SlideShare a Scribd company logo
NIC & HUB
NIC Intro..
• A network interface card, more commonly
referred to as a NIC, connects a system to
a network. It is a card with a connector
port.
• In computer networking, a NIC provides
the hardware interface between a
computer and a network.
• Also known as Ethernet card or Network
adapter.
• Network interface cards provide a
dedicated, full-time connection to a
network.
• It allows your computer to "talk" to the
network and the network to communicate
with your computer.
Network cards are
typically available in
10/100/1000 Mbit/s
varieties.This means
they can support
maximum transfer
rate of 10, 100/1000
Megabits per
second.
This old ‘combo’ NIC accepts both BNC
(coaxial) and RJ45 (UTP) connectors.
BNC- (Bayonet Neill–Concelman) connector
Need of NIC
• Most computer networks transfer data
across a medium at a fixed rate, often
faster than the speed at which computers
can process individual bits.
• To accommodate the mismatch in speed,
each computer attached to a network
contain special purpose hardware known
as a network interface card (NIC).
• The NIC functions like an I/O device: it is
built for a specific network technology.
• It handles the details of frame
transmission or reception without requiring
the CPU to process each bit.
ETHERNET AND WIFI NICs
• Some NIC cards work with wired
connections while others are wireless.
• Most NICs support either wired Ethernet
or WiFi wireless standards.
• Ethernet NICs plug into the system bus of
the PC and include jacks for network
cables.
• while WiFi NICs contain built-in
transmitters / receivers (transceivers).
Installation of NICs
• The most common language or protocol
for LANs is Ethernet, sometimes referred
to as IEEE 802.3.
• A lesser-used protocol is Token Ring.
• When building a LAN, a network interface
card must be installed in each computer
on the network and all NICs in the network
must be of the same architecture.
• For example, all must either be Ethernet
cards, Token Ring cards, or an alternate
technology.
Cont..
• An Ethernet network interface card is
installed in an available slot inside the
computer.
• Most newer computers have a network
interface built into the motherboard.
• A separate network card is not required
unless multiple interfaces are needed or
some other type of network is used.
• Newer motherboards may even have dual
network (Ethernet) interfaces built-in.
Working
• A computer or device on a network can be
reached by its MAC (media access
control) address through the NIC card.
• Every Ethernet network card has a
unique 48-bit serial number called a MAC
address, which is stored in ROM carried
on the card.
Port In NICs
• The back plate of the network
interface card features a port that
looks similar to a phone jack, but
is slightly larger.
• A network card typically has a
twisted pair, BNC, or AUI socket
where the network cable is
connected, and a few LEDs to
inform the user of whether the
network is active, and whether or
not there is data being
transmitted on it.
• That port accommodates an Ethernet cable,
which resembles a thicker version of a
standard telephone line.
UTP (Unshielded Twisted Pair) e.g. CAT6
(‘Category 6’)
Wireless Ethernet cards
• Wireless Ethernet cards are installed like their
wired counterparts, but rather than a port for an
Ethernet cable, the card features a small
antenna.
• The card communicates with the central wireless
switch or hub via radio waves.
• Wireless LANs may have some restrictions
depending on the material the building is made
from.
• For example, lead in walls can block signals
between the network interface card and hub or
switch.
Wireless Ethernet cards
HUB
HUB Intro..
• Hub is a network hardware device for 
connecting multiple Ethernet devices 
together and making them act as a 
single network segment.
• Also called  multiport repeater, ethernet
hub, active hub, network hub, repeater
hub.
 
• Acts on the physical layer
• Operate on bits rather than frames
• Used to connect stations adapters in a physical
star topology but logically bus
• Connection to the hub consists of two pairs of
twisted pair wire one for transmission and
the other for receiving.
• Hub receives a bit from an adapter and sends it
to all the other adapters without implementing
any access method.
• does not do filtering (forward a frame into a
specific destination or drop it) just it copy the
received frame onto all other links
• The entire hub forms a single collision domain, and
a single Broadcast domain
– Collision domain: is that part of the network (set
of NICs) when two or more nodes transmit at the
same time collision will happen.
– Broadcast domain: is that part of the network (set
of NIC) where each NIC can 'see' other NICs'
traffic broadcast messages.
• Multiple Hubs can be used to extend the network
length
• For 10BaseT and 100BaseT the maximum length of
the connection between an adapter and the hub is 100
meters  the maximum length between any two
nodes is 200 m = maximum network length
Types of HUBS
• Passive Hubs
• Active Hubs
• Intelligent Hubs (Switches)
Passive HUB
• It functions only as a
connection point for the
signals .
• The signal pass through a
passive hub without
regeneration or
amplification.
Active HUB
• It regenerates or amplifies
the signal before they are
retransmitted.
• Also called Multiport
repeaters
• Drawback:
– The noise is also regenerated
Intelligent Hubs (Switches)
• Add extra features to an active hub that a
• An intelligent hub, one can easily identify,
diagnose problems and even come up
with remedial solutions. This
troubleshooting of a large enterprise scale
network is possible with the help of an
intelligent hub. re particular importance to
business.
NIC AND HUB CONNECTING DEVICES
NIC AND HUB CONNECTING DEVICES

More Related Content

What's hot

Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
Network Essentials
Network EssentialsNetwork Essentials
Network Essentials
Iffu Slides
 
Network devices
Network devicesNetwork devices
Network devices
Aryan Kabra
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Rozitarmizi Mohammad
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
data communication
data communicationdata communication
data communication
Rajat Singla
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
mc aa
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_enCcnp3 lab 3_4_en
Ccnp3 lab 3_4_en
Omar Herrera
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Mohd. ShahNawab
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
Vuz Dở Hơi
 
Cisco router basic
Cisco router basicCisco router basic
Cisco router basic
Tapan Khilar
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
sourabh4u07
 
Cisco router command configuration overview
Cisco router command configuration overviewCisco router command configuration overview
Cisco router command configuration overview
3Anetwork com
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
Nil Menon
 
Network Slides
Network SlidesNetwork Slides
Network Slidesiarthur
 

What's hot (20)

Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Network Essentials
Network EssentialsNetwork Essentials
Network Essentials
 
Network devices
Network devicesNetwork devices
Network devices
 
basic networking
basic networkingbasic networking
basic networking
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
data communication
data communicationdata communication
data communication
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Ccnp3 lab 3_4_en
Ccnp3 lab 3_4_enCcnp3 lab 3_4_en
Ccnp3 lab 3_4_en
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame RelayCCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 4 Frame Relay
 
Cisco router basic
Cisco router basicCisco router basic
Cisco router basic
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
Cisco router command configuration overview
Cisco router command configuration overviewCisco router command configuration overview
Cisco router command configuration overview
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
Network Slides
Network SlidesNetwork Slides
Network Slides
 

Viewers also liked

Network & Internet Working Devices
Network & Internet Working DevicesNetwork & Internet Working Devices
DITEC - Software Engineering
DITEC - Software EngineeringDITEC - Software Engineering
DITEC - Software Engineering
Rasan Samarasinghe
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in Networking
Rasan Samarasinghe
 
Hub presentation - ppt
Hub presentation - pptHub presentation - ppt
Hub presentation - ppt
pancentric_developers
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
Manas Rai
 
Network interface card(nic)
Network interface card(nic)Network interface card(nic)
Network interface card(nic)
Anurag Tomar
 
NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™UzumakiMugiwara
 
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
Kak Yong
 
Network interface card
Network interface cardNetwork interface card
Network interface card
nidhitanna18
 
Communication devices
Communication devicesCommunication devices
Communication deviceshar139
 
Modem technology
Modem technologyModem technology
Modem technology
Dhruv Patel
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devicesHarman Grewal
 
Presentation on modem
Presentation on modemPresentation on modem
Presentation on modem
Dnyanesh Patil
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
Julia .
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
Akmal Cikmat
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

Viewers also liked (20)

Network & Internet Working Devices
Network & Internet Working DevicesNetwork & Internet Working Devices
Network & Internet Working Devices
 
DITEC - Software Engineering
DITEC - Software EngineeringDITEC - Software Engineering
DITEC - Software Engineering
 
Network devices
Network devicesNetwork devices
Network devices
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in Networking
 
Hub presentation - ppt
Hub presentation - pptHub presentation - ppt
Hub presentation - ppt
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
 
Network interface card(nic)
Network interface card(nic)Network interface card(nic)
Network interface card(nic)
 
NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™NETWORK INTERFACE CARD™
NETWORK INTERFACE CARD™
 
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
COMMUNICATION DEVICES: HARDWARE REQUIREMENTS AND FUNCTIONS OF COMMUNICATION D...
 
Network interface card
Network interface cardNetwork interface card
Network interface card
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Modem technology
Modem technologyModem technology
Modem technology
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
 
Presentation on modem
Presentation on modemPresentation on modem
Presentation on modem
 
Modem presentation
Modem presentationModem presentation
Modem presentation
 
Modem
ModemModem
Modem
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similar to NIC AND HUB CONNECTING DEVICES

nic.pptx
nic.pptxnic.pptx
nic.pptx
ThangamaniR3
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardwareisma ishak
 
Networking
NetworkingNetworking
Networking
Abbas Ali Qureshi
 
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
tendaisigauke3
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
Programmer
 
Msit computer networks 2
Msit computer networks 2Msit computer networks 2
Msit computer networks 2
Sridhar Baithi
 
Lan basic
Lan basicLan basic
Lan basic
Online
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
Aneesh Nelavelly
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
rajasekarsankar
 
Basic networking
Basic networkingBasic networking
IEEE standard
IEEE standardIEEE standard
networking.ppt
networking.pptnetworking.ppt
networking.ppt
suchita74
 
Network use and configuration
Network use and configurationNetwork use and configuration
Network use and configuration
Mark John Lado, MIT
 
04 introduction to computer networking
04 introduction to computer networking04 introduction to computer networking
04 introduction to computer networkingtjunicornfx
 
LAN Demo
LAN DemoLAN Demo
LAN Demo
alcsoft
 
Networking basics
Networking basicsNetworking basics
Networking basics
Vadiraj Jahagirdar
 

Similar to NIC AND HUB CONNECTING DEVICES (20)

nic.pptx
nic.pptxnic.pptx
nic.pptx
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
 
Networking
NetworkingNetworking
Networking
 
Networking
NetworkingNetworking
Networking
 
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
14929 UNIT STANDARD DESCRIBE COMPUTER CABLING.pptx
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
 
Msit computer networks 2
Msit computer networks 2Msit computer networks 2
Msit computer networks 2
 
Lan basic
Lan basicLan basic
Lan basic
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Basic networking
Basic networkingBasic networking
Basic networking
 
IEEE standard
IEEE standardIEEE standard
IEEE standard
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
compo 131_banalnal
compo 131_banalnalcompo 131_banalnal
compo 131_banalnal
 
Network use and configuration
Network use and configurationNetwork use and configuration
Network use and configuration
 
04 introduction to computer networking
04 introduction to computer networking04 introduction to computer networking
04 introduction to computer networking
 
LAN Demo
LAN DemoLAN Demo
LAN Demo
 
Networking basics
Networking basicsNetworking basics
Networking basics
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

NIC AND HUB CONNECTING DEVICES

  • 2. NIC Intro.. • A network interface card, more commonly referred to as a NIC, connects a system to a network. It is a card with a connector port. • In computer networking, a NIC provides the hardware interface between a computer and a network.
  • 3. • Also known as Ethernet card or Network adapter. • Network interface cards provide a dedicated, full-time connection to a network. • It allows your computer to "talk" to the network and the network to communicate with your computer.
  • 4. Network cards are typically available in 10/100/1000 Mbit/s varieties.This means they can support maximum transfer rate of 10, 100/1000 Megabits per second.
  • 5. This old ‘combo’ NIC accepts both BNC (coaxial) and RJ45 (UTP) connectors. BNC- (Bayonet Neill–Concelman) connector
  • 6. Need of NIC • Most computer networks transfer data across a medium at a fixed rate, often faster than the speed at which computers can process individual bits. • To accommodate the mismatch in speed, each computer attached to a network contain special purpose hardware known as a network interface card (NIC).
  • 7. • The NIC functions like an I/O device: it is built for a specific network technology. • It handles the details of frame transmission or reception without requiring the CPU to process each bit.
  • 8. ETHERNET AND WIFI NICs • Some NIC cards work with wired connections while others are wireless. • Most NICs support either wired Ethernet or WiFi wireless standards. • Ethernet NICs plug into the system bus of the PC and include jacks for network cables. • while WiFi NICs contain built-in transmitters / receivers (transceivers).
  • 9. Installation of NICs • The most common language or protocol for LANs is Ethernet, sometimes referred to as IEEE 802.3. • A lesser-used protocol is Token Ring. • When building a LAN, a network interface card must be installed in each computer on the network and all NICs in the network must be of the same architecture. • For example, all must either be Ethernet cards, Token Ring cards, or an alternate technology.
  • 10. Cont.. • An Ethernet network interface card is installed in an available slot inside the computer. • Most newer computers have a network interface built into the motherboard. • A separate network card is not required unless multiple interfaces are needed or some other type of network is used. • Newer motherboards may even have dual network (Ethernet) interfaces built-in.
  • 11. Working • A computer or device on a network can be reached by its MAC (media access control) address through the NIC card. • Every Ethernet network card has a unique 48-bit serial number called a MAC address, which is stored in ROM carried on the card.
  • 12. Port In NICs • The back plate of the network interface card features a port that looks similar to a phone jack, but is slightly larger. • A network card typically has a twisted pair, BNC, or AUI socket where the network cable is connected, and a few LEDs to inform the user of whether the network is active, and whether or not there is data being transmitted on it.
  • 13. • That port accommodates an Ethernet cable, which resembles a thicker version of a standard telephone line. UTP (Unshielded Twisted Pair) e.g. CAT6 (‘Category 6’)
  • 14. Wireless Ethernet cards • Wireless Ethernet cards are installed like their wired counterparts, but rather than a port for an Ethernet cable, the card features a small antenna. • The card communicates with the central wireless switch or hub via radio waves. • Wireless LANs may have some restrictions depending on the material the building is made from. • For example, lead in walls can block signals between the network interface card and hub or switch.
  • 16. HUB
  • 18.
  • 19. • Acts on the physical layer • Operate on bits rather than frames • Used to connect stations adapters in a physical star topology but logically bus • Connection to the hub consists of two pairs of twisted pair wire one for transmission and the other for receiving. • Hub receives a bit from an adapter and sends it to all the other adapters without implementing any access method. • does not do filtering (forward a frame into a specific destination or drop it) just it copy the received frame onto all other links
  • 20.
  • 21. • The entire hub forms a single collision domain, and a single Broadcast domain – Collision domain: is that part of the network (set of NICs) when two or more nodes transmit at the same time collision will happen. – Broadcast domain: is that part of the network (set of NIC) where each NIC can 'see' other NICs' traffic broadcast messages. • Multiple Hubs can be used to extend the network length • For 10BaseT and 100BaseT the maximum length of the connection between an adapter and the hub is 100 meters  the maximum length between any two nodes is 200 m = maximum network length
  • 22. Types of HUBS • Passive Hubs • Active Hubs • Intelligent Hubs (Switches)
  • 23. Passive HUB • It functions only as a connection point for the signals . • The signal pass through a passive hub without regeneration or amplification.
  • 24. Active HUB • It regenerates or amplifies the signal before they are retransmitted. • Also called Multiport repeaters • Drawback: – The noise is also regenerated
  • 25. Intelligent Hubs (Switches) • Add extra features to an active hub that a • An intelligent hub, one can easily identify, diagnose problems and even come up with remedial solutions. This troubleshooting of a large enterprise scale network is possible with the help of an intelligent hub. re particular importance to business.