SlideShare a Scribd company logo
BSIS IV
NETWORK
COMPUTER NETWORK
• Network consists of two or more entities, or objects, sharing resources and information.
• A computer network consists of two or more computing devices that are connected in order to
share the components of your network (its resources) and the information you store there.
• A computer network can be as simple as two or more computers communicating.
• A computer network is a collection of computers and devices connected together via
communication devices and transmission media. For examples it may connect computers,
printers and scanners.
COMMUNICATION
• Communication describes a process in which two or more computer or
devices transfer data, instructions and information.
THE IMPORTANCE / ADVANTAGE OF COMPUTER
NETWORKS
• Sharing of devices such as printer and scanner
• Sharing of program / software
• Sharing of files
• Sharing of data
• Sharing of information
• Sharing of single high-speed internet connection
• Can access server centered database
• Better communication using internet services such as email, mailing list and Internet Relay
Chat (IRC)
is an application layer protocol that facilitates
communication in the form of text . Example is the
Computerhope.com
• Computers on a network are sometimes called
nodes. Computers and devices that allocate
resources for a network are called servers.
Types of
Computer
Network
LAN MAN WAN
Network
Architecture
Client / Server Peer to Peer
Network
Topologies
Star Ring Bus
Network
Communication
Technology
Intranet Extranet Internet
SUMMARY – NETWORK CLASSIFICATION
SUMMARY – NETWORK CLASSIFICATION
WIDE AREA
NETWORK
(WAN)
SUMMARY – NETWORK CLASSIFICATION
METROPOLITAN
AREA NETWORK
(MAN)
DIFFERENTIATE BETWEEN THE TYPES OF COMPUTER
NETWORK
Different LAN MAN WAN
Cost Low Optic High Higher
Network Size Small Larger Largest
Speed Fastest Slower Slowest
Transmission Media Twisted-pair Twisted-pair
Fiber-optic cables
Fiber-optic
Radio wave
Satellite
Number of Computers Smallest Large Largest
NETWORK ARCHITECTURE
• Network Architecture is the overall design of a computer network that
describes how a computer network is configured and what strategies are
being used.
• It is mainly focuses on the function of the networks.
• It is also known as network model or network design.
• Two main network architecture.
Client/Server Network
Peer to Peer Network
Network
Architecture
THE DIFFERENCES BETWEEN CLIENT/SERVER AND PEER-
TO-PEER
NETWORK TOPOLOGY
• Topology - The geometric arrangement of a computer system.
• STAR
• BUS
• TOKEN - RING
STAR NETWORK
• Star networks are one of the most common computer network topologies. In
its simplest form, a star network consists of one central switch, hub or
computer, which acts as a conduit to transmit messages. This consists of a
central node, to which all other nodes are connected; this central node
provides a common connection point for all nodes through a hub.
• In star topology, every node (computer workstation or any other peripheral) is
connected to a central node called a hub or switch. The switch is the server
and the peripherals are the clients.
ADVANTAGES
• Star networks are very reliable because if one computer or its connection
breaks it doesn’t affect the other computers and their connections.
DISADVANTAGES
• An expensive network layout to install because of the amount of
cables needed.
• If the server crashes or stops working then no computers will be able
to access the network.
BUS NETWORK
• is a network topology in which nodes are directly connected to a common
linear (or branched) half-duplex link called a bus.
• Duplex
A duplex communication system is a point-to-point system composed of two
connected parties or devices that can communicate with one another in both
directions. "Duplex" comes from "duo" that means "two", and "plex" that means
"weave" or "fold"; thus, a duplex system has two clearly defined paths, with each path
carrying information in only one direction: A to B over one path, and B to A over the
other. There are two types of duplex communication systems: full-duplex and half-
duplex.
• In a full duplex system, both parties can communicate with each other
simultaneously. An example of a full-duplex device is a telephone; the parties
at both ends of a call can speak and be heard by the other party
simultaneously.
• A host on a bus network is called a station or workstation. In a bus network,
every station receives all network traffic, and the traffic generated by each
station has equal transmission priority. A bus network forms a single network
segment and collision domain. In order for nodes to transmit on the same bus
simultaneously, they use a media access control technology such as carrier
sense multiple access (CSMA) or a bus master.
• Listen to the line. Send if line is free.
• If collision occurs – pick a random waiting time and try again at that
time.
• If any link or segment of the bus is severed, all network transmission ceases
due to signal bounce caused by the lack of a terminating resistor.
RESISTOR
BUS NETWORK
ADVANTAGES
• Easy to connect a computer or peripheral to a linear bus
• Requires less cable length than a star topology resulting in
lower costs
• It works well for small networks.
• Easy to Extend
DISADVANTAGES
• Entire network shuts down if there is a break in the main cable.
• Terminators are required at both ends of the backbone cable.
• Difficult to identify the problem if the entire network shuts down.
• Not meant to be used as a stand-alone solution in a large building.
• It is slow when more devices are added into the network.
• If a main cable is damaged then network will fail or be split into two networks.
• It is difficult to detect trouble at an individual station.
RING NETWORK
• A ring network is a network topology in which each node connects to exactly
two other nodes, forming a single continuous pathway for signals through
each node - a ring. Data travel from node to node, with each node along the
way handling every packet.
ADVANTAGES
• Very orderly network where every device has access to the token and the
opportunity to transmit
• Performs better than a bus topology under heavy network load
• Does not require a central node to manage the connectivity between the
computers
• Due to the point to point line configuration of devices with a device on either
side (each device is connected to its immediate neighbor), it is quite easy to
install and reconfigure since adding or removing a device requires moving just
two connections.
• Point to point line configuration makes it easy to identify and isolate faults.
• Reconfiguration for line faults of bidirectional rings can be very fast, as
switching happens at a high level, and thus the traffic does not require
individual rerouting
DISADVANTAGES
• One malfunctioning workstation can create problems for the entire
network. This can be solved by using a dual ring or a switch that
closes off the break.
• Moving, adding and changing the devices can affect the network
• Communication delay is directly proportional to number of nodes in
the network
• Bandwidth is shared on all links between devices
• Hubs, switches, and routers are all devices that let you connect one or more
computers to other computers, networked devices, or even other networks.
Each has two or more connectors called ports into which you plug in the
cables to make the connection
HUB
• A hub is typically the least expensive, least intelligent, and least
complicated of the three. Its job is very simple – anything that
comes in one port is sent out to the others.
• That’s it.
• If a message1 comes in for computer “A”, that message is sent out
all the other ports, regardless of which one computer “A” is on:
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS (DEVICE)
• Network Interface Card (NIC)
• Repeater
• Hub
• Bridge
• Routers
• Switch
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS (DEVICE)
Network Interface Card (NIC)
• NIC provides the physical interface between computer and cabling.
• It prepares data, sends data, and controls the flow of data. It can also receive
and translate data into bytes for the CPU to understand.
• The following factors should be taken into consideration when choosing a
NIC:
1. - Preparing data
2. - Sending and controlling data
3. - Configuration
4. - Drivers
5. - Compatibility
6. - Performance
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - REPEATERS
• Repeaters are very simple devices. They allow a cabling
system to extend beyond its maximum allowed length by
amplifying the network voltages so they travel farther.
• Repeaters are nothing more than amplifiers and, as such,
are very inexpensive.
• Repeaters can only be used to regenerate signals between
similar network segments.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS -
REPEATERS
• For example, we can extend an Ethernet 10Base2 network to 400
meters with a repeater. But can’t connect an Ethernet and Token
Ring network together with one.
• The main disadvantage to repeaters is that they just amplify
signals. These signals not only include the network signals, but any
noise on the wire as well.
• Eventually, if you use enough repeaters, you could possibly drown
out the signal with the amplified noise. For this reason, repeaters
are used only as a temporary fix.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - REPEATERS
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - HUBS
• Hubs are devices used to link several computers together.
• They repeat any signal that comes in on one port and copy it to the
other ports (a process that is also called broadcasting).
• There are two types of hubs: active and passive.
• Passive hubs simply connect all ports together electrically and are
usually not powered.
• Active hubs use electronics to amplify and clean up the signal
before it is broadcast to the other ports.
• In the category of active hubs, there is also a class called
“intelligent” hubs, which are hubs that can be remotely managed on
the network.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - HUBS
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - BRIDGES
• They join similar topologies and are used to divide network
segments.
• For example, with 200 people on one Ethernet segment, the
performance will be mediocre, because of the design of Ethernet
and the number of workstations that are fighting to transmit. If you
divide the segment into two segments of 100 workstations each,
the traffic will be much lower on either side and performance will
increase.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - BRIDGES
• If it is aware of the destination address, it is able to forward
packets; otherwise a bridge will forward the packets to all
segments. They are more intelligent than repeaters but are
unable to move data across multiple networks
simultaneously.
• Unlike repeaters, bridges can filter out noise.
• The main disadvantage to bridges is that they can’t
connect dissimilar network types or perform intelligent path
selection. For that function, you would need a router.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - BRIDGES
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - ROUTERS
• Routers are highly intelligent devices that connect multiple
network types and determine the best path for sending
data.
• The advantage of using a router over a bridge is that
routers can determine the best path that data can take to
get to its destination.
• Like bridges, they can segment large networks and can
filter out noise.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - ROUTERS
• However, they are slower than bridges because they are
more intelligent devices; as such, they analyze every
packet, causing packet-forwarding delays. Because of this
intelligence, they are also more expensive.
• Routers are normally used to connect one LAN to another.
• Typically, when a WAN is set up, there will be at least two
routers used.
Network use and configuration

More Related Content

What's hot

Network Components
Network ComponentsNetwork Components
Network Components
Ifrad Mahbub
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
Raveena kumari
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
Annajab
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
Jyoti Akhter
 
Computer network
Computer networkComputer network
Computer network
Rahul Das
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
mc aa
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)
Dhani Ahmad
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th edition
Ensign Handoko
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
Online
 
Network Components
Network ComponentsNetwork Components
Network Components
zaisahil
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
VAIBHAV TANWAR
 
Network Device
Network DeviceNetwork Device
Network Device
Prabhat Jain
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
Mziaulla
 
Computer network
Computer networkComputer network
Computer network
Simran Kaur
 
HUB Device
HUB Device HUB Device
Network devices
Network devicesNetwork devices
Network devices
Dhani Ahmad
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
AkNirojan
 
Network devices
Network devicesNetwork devices
Network devices
Aryan Kabra
 
Computer networkingdevices
Computer networkingdevicesComputer networkingdevices
Computer networkingdevices
Chittagong University
 

What's hot (20)

Network Components
Network ComponentsNetwork Components
Network Components
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Computer network
Computer networkComputer network
Computer network
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th edition
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
Network Components
Network ComponentsNetwork Components
Network Components
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 
Network Device
Network DeviceNetwork Device
Network Device
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Computer network
Computer networkComputer network
Computer network
 
HUB Device
HUB Device HUB Device
HUB Device
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Network devices
Network devicesNetwork devices
Network devices
 
Computer networkingdevices
Computer networkingdevicesComputer networkingdevices
Computer networkingdevices
 

Similar to Network use and configuration

networking.ppt
networking.pptnetworking.ppt
networking.ppt
suchita74
 
Computer networks
Computer networksComputer networks
Computer networks
samina khan
 
computer-network.pptx
computer-network.pptxcomputer-network.pptx
computer-network.pptx
BrindhaSenthilKumar3
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptx
EmmanuelNYAMENAAYE
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
Ayush0734
 
Unit2.2
Unit2.2Unit2.2
Networking presentation
Networking presentationNetworking presentation
Networking presentation
Jyoti Tewari
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02
DeShawn A. Larkin
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
SOLOMONCHINAEMEUCHEA
 
Computer network
Computer networkComputer network
Computer network
ASHIK MAHMUD
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
AASTHAJAJOO
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 
Computer networking
Computer networkingComputer networking
Computer networking
Abdul Rehman
 
NETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptxNETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptx
YasaraDevindi
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
SujanTimalsina5
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
ADITYAKUMAR554673
 
Basic networking
Basic networkingBasic networking
Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 

Similar to Network use and configuration (20)

networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Computer network
Computer networkComputer network
Computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
computer-network.pptx
computer-network.pptxcomputer-network.pptx
computer-network.pptx
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptx
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Computer network
Computer networkComputer network
Computer network
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Computer networking
Computer networkingComputer networking
Computer networking
 
NETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptxNETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptx
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Networking basics
Networking basicsNetworking basics
Networking basics
 

More from Mark John Lado, MIT

Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Mark John Lado, MIT
 
Optimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignOptimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology Design
Mark John Lado, MIT
 
Embedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfEmbedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdf
Mark John Lado, MIT
 
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Mark John Lado, MIT
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
Mark John Lado, MIT
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Mark John Lado, MIT
 
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Mark John Lado, MIT
 
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Mark John Lado, MIT
 
Dart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoDart Programming Language by Mark John Lado
Dart Programming Language by Mark John Lado
Mark John Lado, MIT
 
What is CRUD in TPS?
What is CRUD in TPS?What is CRUD in TPS?
What is CRUD in TPS?
Mark John Lado, MIT
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
Mark John Lado, MIT
 
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
Mark John Lado, MIT
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
Mark John Lado, MIT
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADO
Mark John Lado, MIT
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
Mark John Lado, MIT
 

More from Mark John Lado, MIT (20)

Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
 
Optimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignOptimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology Design
 
Embedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfEmbedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdf
 
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
 
3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado
 
2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado
 
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
Dart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoDart Programming Language by Mark John Lado
Dart Programming Language by Mark John Lado
 
What is CRUD in TPS?
What is CRUD in TPS?What is CRUD in TPS?
What is CRUD in TPS?
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADO
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

Network use and configuration

  • 2. COMPUTER NETWORK • Network consists of two or more entities, or objects, sharing resources and information. • A computer network consists of two or more computing devices that are connected in order to share the components of your network (its resources) and the information you store there. • A computer network can be as simple as two or more computers communicating. • A computer network is a collection of computers and devices connected together via communication devices and transmission media. For examples it may connect computers, printers and scanners.
  • 3.
  • 4. COMMUNICATION • Communication describes a process in which two or more computer or devices transfer data, instructions and information.
  • 5.
  • 6. THE IMPORTANCE / ADVANTAGE OF COMPUTER NETWORKS • Sharing of devices such as printer and scanner • Sharing of program / software • Sharing of files • Sharing of data • Sharing of information • Sharing of single high-speed internet connection • Can access server centered database • Better communication using internet services such as email, mailing list and Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text . Example is the Computerhope.com
  • 7. • Computers on a network are sometimes called nodes. Computers and devices that allocate resources for a network are called servers.
  • 8. Types of Computer Network LAN MAN WAN Network Architecture Client / Server Peer to Peer Network Topologies Star Ring Bus Network Communication Technology Intranet Extranet Internet
  • 9.
  • 10.
  • 11.
  • 12. SUMMARY – NETWORK CLASSIFICATION
  • 13. SUMMARY – NETWORK CLASSIFICATION WIDE AREA NETWORK (WAN)
  • 14. SUMMARY – NETWORK CLASSIFICATION METROPOLITAN AREA NETWORK (MAN)
  • 15. DIFFERENTIATE BETWEEN THE TYPES OF COMPUTER NETWORK Different LAN MAN WAN Cost Low Optic High Higher Network Size Small Larger Largest Speed Fastest Slower Slowest Transmission Media Twisted-pair Twisted-pair Fiber-optic cables Fiber-optic Radio wave Satellite Number of Computers Smallest Large Largest
  • 16. NETWORK ARCHITECTURE • Network Architecture is the overall design of a computer network that describes how a computer network is configured and what strategies are being used. • It is mainly focuses on the function of the networks. • It is also known as network model or network design. • Two main network architecture. Client/Server Network Peer to Peer Network Network Architecture
  • 17.
  • 18.
  • 19. THE DIFFERENCES BETWEEN CLIENT/SERVER AND PEER- TO-PEER
  • 20. NETWORK TOPOLOGY • Topology - The geometric arrangement of a computer system. • STAR • BUS • TOKEN - RING
  • 21. STAR NETWORK • Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages. This consists of a central node, to which all other nodes are connected; this central node provides a common connection point for all nodes through a hub. • In star topology, every node (computer workstation or any other peripheral) is connected to a central node called a hub or switch. The switch is the server and the peripherals are the clients.
  • 22.
  • 23. ADVANTAGES • Star networks are very reliable because if one computer or its connection breaks it doesn’t affect the other computers and their connections. DISADVANTAGES • An expensive network layout to install because of the amount of cables needed. • If the server crashes or stops working then no computers will be able to access the network.
  • 24. BUS NETWORK • is a network topology in which nodes are directly connected to a common linear (or branched) half-duplex link called a bus. • Duplex A duplex communication system is a point-to-point system composed of two connected parties or devices that can communicate with one another in both directions. "Duplex" comes from "duo" that means "two", and "plex" that means "weave" or "fold"; thus, a duplex system has two clearly defined paths, with each path carrying information in only one direction: A to B over one path, and B to A over the other. There are two types of duplex communication systems: full-duplex and half- duplex.
  • 25. • In a full duplex system, both parties can communicate with each other simultaneously. An example of a full-duplex device is a telephone; the parties at both ends of a call can speak and be heard by the other party simultaneously.
  • 26.
  • 27.
  • 28. • A host on a bus network is called a station or workstation. In a bus network, every station receives all network traffic, and the traffic generated by each station has equal transmission priority. A bus network forms a single network segment and collision domain. In order for nodes to transmit on the same bus simultaneously, they use a media access control technology such as carrier sense multiple access (CSMA) or a bus master. • Listen to the line. Send if line is free. • If collision occurs – pick a random waiting time and try again at that time. • If any link or segment of the bus is severed, all network transmission ceases due to signal bounce caused by the lack of a terminating resistor.
  • 31. ADVANTAGES • Easy to connect a computer or peripheral to a linear bus • Requires less cable length than a star topology resulting in lower costs • It works well for small networks. • Easy to Extend
  • 32. DISADVANTAGES • Entire network shuts down if there is a break in the main cable. • Terminators are required at both ends of the backbone cable. • Difficult to identify the problem if the entire network shuts down. • Not meant to be used as a stand-alone solution in a large building. • It is slow when more devices are added into the network. • If a main cable is damaged then network will fail or be split into two networks. • It is difficult to detect trouble at an individual station.
  • 33. RING NETWORK • A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way handling every packet.
  • 34. ADVANTAGES • Very orderly network where every device has access to the token and the opportunity to transmit • Performs better than a bus topology under heavy network load • Does not require a central node to manage the connectivity between the computers • Due to the point to point line configuration of devices with a device on either side (each device is connected to its immediate neighbor), it is quite easy to install and reconfigure since adding or removing a device requires moving just two connections. • Point to point line configuration makes it easy to identify and isolate faults. • Reconfiguration for line faults of bidirectional rings can be very fast, as switching happens at a high level, and thus the traffic does not require individual rerouting
  • 35. DISADVANTAGES • One malfunctioning workstation can create problems for the entire network. This can be solved by using a dual ring or a switch that closes off the break. • Moving, adding and changing the devices can affect the network • Communication delay is directly proportional to number of nodes in the network • Bandwidth is shared on all links between devices
  • 36. • Hubs, switches, and routers are all devices that let you connect one or more computers to other computers, networked devices, or even other networks. Each has two or more connectors called ports into which you plug in the cables to make the connection
  • 37. HUB • A hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple – anything that comes in one port is sent out to the others. • That’s it. • If a message1 comes in for computer “A”, that message is sent out all the other ports, regardless of which one computer “A” is on:
  • 38.
  • 39.
  • 40. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (DEVICE) • Network Interface Card (NIC) • Repeater • Hub • Bridge • Routers • Switch
  • 41. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (DEVICE) Network Interface Card (NIC) • NIC provides the physical interface between computer and cabling. • It prepares data, sends data, and controls the flow of data. It can also receive and translate data into bytes for the CPU to understand. • The following factors should be taken into consideration when choosing a NIC: 1. - Preparing data 2. - Sending and controlling data 3. - Configuration 4. - Drivers 5. - Compatibility 6. - Performance
  • 42. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - REPEATERS • Repeaters are very simple devices. They allow a cabling system to extend beyond its maximum allowed length by amplifying the network voltages so they travel farther. • Repeaters are nothing more than amplifiers and, as such, are very inexpensive. • Repeaters can only be used to regenerate signals between similar network segments.
  • 43. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - REPEATERS • For example, we can extend an Ethernet 10Base2 network to 400 meters with a repeater. But can’t connect an Ethernet and Token Ring network together with one. • The main disadvantage to repeaters is that they just amplify signals. These signals not only include the network signals, but any noise on the wire as well. • Eventually, if you use enough repeaters, you could possibly drown out the signal with the amplified noise. For this reason, repeaters are used only as a temporary fix.
  • 44. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - REPEATERS
  • 45. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - HUBS • Hubs are devices used to link several computers together. • They repeat any signal that comes in on one port and copy it to the other ports (a process that is also called broadcasting). • There are two types of hubs: active and passive. • Passive hubs simply connect all ports together electrically and are usually not powered. • Active hubs use electronics to amplify and clean up the signal before it is broadcast to the other ports. • In the category of active hubs, there is also a class called “intelligent” hubs, which are hubs that can be remotely managed on the network.
  • 46. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - HUBS
  • 47. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - BRIDGES • They join similar topologies and are used to divide network segments. • For example, with 200 people on one Ethernet segment, the performance will be mediocre, because of the design of Ethernet and the number of workstations that are fighting to transmit. If you divide the segment into two segments of 100 workstations each, the traffic will be much lower on either side and performance will increase.
  • 48. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - BRIDGES • If it is aware of the destination address, it is able to forward packets; otherwise a bridge will forward the packets to all segments. They are more intelligent than repeaters but are unable to move data across multiple networks simultaneously. • Unlike repeaters, bridges can filter out noise. • The main disadvantage to bridges is that they can’t connect dissimilar network types or perform intelligent path selection. For that function, you would need a router.
  • 49. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - BRIDGES
  • 50. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - ROUTERS • Routers are highly intelligent devices that connect multiple network types and determine the best path for sending data. • The advantage of using a router over a bridge is that routers can determine the best path that data can take to get to its destination. • Like bridges, they can segment large networks and can filter out noise.
  • 51. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - ROUTERS • However, they are slower than bridges because they are more intelligent devices; as such, they analyze every packet, causing packet-forwarding delays. Because of this intelligence, they are also more expensive. • Routers are normally used to connect one LAN to another. • Typically, when a WAN is set up, there will be at least two routers used.