computers to other computers, networked devices, or even other networks.
Each has two or more connectors called ports into which you plug in the
cables to make the connection
37. HUB
• A hub is typically the least expensive, least intelligent, and least
complicated of the three. Its job is very simple – anything that
comes in one port is sent out to the others.
• That’s it.
• If a message1 comes in for computer “A”, that message is sent out
all the other ports, regardless of which one computer “A” is on:
41. HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS (DEVICE)
Network Interface Card (NIC)
• NIC provides the physical interface between computer and cabling.
• It prepares data, sends data, and controls the flow of data. It can also receive
and translate data into bytes for the CPU to understand.
• The following factors should be taken into consideration when choosing a
NIC:
1. - Preparing data
2. - Sending and controlling data
3. - Configuration
4. - Drivers
5. - Compatibility
6. - Performance
42. HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - REPEATERS
• Repeaters are very simple devices. They allow a cabling
system to extend beyond its maximum allowed length by
amplifying the network voltages so they travel farther.
• Repeaters are nothing more than amplifiers and, as such,
are very inexpensive.
• Repeaters can only be used to regenerate signals between
similar network segments.
43. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS -
REPEATERS
• For example, we can extend an Ethernet 10Base2 network to 400
meters with a repeater. But can’t connect an Ethernet and Token
Ring network together with one.
• The main disadvantage to repeaters is that they just amplify
signals. These signals not only include the network signals, but any
noise on the wire as well.
• Eventually, if you use enough repeaters, you could possibly drown
out the signal with the amplified noise. For this reason, repeaters
are used only as a temporary fix.
45. HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - HUBS
• Hubs are devices used to link several computers together.
• They repeat any signal that comes in on one port and copy it to the
other ports (a process that is also called broadcasting).
• There are two types of hubs: active and passive.
• Passive hubs simply connect all ports together electrically and are
usually not powered.
• Active hubs use electronics to amplify and clean up the signal
before it is broadcast to the other ports.
• In the category of active hubs, there is also a class called
“intelligent” hubs, which are hubs that can be remotely managed on
the network.
47. HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - BRIDGES
• They join similar topologies and are used to divide network
segments.
• For example, with 200 people on one Ethernet segment, the
performance will be mediocre, because of the design of Ethernet
and the number of workstations that are fighting to transmit. If you
divide the segment into two segments of 100 workstations each,
the traffic will be much lower on either side and performance will
increase.
48. HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - BRIDGES
• If it is aware of the destination address, it is able to forward
packets; otherwise a bridge will forward the packets to all
segments. They are more intelligent than repeaters but are
unable to move data across multiple networks
simultaneously.
• Unlike repeaters, bridges can filter out noise.
• The main disadvantage to bridges is that they can’t
connect dissimilar network types or perform intelligent path
selection. For that function, you would need a router.
50. HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - ROUTERS
• Routers are highly intelligent devices that connect multiple
network types and determine the best path for sending
data.
• The advantage of using a router over a bridge is that
routers can determine the best path that data can take to
get to its destination.
• Like bridges, they can segment large networks and can
filter out noise.
51. HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - ROUTERS
• However, they are slower than bridges because they are
more intelligent devices; as such, they analyze every
packet, causing packet-forwarding delays. Because of this
intelligence, they are also more expensive.
• Routers are normally used to connect one LAN to another.
• Typically, when a WAN is set up, there will be at least two
routers used.