1) Networking computers together allows them to share resources like printers, storage, and internet connections. Recent advances in hardware and software have made networking easier and cheaper than ever.
2) Early computer networking involved remote access to mainframe computers via teletype machines. The development of Ethernet in the 1970s allowed local area networks with shared resources. Standards like 10BaseT and 100BaseT use inexpensive cabling and made networking affordable for homes and small offices.
3) USB networking is an alternative that avoids installing network cards - special USB cables allow connection and data transfer between computers at speeds around 5Mbps, suitable for small networks of 2-3 PCs.
1) The document provides a history of computer networking, beginning in the 1940s with remote access to mainframe computers and the development of timesharing in the 1960s.
2) It describes the key developments in Ethernet standards, including the first specification in 1976 supporting data transfer rates of 2.94 megabits per second using coaxial cable.
3) The document outlines standards that enabled faster Ethernet connections over cheaper cabling materials, including 10BaseT and 100BaseT, which support speeds of 10 and 100 megabits per second over twisted pair cable. These standards, along with Gigabit Ethernet, are described as suitable for modern home and small office networking.
A computer network connects two or more computers together electronically so they can share resources and exchange information. The two main types of networks are local area networks (LANs), which connect computers within a limited space like a home or office, and wide area networks (WANs), which connect multiple LANs together over longer distances like the Internet. Common topologies for networks include bus, ring, star, tree and mesh configurations.
This document discusses the meaning and scope of networking in science learning. It defines a computer network as any set of computers connected to exchange data. There are three main types of networks: local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). Networking provides benefits for learning science such as allowing collaborative work and information sharing. It also discusses advantages like resource sharing and communication abilities, as well as disadvantages including security issues and performance degradation. The document concludes that networks can play a crucial role in developing and spreading science.
This document provides an overview of computer networking concepts. It discusses the advantages of computer networks like file and resource sharing. It describes different types of networks including peer-to-peer, client-server, LAN, MAN and WAN. Common network elements are explained such as clients, servers, workstations and network interface cards. Different network topologies are also summarized, specifically bus, ring, star and hybrid topologies.
This document provides an introduction to networking, including definitions of basic networking concepts and components. It defines what a computer network is and discusses reasons for networking. It also describes different types of networks including LANs, WANs, peer-to-peer and client-server networks. Additionally, it covers various networking transmission media such as twisted pair, coaxial, and fiber optic cables. Finally, it discusses common network topologies like bus, star and ring configurations.
Introduction to Computer Networking - School level Matthew Bulat
What is computer networking? Why is networking important for yourself and business? How is networking achieved in a school environment? How can satellite networking help in remote location? How can I learn more on networking for free?
This document provides an overview of computer networks, including definitions of local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It describes common network components like network interface cards, hubs, switches, routers, and cables. It also summarizes different network topologies like Ethernet, Token Ring, FDDI, and ATM, noting their cable types, speeds, and topologies.
The document provides an overview of networking basics presented by Kevin Shea. It discusses the origins of networking in the 1960s for military purposes. It describes the TCP/IP model and protocols developed in the 1970s to allow communication across different networks. It also summarizes the seven layers of the OSI model and common network topologies like bus, star, and ring configurations.
1) The document provides a history of computer networking, beginning in the 1940s with remote access to mainframe computers and the development of timesharing in the 1960s.
2) It describes the key developments in Ethernet standards, including the first specification in 1976 supporting data transfer rates of 2.94 megabits per second using coaxial cable.
3) The document outlines standards that enabled faster Ethernet connections over cheaper cabling materials, including 10BaseT and 100BaseT, which support speeds of 10 and 100 megabits per second over twisted pair cable. These standards, along with Gigabit Ethernet, are described as suitable for modern home and small office networking.
A computer network connects two or more computers together electronically so they can share resources and exchange information. The two main types of networks are local area networks (LANs), which connect computers within a limited space like a home or office, and wide area networks (WANs), which connect multiple LANs together over longer distances like the Internet. Common topologies for networks include bus, ring, star, tree and mesh configurations.
This document discusses the meaning and scope of networking in science learning. It defines a computer network as any set of computers connected to exchange data. There are three main types of networks: local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). Networking provides benefits for learning science such as allowing collaborative work and information sharing. It also discusses advantages like resource sharing and communication abilities, as well as disadvantages including security issues and performance degradation. The document concludes that networks can play a crucial role in developing and spreading science.
This document provides an overview of computer networking concepts. It discusses the advantages of computer networks like file and resource sharing. It describes different types of networks including peer-to-peer, client-server, LAN, MAN and WAN. Common network elements are explained such as clients, servers, workstations and network interface cards. Different network topologies are also summarized, specifically bus, ring, star and hybrid topologies.
This document provides an introduction to networking, including definitions of basic networking concepts and components. It defines what a computer network is and discusses reasons for networking. It also describes different types of networks including LANs, WANs, peer-to-peer and client-server networks. Additionally, it covers various networking transmission media such as twisted pair, coaxial, and fiber optic cables. Finally, it discusses common network topologies like bus, star and ring configurations.
Introduction to Computer Networking - School level Matthew Bulat
What is computer networking? Why is networking important for yourself and business? How is networking achieved in a school environment? How can satellite networking help in remote location? How can I learn more on networking for free?
This document provides an overview of computer networks, including definitions of local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It describes common network components like network interface cards, hubs, switches, routers, and cables. It also summarizes different network topologies like Ethernet, Token Ring, FDDI, and ATM, noting their cable types, speeds, and topologies.
The document provides an overview of networking basics presented by Kevin Shea. It discusses the origins of networking in the 1960s for military purposes. It describes the TCP/IP model and protocols developed in the 1970s to allow communication across different networks. It also summarizes the seven layers of the OSI model and common network topologies like bus, star, and ring configurations.
The document provides an overview of networking basics presented by Kevin Shea. It discusses the origins of networking in the 1960s for military purposes. It describes the TCP/IP model and protocols developed in the 1970s to allow communication across different networks. It also summarizes the seven layers of the OSI model and common network topologies like bus, star, and ring configurations.
This document provides information about various types of computer networks and networking components. It defines what a computer network is and describes local area networks (LANs) and wide area networks (WANs). It also discusses networking hardware components like network interface cards, hubs, bridges, switches, and routers. Additionally, it covers specific network types such as campus networks, backbones, metropolitan area networks, virtual private networks, and the internet.
The document discusses and compares various networking equipment. It defines terms like router, switch, hub, bridge and provides examples of products from companies like ASUS, D-Link, Netgear. It then provides a table comparing the price of various routers, switches, hubs and bridges from these companies.
This document provides an overview of computer networks and networking fundamentals. It discusses the basic components of a network including nodes, links, and different types of networks from personal area networks to wide area networks. Specific topics covered include network devices, topologies, local and wide area networks, internetworking, and storage area networks. The goal is to learn the basics of how computer networks work and operate at a fundamental level.
The document discusses various topics related to networking infrastructure and protocols:
1. It describes the components of a structured cabling system and benefits of an extended star topology used for cabling.
2. It explains several key protocols used at different layers of the OSI model including SMTP, ARP, FTP, and SSL and their functions.
3. It discusses wireless networking components like wireless routers/modems and adapters and how Wi-Fi works based on IEEE 802.11 standards at the physical and data link layers.
4. It covers Wi-Fi standards, advantages and disadvantages of wireless networking, and factors to consider for wired vs wireless implementation in a LAN.
A network consists of two or more computers that are linked together in order to share
the resources, such as printers, exchange files among computers, with the help of electronic
communications. The computers on a network may be linked by cables, telephone lines,
radio waves, satellites, or infrared light beams etc.
A computer network allows sharing of information and resources between connected computers. There are three main types of networks: local area networks (LANs) which connect computers in a limited area like a home or office; wide area networks (WANs) which span large geographical areas like countries; and metropolitan area networks (MANs) which interconnect users in a region larger than a LAN but smaller than a WAN. Other network types include personal area networks (PANs) around an individual, home networks, enterprise private networks, storage area networks (SANs), campus area networks (CANs), and global area networks (GANs).
This document provides an overview of computer networks, including definitions, types, advantages, and disadvantages. It discusses local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). Wireless local area networks (WLANs) and different network topologies like star, ring, bus, mesh, line, and tree are also covered. The document concludes with explanations of how networks are created and defined, including definitions of IP addresses and the differences between dynamic and static IP addresses.
The document discusses computer networks and the internet. It defines a computer network as a group of connected computers that allow communication between them. There are two main types of networks: local area networks (LANs) within a single location, and wide area networks (WANs) connecting multiple locations over greater distances. The document outlines advantages of networks like speed, cost savings, security, and resource sharing. It also discusses internet basics like browsers, websites, email, and search engines.
This document discusses the basic components of computer networks. It explains that networks are collections of two or more connected computers that allow users to share files, printers, and other resources. The key components of a network include computers, network interface cards, connection media like wires or cables, and network operating system software. Additional components that networks often include are hubs, switches, routers, and bridges to connect and manage the flow of data between computers.
A computer network connects two or more computers together to allow sharing of resources like files, printers and bandwidth. The main components of a network include computers, networking interface cards, connection medium like cables, and network operating system software. Common network types are LANs for local connections and WANs for wide area connections between locations. Protocols like TCP/IP are used to allow communication between different computers and networks. Ethernet is a common standard for LAN connections using cables like twisted pair or fiber optic.
Ethernet is a LAN technology that transmits data at speeds between 1 Mbps to 1 Gbps. It operates at the physical and data link layers of the OSI model. The original Ethernet specification from 1980 defined the standards, while current specifications are developed by IEEE 802.3. Ethernet evolves through standards like 10BaseT, 10Base2, 10Base5, 10BaseFL, 100BaseVG, 100BaseX, which provide faster speeds and use different cable types like twisted pair, coaxial, and fiber optic cables. Ethernet frames data into packets with fields for destination/source addresses, type, and error checking.
Mr. Khan's presentation summarized key aspects of computer networking. It defined a network as connecting two or more computers through a communication medium. Networks allow users to share resources like files, printers, and email. The history of networking involved developments by organizations like Unisys to further the technology. Networks can be structured in different topologies like bus, star, ring and mesh, and use protocols like Ethernet, Token Ring, and TCP/IP to exchange data.
What is the network ?
General Types of Network
Type of Create Connection
Types of Network
Advantages of Network
Disadvantages of Network
What is Network Topology?
What is IP Address?
The document provides information about networking and internet technologies. It discusses computer networks and how they allow sharing of information, data, programs and resources. This reduces costs. Network topologies like star, bus, ring and tree are covered. Different types of network cabling including UTP, coaxial, fiber optic and wireless are described. Components of a network like servers, clients and networking devices are explained. Concepts like packet switching, peer to peer networks and protocols are also summarized.
This document provides an introduction to computer networking concepts for students. It discusses the basic components of a network, including cables, switches, routers and wireless access points. It explains the differences between peer-to-peer and client-server network configurations. Advantages of networking for schools include faster sharing of files and resources, lower costs through shared software licenses, and easier collaboration between students and teachers. Some considerations for setting up a wireless network are also outlined.
There are three main network topologies used to connect computers: bus, ring, and star. A bus topology has all computers connected to a single cable in a line. A ring topology connects each computer to the two nearest nodes in a circular configuration. A star topology connects each computer to a central device like a hub or switch. Hubs and switches are used to connect computers in a star topology network and operate at the physical and data link layers, while routers connect multiple networks and operate at the network layer.
There are three main network topologies used to connect computers: bus, ring, and star. A bus topology has all computers connected to a single cable in a line. A ring topology connects each computer to the two nearest nodes in a circular configuration. A star topology connects each computer to a central device like a hub or switch. Hubs and switches are used to connect computers in a star topology network and operate at the physical and data link layers, while routers connect multiple networks and operate at the network layer.
This document discusses various local area network (LAN) technologies. It begins by defining LANs and explaining that they can connect devices within a single building or across multiple buildings. Common LAN technologies discussed include Ethernet, Token Ring, fiber, and wireless networks. Ethernet is currently the most widely used standard. Fast Ethernet and Gigabit Ethernet are also covered as higher-speed successors to standard Ethernet. The document also examines protocols, the OSI model, Ethernet coding standards, and different types of media like twisted pair and fiber optic cables.
A local area network (LAN) uses wired connections to connect devices within a limited geographic area like a building or campus. Ethernet became the dominant wired LAN technology using carrier sense multiple access with collision detection (CSMA/CD) to regulate shared access to the transmission medium. Ethernet has evolved from 10 Mbps to 100 Mbps to 1 Gbps standards to meet increasing bandwidth demands. Key components of wired LANs include network adapters, cabling, connectors, switches/hubs, and software protocols. Other historical wired LAN technologies like Token Ring and Token Bus used token passing for medium access but have been largely replaced by Ethernet.
The document provides an overview of networking basics presented by Kevin Shea. It discusses the origins of networking in the 1960s for military purposes. It describes the TCP/IP model and protocols developed in the 1970s to allow communication across different networks. It also summarizes the seven layers of the OSI model and common network topologies like bus, star, and ring configurations.
This document provides information about various types of computer networks and networking components. It defines what a computer network is and describes local area networks (LANs) and wide area networks (WANs). It also discusses networking hardware components like network interface cards, hubs, bridges, switches, and routers. Additionally, it covers specific network types such as campus networks, backbones, metropolitan area networks, virtual private networks, and the internet.
The document discusses and compares various networking equipment. It defines terms like router, switch, hub, bridge and provides examples of products from companies like ASUS, D-Link, Netgear. It then provides a table comparing the price of various routers, switches, hubs and bridges from these companies.
This document provides an overview of computer networks and networking fundamentals. It discusses the basic components of a network including nodes, links, and different types of networks from personal area networks to wide area networks. Specific topics covered include network devices, topologies, local and wide area networks, internetworking, and storage area networks. The goal is to learn the basics of how computer networks work and operate at a fundamental level.
The document discusses various topics related to networking infrastructure and protocols:
1. It describes the components of a structured cabling system and benefits of an extended star topology used for cabling.
2. It explains several key protocols used at different layers of the OSI model including SMTP, ARP, FTP, and SSL and their functions.
3. It discusses wireless networking components like wireless routers/modems and adapters and how Wi-Fi works based on IEEE 802.11 standards at the physical and data link layers.
4. It covers Wi-Fi standards, advantages and disadvantages of wireless networking, and factors to consider for wired vs wireless implementation in a LAN.
A network consists of two or more computers that are linked together in order to share
the resources, such as printers, exchange files among computers, with the help of electronic
communications. The computers on a network may be linked by cables, telephone lines,
radio waves, satellites, or infrared light beams etc.
A computer network allows sharing of information and resources between connected computers. There are three main types of networks: local area networks (LANs) which connect computers in a limited area like a home or office; wide area networks (WANs) which span large geographical areas like countries; and metropolitan area networks (MANs) which interconnect users in a region larger than a LAN but smaller than a WAN. Other network types include personal area networks (PANs) around an individual, home networks, enterprise private networks, storage area networks (SANs), campus area networks (CANs), and global area networks (GANs).
This document provides an overview of computer networks, including definitions, types, advantages, and disadvantages. It discusses local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). Wireless local area networks (WLANs) and different network topologies like star, ring, bus, mesh, line, and tree are also covered. The document concludes with explanations of how networks are created and defined, including definitions of IP addresses and the differences between dynamic and static IP addresses.
The document discusses computer networks and the internet. It defines a computer network as a group of connected computers that allow communication between them. There are two main types of networks: local area networks (LANs) within a single location, and wide area networks (WANs) connecting multiple locations over greater distances. The document outlines advantages of networks like speed, cost savings, security, and resource sharing. It also discusses internet basics like browsers, websites, email, and search engines.
This document discusses the basic components of computer networks. It explains that networks are collections of two or more connected computers that allow users to share files, printers, and other resources. The key components of a network include computers, network interface cards, connection media like wires or cables, and network operating system software. Additional components that networks often include are hubs, switches, routers, and bridges to connect and manage the flow of data between computers.
A computer network connects two or more computers together to allow sharing of resources like files, printers and bandwidth. The main components of a network include computers, networking interface cards, connection medium like cables, and network operating system software. Common network types are LANs for local connections and WANs for wide area connections between locations. Protocols like TCP/IP are used to allow communication between different computers and networks. Ethernet is a common standard for LAN connections using cables like twisted pair or fiber optic.
Ethernet is a LAN technology that transmits data at speeds between 1 Mbps to 1 Gbps. It operates at the physical and data link layers of the OSI model. The original Ethernet specification from 1980 defined the standards, while current specifications are developed by IEEE 802.3. Ethernet evolves through standards like 10BaseT, 10Base2, 10Base5, 10BaseFL, 100BaseVG, 100BaseX, which provide faster speeds and use different cable types like twisted pair, coaxial, and fiber optic cables. Ethernet frames data into packets with fields for destination/source addresses, type, and error checking.
Mr. Khan's presentation summarized key aspects of computer networking. It defined a network as connecting two or more computers through a communication medium. Networks allow users to share resources like files, printers, and email. The history of networking involved developments by organizations like Unisys to further the technology. Networks can be structured in different topologies like bus, star, ring and mesh, and use protocols like Ethernet, Token Ring, and TCP/IP to exchange data.
What is the network ?
General Types of Network
Type of Create Connection
Types of Network
Advantages of Network
Disadvantages of Network
What is Network Topology?
What is IP Address?
The document provides information about networking and internet technologies. It discusses computer networks and how they allow sharing of information, data, programs and resources. This reduces costs. Network topologies like star, bus, ring and tree are covered. Different types of network cabling including UTP, coaxial, fiber optic and wireless are described. Components of a network like servers, clients and networking devices are explained. Concepts like packet switching, peer to peer networks and protocols are also summarized.
This document provides an introduction to computer networking concepts for students. It discusses the basic components of a network, including cables, switches, routers and wireless access points. It explains the differences between peer-to-peer and client-server network configurations. Advantages of networking for schools include faster sharing of files and resources, lower costs through shared software licenses, and easier collaboration between students and teachers. Some considerations for setting up a wireless network are also outlined.
There are three main network topologies used to connect computers: bus, ring, and star. A bus topology has all computers connected to a single cable in a line. A ring topology connects each computer to the two nearest nodes in a circular configuration. A star topology connects each computer to a central device like a hub or switch. Hubs and switches are used to connect computers in a star topology network and operate at the physical and data link layers, while routers connect multiple networks and operate at the network layer.
There are three main network topologies used to connect computers: bus, ring, and star. A bus topology has all computers connected to a single cable in a line. A ring topology connects each computer to the two nearest nodes in a circular configuration. A star topology connects each computer to a central device like a hub or switch. Hubs and switches are used to connect computers in a star topology network and operate at the physical and data link layers, while routers connect multiple networks and operate at the network layer.
This document discusses various local area network (LAN) technologies. It begins by defining LANs and explaining that they can connect devices within a single building or across multiple buildings. Common LAN technologies discussed include Ethernet, Token Ring, fiber, and wireless networks. Ethernet is currently the most widely used standard. Fast Ethernet and Gigabit Ethernet are also covered as higher-speed successors to standard Ethernet. The document also examines protocols, the OSI model, Ethernet coding standards, and different types of media like twisted pair and fiber optic cables.
A local area network (LAN) uses wired connections to connect devices within a limited geographic area like a building or campus. Ethernet became the dominant wired LAN technology using carrier sense multiple access with collision detection (CSMA/CD) to regulate shared access to the transmission medium. Ethernet has evolved from 10 Mbps to 100 Mbps to 1 Gbps standards to meet increasing bandwidth demands. Key components of wired LANs include network adapters, cabling, connectors, switches/hubs, and software protocols. Other historical wired LAN technologies like Token Ring and Token Bus used token passing for medium access but have been largely replaced by Ethernet.
Here are some key advantages and disadvantages of network virtualization:
Advantages:
- Increased flexibility and agility. Virtual networks can be quickly created and configured on demand. This allows for rapid provisioning of test/development environments and easier configuration changes.
- Improved resource utilization. Virtualization allows multiple virtual networks to utilize the same physical networking hardware, improving overall utilization of switches, routers, and other devices.
- Simplified management. Virtual networks can be centrally managed as logical entities rather than individual physical devices, reducing management overhead.
- Enhanced availability. Virtual networks and workloads can be live migrated in case of hardware failures to ensure continuity of operations.
Disadvantages:
- Performance
This document discusses performance issues related to the interoperability between IEEE 802.3 (Ethernet or wired LAN) and IEEE 802.11 (wireless LAN) standards in a heterogeneous network environment. It provides an overview of the two standards, including their development and key features. The document then examines interoperability issues that can occur when combining these different network types. It describes how data is exchanged between wired and wireless networks at the data link layer. The document also presents results from a simulation that showed LAN data transfer to be faster than WLAN information exchange.
This document provides an introduction to computer networking concepts. It begins by stating the goals of the class are to provide a basic understanding of modern networking technology and terminology, as well as an overview of what makes Stanford's network unique. It then discusses various networking models and layers including the OSI and TCP/IP models. It covers physical network components like Ethernet, wireless networks, switches and routers. It also explains key networking protocols like IP addressing, ARP, DNS, and routing. The document is intended to familiarize readers with fundamental networking concepts in a high-level manner.
This document provides an introduction to computer networking concepts. It begins by stating the goals of the class are to provide a basic understanding of modern networking technology and terminology, as well as an overview of what makes Stanford's network unique. It then discusses various networking models and layers including the OSI and TCP/IP models. It covers physical layer topics such as wired and wireless networking standards. It also discusses data link layer protocols like Ethernet and switching versus hubs. The network layer and IP addressing are explained. The document concludes with an overview of routing and domain name resolution.
This document provides an introduction to computer networking concepts. It begins by stating the goals of the class are to provide a basic understanding of modern networking technology and terminology, as well as an overview of what makes Stanford's network unique. It then discusses various networking models and layers including the OSI and TCP/IP models. It covers physical networking components like Ethernet, wireless networking, switches and hubs. It also discusses network addressing with MAC addresses, IP addresses, and DNS. The document provides an overview of routing and explains common networking terms.
This document provides an introduction to computer networking concepts. It aims to give students a basic understanding of modern networking technologies and terminology. The document covers networking models, protocols, physical network components like twisted pair cabling and wireless networks, data link protocols like Ethernet, and network layer protocols like IP. It explains key concepts like addressing, encapsulation, routing, and the difference between hubs and switches. The goal is to familiarize students with common networking topics in a short introductory course.
A LAN is a network confined within a limited geographic area that connects computers. LANs can connect as few as three computers but often link hundreds used by thousands of people. Standard networking protocols and media have resulted in widespread use of LANs in businesses and schools. Common LAN technologies include Ethernet, phone lines, and wireless. Ethernet uses coaxial or twisted pair cabling and a hub to connect computers, while phone lines use existing telephone wiring. Wireless networks use radio signals and no cabling.
A network connects computers and devices together using cables to allow sharing of hardware, software, files and printers. Information travels over the cables at certain speeds depending on the type of network. There are rules and standards that networks follow regarding cabling, topology and speeds. Ethernet is a common and fast networking standard that uses either twisted-pair or thin coax cabling and network cards to connect nodes on the network.
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptxtendaisigauke3
The document provides an overview of the history and development of computer cabling systems from their origins to present-day standards. It describes how early cabling systems such as coaxial cable and twisted-pair were adapted for use in computer networking with the development of Ethernet in the 1970s. Key standards including 10Base5, 10Base2, and later additions of fiber optic, Fast Ethernet, and Gigabit Ethernet cabling are outlined. Emerging technologies and trends that have shaped the evolution of computer cabling standards are also discussed.
For N10-005 Exam
Network Plus study guide.
Covers the basic with point form answers and easy to remember.
Those who hold a Network+ certification may improve their chances of landing a job in the networking industry or increasing salary in their existing position. A Network+ also can be used to partially satisfy some prerequisites of more advanced IT certifications. For example, it qualifies as one of part of the elective exam requirement of the Microsoft Certified Systems Administrator (MCSA) certification.
Ethernet is a family of networking technologies commonly used in LANs, MANs and WANs. It was first standardized in 1983 at 10 Mbps and has since been updated to support higher speeds up to 10 Gbps. Fast Ethernet runs at 100 Mbps using the same frame format as standard Ethernet. Gigabit Ethernet runs at 1 Gbps while maintaining compatibility. Ten-Gigabit Ethernet operates at 10 Gbps while keeping the same frame format as prior standards.
This document provides an overview of key concepts in computer networks and communication. It defines what a network is, discusses the need for networking and sharing of resources, and outlines the evolution of early networks like ARPANET and NSFNET into the modern Internet. It also covers network topologies, transmission media, switching techniques, common network devices, and communication protocols.
Ethernet is a family of networking technologies commonly used in local area networks (LANs). The original Ethernet from the 1970s used coaxial cable as a shared medium, while newer variants use twisted pair cables and fiber optics connected through switches. Over its history, Ethernet speeds have increased from 2.94 megabits per second to 400 gigabits per second. Ethernet frames contain source and destination addresses and error checking to detect damaged frames. Ethernet is widely used both in homes and industry, and forms a key part of the infrastructure of the Internet.
Introduction and different types of Ethernet.pptxupamatechverse
What Is Ethernet?
Ethernet is a networking technology that includes the protocol, port, cable, and computer chip needed to plug a desktop or laptop into a local area network (LAN) for speedy data transmission via coaxial or fiber optic cables.
- The document introduces networking concepts and models including the OSI 7-layer model and simplified 4/5-layer model. It discusses the goals of understanding common networking technology and terminology as well as Stanford's network.
- Key concepts covered include the physical, data, and network layers of networking. The physical layer discusses cabling standards like Cat5 and wireless technologies. The data layer focuses on Ethernet standards and addressing. The network layer introduces routing and the Internet Protocol.
This document provides information on different types of computer networks and networking concepts. It discusses local area networks (LANs), wide area networks (WANs), campus area networks (CANs), metropolitan area networks (MANs), home area networks (HANs), intranets, and extranets. It also covers topics like server-based networks, client/server networks, peer-to-peer networks, topologies (such as star, mesh, bus, ring, and tree), protocols (TCP/IP, IPX/SPX, NetBEUI), network media (twisted pair wire, coaxial cable, fiber optic cable, wireless), and network devices (hubs, switches, bridges, routers,
InfiniBand is a high-performance network architecture based on a switched fabric design that supports bandwidth between 2.5-30Gbps. It is used in storage and cluster networks and offers throughput of up to 2.5GB/s and support for 64,000 devices. InfiniBand uses a serial bus design and supports multiple memory areas that can be addressed by processors and storage. It uses switched routing and Internet Protocol Version 6 for almost limitless device expansion.
This document defines various computer networking terms and discusses different types of computer networks. It describes personal area networks (PANs), local area networks (LANs), and campus area networks (CAN). For LANs, it distinguishes between client/server networks and peer-to-peer networks. It also discusses different network topologies like bus, star, and ring topologies. Finally, it provides examples of shared hardware components on a network like printers, disk drives, and modems.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Climate Impact of Software Testing at Nordic Testing Days
Networking 1
1. Jaycar Electronics Tech Update: NETWORKS.PDF (1)
Networking Basics
Keen to link your computers together in a network? It’s easier and cheaper than ever
to do this, thanks to recent developments in both hardware and software. Here’s a
quick update on modern networking basics — and a practical guide to setting up your
own network.
W H E N E V E R Y O U have more than one computer being
used at the same location, networking them together
makes a lot of sense. Not only can you transfer files
between them quickly and easily, but they can also share
expensive resources like laser printers, hard disc arrays,
backup tape drives, CD and DVD burners, scanners,
internet connections and so on.
Thanks to recent developments in both hardware and
software it’s now also easier than ever to hook up your
own network, and at surprisingly low cost. In this Tech
Update we’re going to explain the latest approaches to
cost-effective networking, and give you enough
understanding to let you tackle setting up your own
network with confidence and success.
First, though, let’s take a quick look at how computer
networking developed.
Networking history
In many ways networking is just another development of
data communications, which began at the same time as
computers themselves. For example in 1940 when
George Stibitz and Samuel Williams, researchers at
AT&T’s Bell Laboratories, developed their Complex
Number Generator — one of the earliest digital
computers — they made it possible for users to operate
the computer remotely from teletype machines on three
different floors in their Manhattan building. They also
developed a system to allow users to communicate with
the machine even more remotely, via telex machines.
Then in 1964, when computers were still very much in
the ‘mainframe’ era, Drs John Kemeny and Tom Kurtz of
Dartmouth College in New Hampshire developed not
only the simplified BASIC programming language
(Beginners All-purpose Symbolic Instruction Code) but
also a system called t i m e s h a r i n g , which allowed many
students to use a single computer at what seemed like
the same time, from a large number of teleprinter
terminals spread around the campus and elsewhere.
Officially, though, networking is said to have started in
1976, when researchers Dr Robert Metcalfe and Dr
David Boggs of the Xerox Palo Alto Research Center
(PARC — the same place that developed the GUI or
‘graphical user interface’, the ancestor of Macintosh and
Windows operating systems) presented details of a
‘Local Computer Networking System’ which allowed
data to be transferred between a number of computers
and printers, at what then seemed a high speed:
2.94Mb/s (megabits per second). They dubbed the new
networking system E t h e r n e t , and explained that it
involved all data being sent in standardised ‘packets’.
Each packet of data carried its own electronic ‘address’,
which allowed the packets to be directed around the
network by switching circuits.
Xerox Corporation was granted a patent for Ethernet
(“Multipoint Data Communications System with
Collision Detection”, US Patent No.4063220) on
December 13, 1977. Then in 1979 Xerox teamed up
with Digital Equipment Corporation and Intel to define
the first official standard specification for Ethernet. This
Ethernet Version 1.0 was capable of transferring data at
10Mb/s over fairly thick (10mm diameter) 50Ω coaxial
cable, and became known as ‘thick Ethernet’ or
‘10Base5’. The second term was because it allowed a
10Mb/s data rate, it used b a s e band transmission rather
than a modulated high-frequency carrier, and would give
reliable data communication over cable lengths up to
500 metres.
Four years later, the 802.3 working group of the IEEE
(Institution of Electrical and Electronics Engineers)
released its first industry standard for Ethernet, giving it
the name IEEE 802.3 Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) Access Method and
Physical Layer Specifications . This was essentially a
polished-up version of the DEC-Intel-Xerox ‘thick
Ethernet’.
Later developments of Ethernet came fairly quickly,
and resulted in Ethernet soon becoming the most
popular computer networking system.
Fig.1: Four computers connected up in a network using the bus or ‘daisy chain’ topology — in this case
using 50-ohm coaxial cable, as used for 10Base5 (thick Ethernet) or 10Base2 (thin Ethernet) networking.
2. Jaycar Electronics Tech Update: NETWORKS.PDF (2)
Fig.2: A group of five PCs connected
together in the ‘star’ topology, with a
‘hub’ or multi-port repeater at the centre
of the star. This configuration is most
commonly used in networks using 10BaseT
or 100BaseT Ethernet systems.
In 1985, the IEEE working group came out with ‘thin’
Ethernet, also known as ‘cheapernet’ or ‘10Base2’. This
specified the use of thinner (5mm diameter) 50Ω coaxial
cable, which still allowed 10Mb/s baseband transmission
as before, but with a maximum cable length of 185
(rounded to ‘200’) metres.
Then in 1990 the IEEE 802.3i or ‘10BaseT’ Ethernet
standard was released, which opened the door to much
cheaper networking because it allowed 10Mb/s
transmission over the low cost 100Ω u n s h i e l d e d
t w i s t e d - p a i r or ‘UTP’ Category 3 cabling which had by
then become widely used for telephone wiring in
buildings. Using this cable also allowed the network to
use a ‘star’ configuration or t o p o l o g y , rather than the
bus or ‘daisy chain’ topology needed for thick and thin
Ethernet (10Base5 and 10Base2). The two different
topologies are illustrated in Figs.1 and 2.
The next big development came in 1995, when the
IEEE working group released the 802.3u standard. This
became known as ‘100BaseT’ or ‘Fast Ethernet’, because
it allowed 100Mb/s baseband transmission over either
two pairs of Category 5 100Ω UTP cabling (100BaseTX),
or four pairs of Category 3 cabling (100BaseT4) or two
multi-mode fibre-optic cables (100BaseFX). In other
words, 10 times the speed of 10BaseT.
Then in 1997 came IEEE 802.3x, which defined f u l l
d u p l e x or simultaneous two-way data communication
over either 10BaseT or 100BaseT. This effectively
doubled the data rate again, because before this
Ethernet allowed only h a l f d u p l e x or ‘one way at a time’
communication — especially in 10Base5 and 10Base2
coaxial systems.
Then in 1998 and 1999, the IEEE working group
released four different implementations of the 802.3z
‘Gigabit Ethernet’ standard, achieving 1Gb/s transmission
or another 10-times increase in data transfer rates. The
four versions of this are 1000BaseSX, which uses 850nm
lasers and a multi-mode fibre-optic cable; 1000BaseLX,
which uses a 1300nm laser and either single or multimode fibre-optic cable; 1000BaseCX, which uses
‘twinax’ shielded twisted-pair (STP) cable; and
1000BaseT, which uses four pairs of Category 5 UTP
cabling.
Don’t let all of these different ‘flavours’ of Ethernet
worry you, because the two early coaxial-cable based
versions (10Base5 and 10Base2) are now regarded as
obsolete and are not recommended for new networks.
Also Gigabit Ethernet is not only fairly expensive, but in
any case its 1Gb/s performance is essentially ‘overkill’
for most home and small office applications.
That really just leaves 10BaseT and 100BaseT, which
both turn out to be very suitable and cost-effective for
both home and small office networking. In fact as we’ll
see soon, the price of everything you need for 100BaseT
now makes it virtually the ideal system for new networks, even those with only two or three computers.
Because of this, we’re going to ignore the other varieties of Ethernet in the rest of this update, apart from
the foregoing mention of their existence.
USB networking
Before we dive further into Ethernet, though, let’s look
briefly at another approach to networking that can be
more attractive if you only have two or three computers
to be hooked together and you want do it with the least
possible hassle. This is using USB-USB link cables.
As you’re no doubt aware, most PCs made since about
1996 are fitted with ports for the Universal Serial Bus
or USB — a medium speed serial interface bus designed
expressly for connecting computers to peripherals like
scanners, printers, keyboards, mice, joysticks, modems,
3. Jaycar Electronics Tech Update: NETWORKS.PDF (3)
digital cameras, low speed CD-ROM burners and so on.
USB is also supported by most of the recent versions of
Windows: Windows 98, Windows ME, Windows 2000
and Windows XP (but not Windows NT).
One of the big advantages of USB are that it’s ‘Plug-nPlay’, so cables can be plugged in or unplugged safely
even when the power is on. It also offers a fairly high
data rate of 12Mb/s, although only over relatively short
cables — up to about five metres or so.
USB was designed to connect a single ‘host’ computer
with many (up to 127) slave devices, with a ‘tiered star’
topology. This means it wasn’t really designed for
directly linking two or more computers. (For more
information on USB, see the Reference Data Sheet
USBBUS.PDF, which can be downloaded from our
website). However engineers have recently been able to
design special adapter cables which can be used to link
computers via their USB ports, and software people
have written ‘driver’ software to support networking via
these USB-USB link cables, running under any of the
operating systems which support USB.
Using one of these cables you can usually achieve data
transfer rates of about half the full USB rate, or roughly
5Mb/s.
An example of this type of cable is the XC-4845 USB
to Net-Linq cable available from Jaycar stores and
Electus dealers. Hooking two PCs together using one of
these is very straightforward; you don’t need to open up
either computer to fit any cards. All that’s needed is to
Fig.3: How the
XC-4845 USB to
NET-Linq cable
shown at above
right can be
used for
networking two
or more PCs
using their USB
ports.
Here is the Jaycar XC-4845 ‘USB to NET-Linq’
cable, which can be used to network two or more
PCs via their USB ports...
install the driver software (supplied on a CD-ROM) on
one PC to suit its operating system, and then connect
the two computers together via the USB adaptor cable
4. Jaycar Electronics Tech Update: NETWORKS.PDF (4)
b a c k i n g o f f , and the random back-off delays are to try
— which plugs into a spare USB port on each machine,
or on a ‘downstream’ USB port on a hub. The basic idea
and ensure that they shouldn’t have a collision with their
is shown in Fig.3(a). The two machines will then form a
next attempts.
simple network, with all the usual facilities for file
What does an Ethernet data packet or frame actually
transfer, printer sharing and so on.
look like? Fig.4 gives you an idea. The main things to
It’s also possible to connect additional PCs (up to 17
note are the destination and source address segments or
in all) to this simple USB network, simply by using
fields, which can each be between 2 and 6 bytes long
additional XC-4845 cables and a USB hub. Fig.3(b)
(16 - 48 bits), and the data segment itself which can be
shows how this is done. Note that the PC connected to
between 46 bytes and 1500 bytes long. We’ll see how
the hub’s upstream port (Computer 3) doesn’t need an
those address fields are used in directing the packets
XC-4845 USB link cable — just a normal USB cable. But
around the network shortly.
each of the other PCs does need its own XC-4845
By the way, if you were wondering why the Ethernet
cable.
standards have a specification for the maximum cable
USB networking is really only suitable if the
length between any two device ‘nodes’, it’s because of
computers are all in the same room, fairly close to each
the way the CSMA/CD collision detection scheme
other and
works. It always
running USBtakes a certain
compatible
time for signals
operating
to ‘propagate’
systems. It
along a cable,
also becomes
and this delay
Fig.4: The basic format used in Ethernet data packets or ‘frames’. Note
a bit
time is directly
the destination and source address fields, used in directing each packet
expensive if
proportional to
around a network.
you want to
the cable length.
connect up more than about three PCs. In fact for
But for the collision detection scheme to work, each
networking three or more computers, it’s really easier
device must be able to receive the collision warning
and cheaper to use 10BaseT or 100BaseT Ethernet
signal from any other device before it’s too late to
cables and equipment — especially if the PCs are in
respond. So the maximum total ‘round-trip’ propagation
different rooms. So let’s now turn our attention to this
time must be less than the Ethernet’s CSMA/CD s l o t
time .
approach to networking.
Since cable delay time (in each direction) is the main
Ethernet basics
contributor to total propagation time, this sets a limit
to the maximum cable length between any two PC
As we’ve seen, the most popular system used for local
nodes on the network.
area networks or ‘LANs’ is Ethernet, developed from
the system developed at PARC in 1977 by Metcalfe and
This is why the original 10Base5 Ethernet had a
Boggs. And although there are many different
maximum node-to-node cable distance of 500 metres,
implementations of Ethernet, they’re all based on the
because of its 10mm diameter ‘thick’ coaxial cable. It’s
same basic logical bus topology, the same system of
also why 10Base2 Ethernet has a maximum node-tosending data in relatively small ‘packets’ or f r a m e s which
node distance of 185 metres, because of its thinner
carry the address of both the sending and receiving
5mm diameter coax (RG-58). And of course why
device, and the same method of allowing a lot of data
10BaseT and 100BaseT have a maximum node-to-node
transceivers to share that common bus. This is the
distance of 100 metres, because of their use of UTP
method explained in the original Xerox patent, called
cable.
carrier sense multiple access with collision detection
(CSMA/CD).
10BaseT basics
Without going too deeply into the technicalities,
10BaseT Ethernet uses low cost ‘Category 3’ (or better)
CSMA/CD essentially works by having each device
four-pair UTP cabling of nominal 100Ω impedance to
‘node’ on the network listen for bus activity (i.e., c a r r i e r
connect up the computers and other equipment as a
s e n s i n g ) before it tries to transmit a packet of data. This
network. All connections are normally made via 8-pin
is like a subscriber on one of the old telephone ‘party
RJ45 modular plugs and sockets, which are very much
lines’ picking up the receiver to listen if someone is
like the 4-pin RJ11 and 6-pin RJ12 modular connectors
already using the line, before they try to make a call
now used for telephones, only slightly larger.
themselves.
The basic connections used for 10BaseT UTP cabling
If a device doesn’t detect any bus activity, it begins
to transmit the packet of data. But of course it’s
possible for another device to begin sending its data
at much the same time, in which case there’ll be a
‘collision’ — two packets of data are present on the
bus at the same time, and the data gets ‘mixed up’.
While the devices are transmitting their data,
they’re also sensing the bus so they can monitor for
any collisions (this is the c o l l i s i o n d e t e c t i o n
function). If they sense the extra bit transitions
produced by a collision, both devices stop
transmitting their data packets and the first device
sends out a special ‘jam sequence’ code — basically a
short collision alarm message. Then both of the
10BaseT and 100BaseT Ethernet both use UTP
devices that were trying to transmit wait short but
(unshielded twisted pair) cables, fitted with RJ45
random periods of time before listening for bus
modular connectors. Here are some samples of the
activity and trying to transmit again. This is known as
‘patch’ cables sold by Jaycar...
5. Jaycar Electronics Tech Update: NETWORKS.PDF (5)
and the RJ45 connectors are
shown in Fig.5. As you can see
only two pairs of wires are
actually used; the other two pairs
are connected, but not used.
Each computer connects to the
network via a n e t w o r k i n t e r f a c e
a d a p t o r c a r d or ‘NIC’, which is
basically a plug-in card containing
a controller to manage the data
interface between that computer
and the network, and a data
transmitter/receiver combination
or ‘transceiver’. In most modern
NICs the controller and
transceiver are combined in a
single LSI chip, which makes the
card very low in cost.
(By the way some of the latest
model PCs have a network
interface built directly into the
motherboard, so they don’t need
the addition of a separate NIC.
They have all the hardware
necessary for networking already
Fig.5: The connections for RJ45 plugs used on Category 3/5 UTP cables
present.)
as used for 10/100BaseT networking. Normal ‘straight through’ cables
An important point to
have both ends wired as in A; ‘crossover’ cables have one end (only)
remember is that regardless of
wired as in B, with the transmit and receive pairs swapped.
whether the PC’s network
interface is in the form of a NIC
provides a range of software drivers, to suit different PC
or built into the motherboard, it has a fixed and unique
operating systems and/or network operating systems.
network or ‘MAC’ (media access control) address which
is hardwired into it during manufacture. This address is
The simplest possible 10BaseT network is shown in
a six-byte (i.e., 48-bit) binary number, which is used by
Fig.6. As you can see it’s simply a pair of PCs, each
the network to identify the node at which that PC is
fitted with a NIC and with the two NIC ports
connected. The interface or NIC will only ‘accept’ data
connected together with a Category 3 or higher rated
packets which carry this address in their distination
UTP ‘patch lead’. If the two PCs are running virtually
address field (Fig.4), and will always include the same
any modern operating system (i.e., Windows 3.11 or
address code in the source address field of any data
later) it’s simply a matter of installing the appropriate
packets it transmits out to the network.
software drivers in each computer and they’ll be
operating as a fully functional ‘peer to peer’ network.
Often diagnostic software will represent the NIC’s
Data can be transferred between the two in either
MAC address as a 12-digit hexadecimal number, such as
direction at 10Mb/s, simultaneously if necessary.
054F17B3A8. Not that you normally need to worry
about your PC’s NIC address, of course — the
More speed: 100BaseT
networking software looks after all that.
To allow the NIC’s controller to manage the exchange
10 megabits per second is quite fast, of course. Fast
of data between the computer’s processor and all other
enough for most home and small office networks, in
computers on the network, you have to install
fact. But if you do need even faster networking, this can
networking ‘driver’ software in the computer. NICs
be achieved quite easily by using 100BaseT (strictly
usually come with a floppy disc or CD-ROM which
100BaseTX) instead. This is very similar to 10BaseT, and
still uses four-pair UTP cable; the only difference is
that the connecting cable(s) must now be Category
5 rated — so that they can cope with 100BaseT
data rates of up to 100Mb/s. The actual cable
connections are still exactly the same.
For 100BaseT you also need to use NICs which
are rated for 100Mb/s operation, as well. Luckily
most currently available low cost NICs are capable
of operating at either the 10BaseT or 100BaseT
rates, so this isn’t likely to be a problem. Most of
these so-called ‘10/100BaseT’ cards are designed to
plug into a PCI bus card slot in the computer, to
take advantage of the higher speed.
These are the only two real differences between
10BaseT and 100BaseTX — the latter needs
Category 5 cabling and NICs capable of the higher
speed. So the simple two-PC network shown in
Fig.6 could operate at either 10Mb/s or 100Mb/s in
The YN-8062 network interface card or ‘NIC’ sold by
either direction, depending on the rating of the
Jaycar. Low in cost, it offers 10BaseT or 100BaseT
cables and NICs. The maximum length of cable
operation and plugs into a standard PCI card slot.
6. Jaycar Electronics Tech Update: NETWORKS.PDF (6)
between the two PCs would be
100 metres.
Adding a hub
What if you need to expand the
simple 10/100BaseT Ethernet
network of Fig.6, by adding more
computers? That’s easy. All you
need to do is install a NIC and
the appropriate driver software
into each additional PC, and
connect them up via a multi-port
10BaseT or 100BaseT h u b . We’ll
Fig.6: The simplest possible 10/100BaseT Ethernet network, made by
look closer at these shortly, but
fitting a NIC to each of two PCs and linking them with a UTP patch
for the moment just think of a
cable (Category 5 rating for 100BaseT). The cable needs to have
hub as a kind of data distribution
‘crossover’ connections, though — see text. Once the necessary
box which sends beefed-up
driver software in installed in each PC, they’re a network.
copies of any data packets
arriving at any one of its ports to
As you’d expect there’s a single RJ45 socket on the
all of the other ports.
card’s mounting bracket, to accept the network cable.
The general arrangement of this kind of hub-based
The only other items of interest are a couple of LEDs
network is shown in Fig.7, and as you can see the
just near the RJ45 socket, which are used to indicate
network now has a physical ‘star’ configuration or
activity at either the 10BaseT or 100BaseT rates.
topology. Each of the PCs is connected to a port on the
The NIC shown is available from Jaycar stores as the
hub, so they are all ‘peers’ in the network.
YN-8062, and has a retail price of around $30. It comes
The length of each cable should be kept less than 100
complete with a floppy disk containing networking
metres, so the maximum total cable length between any
driver software to suit a wide range of PC operating
two PCs is less than 200 metres. This applies regardless
systems (Windows for Workgroups 3.10 and 3.11,
of the proportion of each cable which is open
Win95, Win98-2000, WinME, Win NT4 and Macintosh)
‘patchlead’ and the proportion that is wired permanently
and networking systems (Lantastic V6.0, NDIS 2.0,
within walls or suspended ceilings. The other main
Netware 3.1/4.1/5.0, SCO UNIX 5.0 and a TCP/IP
requirement is that all cabling should be rated for
packet driver), and also a setup/configuration program.
Category 5, especially for 100BaseT operation.
Incidentally Jaycar also stocks a ‘combo’ NIC which
features both RJ45 and coaxial cable port connectors,
The network interface card
making it compatible with both 10BaseT and the older
As we’ve already noted, all except the very latest PCs
10Base2 ‘thin Ethernet’ networks. This card is worth
need the addition of a network interface card or NIC to
remembering if you need to replace a NIC in an existing
adapt them for Ethernet networking. As you can see
10Base2 network. It has the Cat. No. YN-8060, and is
from the photo on page 5, a typical 10/100BaseT NIC is
only a couple of dollars more than the YN-8062. But
a very small and low cost card which plugs into a PCI
note that it’s only capable of 10Mb/s operation, so you
slot, with just about all of the circuitry built into a
can’t use it in 100BaseT networks. It too comes with a
couple of ICs. One of the ICs includes the NIC’s hardfloppy disk containing all necessary driver and
wired MAC address.
configuration software.
Computer 2
Computer 1
NIC
10/100BaseT
Hub or Switch
NIC
Computer 3
Computer 4
NIC
Cat 5 UTP patch cables
(’Straight Through’ type)
NIC
Fig.7: To add
more PCs to
the network,
the simplest
approach is
to use a hub
as shown
here.
However for
faster
operation you
can use a
switch
instead, as
explained in
the text.
7. Jaycar Electronics Tech Update: NETWORKS.PDF (7)
configured for uplinking, you simply use
this hub as the cascaded or ‘expansion’
hub (Hub No.2 in Fig.8), and link the two
hubs together using a normal ‘straight
through’ Cat5 patch cable.
But what if neither hub can be
configured to have an uplink port? There’s
still no real problem — all you need to do
in this case is link the two together using
any of their normal ports, but using a
Cat5 patch cable with ‘crossover’ wiring.
In this case the necessary reversing of the
transmit and receive pairs is provided by
the cable, rather than the wiring inside a
hub. Fig.5(b) shows the connections for
one end (only) of a crossover cable. The
other end is wired as shown in Fig.5(a).
So just remember: when you’re
cascading hubs to expand your network,
either use an uplink port on the lowerlevel hub and link them with a normal
‘straight through’ cable, or use normal
ports on each and link them with a
‘crossover’ cable. By the way this same
rule also applies with switches, which
Fig.8: When more PCs need to be added to a 10/100BaseT
we’re going to discuss in the next section.
network based on a single hub (or switch), the easiest
One final point about cascading hubs
approach is to add another hub or switch and ‘cascade’
and switches: the patch cables used to
them as shown here.
interconnect the hubs or switches should
be no longer than five metres long. This is
again to keep network propagation delays
Cascading hubs
within the 10BaseT or 100BaseT specifications, for
As we’ve seen the simplest way to hook up more than
reliable operation.
two PCs in a network is using a hub, as shown in Fig.7.
Hubs are relatively simple and low in cost, and they’re
Switches vs hubs
essentially multi-port ‘repeaters’ or signal booster
While you can keep on expanding a network by using
amplifiers. They have no built-in ‘intelligence’; any
cascaded hubs, as shown in Fig.8, what you find if you
packet of network data which arrives via the input
do this is that before long, the network seems to
connections of any of their ports is simply beefed up
become noticeably slower in operation. This slowdown
and sent out again via the output connections of all
is due to network ‘congestion’, which arises because of
ports (including the one they came from).
the way hubs are ‘dumb’ and simply boost any data
As low cost hubs are available with up to eight ports,
signals which arrive at any of their port inputs, and
this means that the simple hub-based network scheme
broadcast them out again to all ports.
shown in Fig.7 can be used to link up as many as eight
So in a network hooked up via hubs, every PC’s NIC
computers. Jaycar stores sell two suitable Nexus
receives every data packet sent over the network, and
10BaseT hubs for this, the YN-8070 Five-port model
it’s up to the NIC and its driver software to inspect
and the YN-8072 Eight-port model. Both are very
every packet and ‘ignore’ all of those which are
compact and run from a small plug pack.
intended for another PC. It’s like a telephone system
What about networks with more than eight PC’s?
hooked up as an enormous party line, with no
When you want to expand past eight, the simplest
switchboard. And because of the huge amount of data
solution is to add a second hub connected in ‘cascade’
sent to each NIC all the time, the network slows down.
with the first. This is shown in Fig.8. The second hub
To solve this problem, or at least minimise its impact,
connects to one port of the first, in place of one of the
original PCs.
There’s an important point to note about this
cascading of hubs, though. For the cascading to work
properly in terms of network operation, there must be
a ‘crossover’ connection between the two hubs. In
other words, the input connections at one end of the
hub-to-hub cable must connect to the output
connections at the other, and vice-versa.
Many hubs are designed so that one of their ports can
have these connections swapped over inside with a
switch, so that by using the switch you can configure
that port as a ‘Uplink’ port for cascading. With the
This very compact 10BaseT five-port hub is very
switch in the ‘Normal’ position, the port is configured
suitable for small networks. One of its five ports
just like all the others, to connect to a NIC in a PC.
can be configured as an ‘uplink’ port, with the
Both of the hubs sold by Jaycar have one port which can
connections internally crossed over. Power comes
be configured in this way, for example.
from a small ‘plug pack’. The Nexus unit shown
is sold by Jaycar stores as YN-8070.
If you do have a hub with a port which can be
8. Jaycar Electronics Tech Update: NETWORKS.PDF (8)
OR gate
Port 1
Port 2
Buffer Amp
Port 3
Port 4
Port 5
(A) Simple 5-Port Hub
Memory
and
Switching
Controller
Packet
Address
Analyser
Port 1
Port 2
Port 3
Port 4
Port 5
Port 6
Packet Address
Analyser, Memory,
Crosspoint Switches
& Buffer Amps
Port 7
Port 8
(B) N-Way Switch (8-way)
Fig.9: Diagrams showing the difference between a
hub and a switching hub or ‘N-way switch’. The
latter is much smarter, directing the data packets.
the simplest approach is to use switching hubs or
s w i t c h e s instead of normal hubs. Switches may look very
similar to hubs, but they’re the next step up in terms of
‘intelligence’. Instead of simply boosting every incoming
data packet or frame and broadcasting it to all ports, a
switch checks the source and destination fields in each
frame (see Fig.4), to work out where that frame has
come from and where it should be sent. It also has an
internal memory where it stores the hardwired network
address of each NIC that is currently connected to its
ports (or the addresses of the NICs that are connected
elsewhere in the network, via its uplink port). And
finally, it has a ‘crosspoint’ switch array, with a set of
electronically controlled switches so that it can direct
any incoming data frame to the output pair of just one
port — the port which connects to the NIC
corresponding to its destination address.
So if you like, a switch is much ‘smarter’ than a hub,
and much more like a telephone switchboard. By
directing each packet of data only to the NIC it’s
intended for (or at least the hub or switch to which that
NIC is connected), a switch cuts down the network
congestion significantly. Because each NIC now only
receives data that is specifically addressed to it, there’s
now much less risk of data collisions too. As a result
the network can operate at much closer to full speed.
The basic differences between a hub and a switch are
shown in Fig.9. As you can see there’s a lot more in a
switch, to give it the intelligence to remember the NIC
addresses, work out the destination of each data packet
and send it only to the port leading that NIC’s address.
If you want to take advantage of the significant
increases in network efficiency and speed offered by
switches, Jaycar offers two Nexus models — both rated
for 10/100BaseT operation. The YN-8082 is a five-port
switch, while the YN-8084 provides eight ports. Both
have one port which can be used either as a normal
port to connect to a NIC, or as an uplink port to
connect to another switch or hub for cascading with a
straight-through cable.
Note that both of these switches are capable of
10/100BaseT operation (i.e., up to 100Mb/s), whereas
you’ll remember that the two low-cost hubs currently
stocked by Jaycar are only capable of 10BaseT (10Mb/s)
operation.
Do you have to use either hubs OR switches, or can
you mix the two? You can always use a combination of
the two if you want. Replacing your top-level hub with a
switch will generally give a big improvement, even if you
still use hubs at the lower levels. As switches are usually
twice the price of a hub with the same number of ports,
this kind of mix-and-match combination can be very cost
effective.
For example a combination of an eight-way switch at
the top level with a couple of five-way hubs at the next
level down, as shown in Fig.10, will usually give quite
speedy operation for up to 14 PCs. Replacing the two
lower-level hubs with switches will certainly give an
additional speedup, but often not enough to justify the
extra cost.
In short the decision about using switches instead of
hubs is really up to you, because it depends largely on
the amount of money you have available to invest in
networking and the degree of network congestion
slowdown you’re prepared to tolerate.
Note though, that if are using a switch at the top level
and your network includes a PC shared as a network
resource by all the other PCs — such as a print server,
a server for a CD-ROM drive tower or hard disk RAID
(redundant array of inexpensive drives) array, or a high
speed internet connection — this machine or machines
should be connected directly to a port on the top level
switch. Don’t connect servers to the lower level hubs
or switches, or most of the potential efficiency of the
switch won’t be realised.
Wireless networking
You’ve probably heard about wireless networking —
networking computers using radio waves instead of
cables. So just before we finish up we’d better give you
a basic understanding of what this is all about.
Practical wireless networking dates from 1997, when
the IEEE published its 802.11 standard for wireless
As you can see, a five-port switch looks very
similar to a five-port hub. However it has the
capability to give much speedier network
operation. This Nexus 10/100BaseT unit is sold by
Jaycar as the YN-8082.