SlideShare a Scribd company logo
Network devices I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Hubs, bridges, and switches.
– Modems.
– Routers.
Page 4
Network devices I.
Page 5
The Open System
Interconnect (OSI) model
was developed as a way to
help disparate computing
systems communicate with
each other.
It is composed of seven layers that work together in
order for communication to occur. Network devices tend
to fall within the first three of those layers. Layer 1—the
Physical Layer—deals with how bits are converted to
the appropriate signal and placed on the network. Layer
2—the Data Link Layer—is concerned more concerned
with making sure the appropriate host is reached on the
network. Finally, Layer 3—the Network Layer—is all
about making sure the right network is reached.
Network devices I.
Page 6
Network devices I.
– The hub.
» Operates at Layer 1 of the OSI model.
• It is only concerned with physically placing the signal on the
network.
» All devices that connect to hubs are in the same collision domain
and broadcast domain.
• Collision domains are areas where network traffic can collide and
cause problems.
• Broadcast domains are network segments where broadcast
traffic is heard by all of the devices on the network.
» A hub functions as a concentrator/repeater in that it doesn’t care
where the signal comes from or where it is going.
» A hub only operates in half-duplex.
• It can be sending or receiving, but not both at the same time.
» All of the network’s bandwidth is shared by all of the devices
connected to the network.
• This sharing of the bandwidth effectively reduces the amount of
bandwidth that is available to devices.
• As the size of the network increases, the performance of the
network will be reduced.
Page 7
Network devices I.
– The bridge.
» Operates at Layer 2 of the OSI model.
» Bridges connect different LAN segments together (by creating a
bridge between them) and break up collision domains.
• They can also bridge different types of network media and
different types of network transmissions (e.g., Ethernet to
token ring and/or wireless to Ethernet).
» They have a limited amount of ports.
– The wireless access point (WAP).
» Operates at Layer 2 of the OSI model.
• A specific type of network bridge that bridges wireless
network segments with wired network segments.
» Operates in half-duplex mode by using a method called carrier
sense multiple access with collision avoidance (CSMA/CA).
• With CSMA/CA, devices will listen to the line. If there is no
traffic on the line, the device is free to transmit. If there is
traffic on the line, the device waits a random period of time
and then listens in on the line again.
• While WAPs do not break up collision domains, collisions are
avoided by the use of CSMA/CA.
Page 8
Network devices I.
– The switch.
» Operates at Layer 2 of the OSI model.
» It is similar to a hub, but it is also much smarter than a hub.
• It utilizes an application-specific integrated circuit (ASIC) chip.
• The ASIC has specific programing that allows the switch to
learn what devices are on the network and which ports they
are connected to on the switch.
» Because they know which devices are on the segment and
where they are located, they can operate in full-duplex.
• Full-duplex is when a device can send and receive signals at
the same time.
• With full-duplex, all of the devices receive all of the possible
network bandwidth all of the time. They do not share the
bandwidth as in the case of a hub.
» Switches break up collisions domains. Each port on a switch is
its own collision domain.
» Switches do not break up broadcast domains. All devices
connected to a switch will receive network broadcasts.
Page 9
Network devices I.
Page 10
Network devices I.
– The modem.
» Operates at Layer 1 of the OSI model.
» The term “modem” is actually short for modulator/demodulator.
• It was originally developed to take the digital signal coming
from a node and convert it to an analog signal (modulating the
signal) to be placed on the wire. In return, it would accept an
analog signal from the wire and convert it (demodulating the
signal) to a digital signal that the node could understand.
» They were originally developed to create connections between
network segments via the public switched telephone network
(PSTN) using the plain old telephone system (POTS).
» Cable modems can be used to connect network segments to
the Internet by translating the network signal into a format that
can be handled by the cable network.
» A modem is not a router.
Page 11
Network devices I.
Page 12
Network devices I.
– The router.
» Operates at Layer 3 of the OSI model.
» It is responsible for connecting different networks together.
• It uses special programing to keep track of different networks
and the best possible paths to reach those networks.
» It is not concerned with what hosts are connected to networks.
» They are found at the edges of the network.
» They can connect different types of media together (e.g.,
Ethernet to serial and/or Ethernet to fiber optic).
» Routers break up collision domains.
» Routers break up broadcast domains. Because network
broadcasts are for a specific single network, they cannot pass
through a router interface.
• When a router receives a network broadcast, it just drops the
broadcast (it ignores the broadcast).
Page 13
Network devices I.
Hubs work at Layer 1 of the OSI model and function as a
concentrator/repeater. Every packet the hub receives is propagated out all
of its ports. Bridges work at Layer 2 of the OSI model. They are used to
connect network segments together. They can also be used to change
network media. A WAP is a specific type of bridge used to bridge wireless
and wired networks. Switches work at Layer 2 of the OSI model. The ASIC
allows them to know where and what devices are connected to them. The
bridge and the switch break up collision domains.
Topic
Hubs, bridges, and switches.
Summary
“Modem” stands for modulator/demodulator. Modems operate at Layer 1 of
the OSI model. Originally, they translated a digital network signal into an
analog signal that the PSTN could handle and reversed the process when
required. Cable modems translate the network signal into a format that the
cable network can handle.
Modems.
Routers work at Layer 3 of the OSI model. They are used to connect
networks together. They do not care what hosts are connected to a
network—just where that network is located and how to get to it. Routers
break up both collision domains and broadcast domains.
Routers.
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
Bry Cunal
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
Clinton Dsouza
 
Networking devices
Networking devicesNetworking devices
Networking devices
Tayyab Hussain
 
Introduction to network switches
Introduction to network switchesIntroduction to network switches
Introduction to network switches
NetProtocol Xpert
 
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
Netwax Lab
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab File
Nitin Bhasin
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Rozitarmizi Mohammad
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
Pace IT at Edmonds Community College
 
Switch
SwitchSwitch
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
kieshore
 
Basic-networking-hardware
Basic-networking-hardwareBasic-networking-hardware
Basic-networking-hardwareIsus Isusay
 
Switching
Switching Switching
Switching
Abid Ali
 
Network devices
Network devicesNetwork devices
Network devices
Dhani Ahmad
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Nayan Dagliya
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
Siddique Ibrahim
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
Alan Mark
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
Chathurangi Shyalika
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
vasanthimuniasamy
 

What's hot (20)

Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Network switch
Network switchNetwork switch
Network switch
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Introduction to network switches
Introduction to network switchesIntroduction to network switches
Introduction to network switches
 
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
 
Computer Networking Lab File
Computer Networking Lab FileComputer Networking Lab File
Computer Networking Lab File
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
 
Switch
SwitchSwitch
Switch
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Basic-networking-hardware
Basic-networking-hardwareBasic-networking-hardware
Basic-networking-hardware
 
Switching
Switching Switching
Switching
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 

Similar to Pace IT - Network Devices (part 1)

presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
bantisworld
 
Data Communication Class Note
Data Communication Class NoteData Communication Class Note
Data Communication Class Note
Abul Kalam Robin
 
Computer network notes with company specific questions
Computer network notes with company specific questionsComputer network notes with company specific questions
Computer network notes with company specific questions
TaleManju
 
Networking devices
Networking  devices Networking  devices
Networking devices
Aswini Badatya
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenĐô GiẢn
 
Networks
Networks   Networks
Networks
pavishkumarsingh
 
Lan internetworking devices
Lan internetworking devicesLan internetworking devices
Lan internetworking devices
QAU ISLAMABAD,PAKISTAN
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in BusinessNethan P
 
PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)
Pace IT at Edmonds Community College
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
MosesOkumu4
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
BSITstudents
 
Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.ppt
MrAdhit1
 
Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.ppt
Rashmin Tanna
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtap
Vikas Jagtap
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
paolo374233
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
Jyoti Akhter
 
Networking
NetworkingNetworking
Networking
Soumit Ghosh
 
19 24 cn practicals
19 24 cn practicals19 24 cn practicals
19 24 cn practicals
MakavanaVeer
 

Similar to Pace IT - Network Devices (part 1) (20)

presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Data Communication Class Note
Data Communication Class NoteData Communication Class Note
Data Communication Class Note
 
Computer network notes with company specific questions
Computer network notes with company specific questionsComputer network notes with company specific questions
Computer network notes with company specific questions
 
Networking devices
Networking  devices Networking  devices
Networking devices
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chen
 
Networks
Networks   Networks
Networks
 
Lan internetworking devices
Lan internetworking devicesLan internetworking devices
Lan internetworking devices
 
What is networking
What is networkingWhat is networking
What is networking
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in Business
 
PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.ppt
 
Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.ppt
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtap
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Networking
NetworkingNetworking
Networking
 
19 24 cn practicals
19 24 cn practicals19 24 cn practicals
19 24 cn practicals
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Pace IT - Network Devices (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Hubs, bridges, and switches. – Modems. – Routers.
  • 5. Page 5 The Open System Interconnect (OSI) model was developed as a way to help disparate computing systems communicate with each other. It is composed of seven layers that work together in order for communication to occur. Network devices tend to fall within the first three of those layers. Layer 1—the Physical Layer—deals with how bits are converted to the appropriate signal and placed on the network. Layer 2—the Data Link Layer—is concerned more concerned with making sure the appropriate host is reached on the network. Finally, Layer 3—the Network Layer—is all about making sure the right network is reached. Network devices I.
  • 6. Page 6 Network devices I. – The hub. » Operates at Layer 1 of the OSI model. • It is only concerned with physically placing the signal on the network. » All devices that connect to hubs are in the same collision domain and broadcast domain. • Collision domains are areas where network traffic can collide and cause problems. • Broadcast domains are network segments where broadcast traffic is heard by all of the devices on the network. » A hub functions as a concentrator/repeater in that it doesn’t care where the signal comes from or where it is going. » A hub only operates in half-duplex. • It can be sending or receiving, but not both at the same time. » All of the network’s bandwidth is shared by all of the devices connected to the network. • This sharing of the bandwidth effectively reduces the amount of bandwidth that is available to devices. • As the size of the network increases, the performance of the network will be reduced.
  • 7. Page 7 Network devices I. – The bridge. » Operates at Layer 2 of the OSI model. » Bridges connect different LAN segments together (by creating a bridge between them) and break up collision domains. • They can also bridge different types of network media and different types of network transmissions (e.g., Ethernet to token ring and/or wireless to Ethernet). » They have a limited amount of ports. – The wireless access point (WAP). » Operates at Layer 2 of the OSI model. • A specific type of network bridge that bridges wireless network segments with wired network segments. » Operates in half-duplex mode by using a method called carrier sense multiple access with collision avoidance (CSMA/CA). • With CSMA/CA, devices will listen to the line. If there is no traffic on the line, the device is free to transmit. If there is traffic on the line, the device waits a random period of time and then listens in on the line again. • While WAPs do not break up collision domains, collisions are avoided by the use of CSMA/CA.
  • 8. Page 8 Network devices I. – The switch. » Operates at Layer 2 of the OSI model. » It is similar to a hub, but it is also much smarter than a hub. • It utilizes an application-specific integrated circuit (ASIC) chip. • The ASIC has specific programing that allows the switch to learn what devices are on the network and which ports they are connected to on the switch. » Because they know which devices are on the segment and where they are located, they can operate in full-duplex. • Full-duplex is when a device can send and receive signals at the same time. • With full-duplex, all of the devices receive all of the possible network bandwidth all of the time. They do not share the bandwidth as in the case of a hub. » Switches break up collisions domains. Each port on a switch is its own collision domain. » Switches do not break up broadcast domains. All devices connected to a switch will receive network broadcasts.
  • 10. Page 10 Network devices I. – The modem. » Operates at Layer 1 of the OSI model. » The term “modem” is actually short for modulator/demodulator. • It was originally developed to take the digital signal coming from a node and convert it to an analog signal (modulating the signal) to be placed on the wire. In return, it would accept an analog signal from the wire and convert it (demodulating the signal) to a digital signal that the node could understand. » They were originally developed to create connections between network segments via the public switched telephone network (PSTN) using the plain old telephone system (POTS). » Cable modems can be used to connect network segments to the Internet by translating the network signal into a format that can be handled by the cable network. » A modem is not a router.
  • 12. Page 12 Network devices I. – The router. » Operates at Layer 3 of the OSI model. » It is responsible for connecting different networks together. • It uses special programing to keep track of different networks and the best possible paths to reach those networks. » It is not concerned with what hosts are connected to networks. » They are found at the edges of the network. » They can connect different types of media together (e.g., Ethernet to serial and/or Ethernet to fiber optic). » Routers break up collision domains. » Routers break up broadcast domains. Because network broadcasts are for a specific single network, they cannot pass through a router interface. • When a router receives a network broadcast, it just drops the broadcast (it ignores the broadcast).
  • 13. Page 13 Network devices I. Hubs work at Layer 1 of the OSI model and function as a concentrator/repeater. Every packet the hub receives is propagated out all of its ports. Bridges work at Layer 2 of the OSI model. They are used to connect network segments together. They can also be used to change network media. A WAP is a specific type of bridge used to bridge wireless and wired networks. Switches work at Layer 2 of the OSI model. The ASIC allows them to know where and what devices are connected to them. The bridge and the switch break up collision domains. Topic Hubs, bridges, and switches. Summary “Modem” stands for modulator/demodulator. Modems operate at Layer 1 of the OSI model. Originally, they translated a digital network signal into an analog signal that the PSTN could handle and reversed the process when required. Cable modems translate the network signal into a format that the cable network can handle. Modems. Routers work at Layer 3 of the OSI model. They are used to connect networks together. They do not care what hosts are connected to a network—just where that network is located and how to get to it. Routers break up both collision domains and broadcast domains. Routers.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.