SlideShare a Scribd company logo
Computer Architecture: 
Core Hardware 
Chapter 11 
Networking 
Eric Vanderburg 
Eric Vanderburg – Core Hardware © 2005
Eric Vanderburg – Core Hardware © 2005 
OSI Model 
• Application 
• Presentation 
• Session 
• Transport 
• Network 
• Datalink 
• Physical
Eric Vanderburg – Core Hardware © 2005 
Topologies 
• Bus 
• Ring 
• Star 
• Mesh
Eric Vanderburg – Core Hardware © 2005 
Devices 
• Repeater 
• Hub 
• Bridge 
• Switch 
• Router 
• Gateway 
• Cables
Architectures 
• Ethernet 
• Token Ring 
• FDDI 
• WiFi 
Eric Vanderburg – Core Hardware © 2005
Eric Vanderburg – Core Hardware © 2005 
Protocols 
• TCP/IP 
• IPX/SPX 
• AppleTalk 
• NetBEUI
Eric Vanderburg – Core Hardware © 2005 
Protocols 
• TCP/IP 
• IPX/SPX 
• AppleTalk 
• NetBEUI

More Related Content

What's hot

Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)
hypervnu
 
Moving to Cloud for Good: Alexander Tsirel, HiveTec
Moving to Cloud for Good: Alexander Tsirel, HiveTecMoving to Cloud for Good: Alexander Tsirel, HiveTec
Moving to Cloud for Good: Alexander Tsirel, HiveTec
OpenStack
 
The Path to 100+ IXes
The Path to 100+ IXesThe Path to 100+ IXes
The Path to 100+ IXes
APNIC
 
KubeCon EU 2019 Review
KubeCon EU 2019 ReviewKubeCon EU 2019 Review
KubeCon EU 2019 Review
GarrethDavies
 
SIGFOX basics for Intel IoT Roadshow
SIGFOX basics for Intel IoT RoadshowSIGFOX basics for Intel IoT Roadshow
SIGFOX basics for Intel IoT Roadshow
Nicolas Lesconnec
 
Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]
Nicolas Lesconnec
 
ZipLink-E Data Sheet
ZipLink-E Data SheetZipLink-E Data Sheet
ZipLink-E Data Sheet
Scott Shelton
 
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
Romeo Kienzler
 

What's hot (8)

Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)Keynote 2011 (wesselius noorderijk)
Keynote 2011 (wesselius noorderijk)
 
Moving to Cloud for Good: Alexander Tsirel, HiveTec
Moving to Cloud for Good: Alexander Tsirel, HiveTecMoving to Cloud for Good: Alexander Tsirel, HiveTec
Moving to Cloud for Good: Alexander Tsirel, HiveTec
 
The Path to 100+ IXes
The Path to 100+ IXesThe Path to 100+ IXes
The Path to 100+ IXes
 
KubeCon EU 2019 Review
KubeCon EU 2019 ReviewKubeCon EU 2019 Review
KubeCon EU 2019 Review
 
SIGFOX basics for Intel IoT Roadshow
SIGFOX basics for Intel IoT RoadshowSIGFOX basics for Intel IoT Roadshow
SIGFOX basics for Intel IoT Roadshow
 
Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]Pick your connectivity solution [web2day 2015]
Pick your connectivity solution [web2day 2015]
 
ZipLink-E Data Sheet
ZipLink-E Data SheetZipLink-E Data Sheet
ZipLink-E Data Sheet
 
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
Cloud scale predictive DevOps automation using Apache Spark: Velocity in Amst...
 

Viewers also liked

Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Eric Vanderburg
 
Power point lesson 02
Power point lesson 02Power point lesson 02
Power point lesson 02
heidirobison
 
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgComputer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Eric Vanderburg
 
1.4 network
1.4 network1.4 network
1.4 network
Frya Lora
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Eric Vanderburg
 
Upgrading the Computer Component
Upgrading the Computer ComponentUpgrading the Computer Component
Upgrading the Computer Component
Perla Pelicano Corpez
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnar
Perla Pelicano Corpez
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
Frya Lora
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
Alvin Francisco
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
paragatol258
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Eric Vanderburg
 
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Harold Wong
 
Handtools
HandtoolsHandtools
Handtools
Frya Lora
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
Nicola Cerami
 

Viewers also liked (20)

Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric VanderburgComputer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8B - Display - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric VanderburgComputer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
Computer Architecture - Hardware - Lesson 8A - I/O Devices - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric VanderburgComputer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
Computer Architecture - Hardware - Lesson 6 - Floppy Drive - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
Computer Architecture - Hardware - Lesson 4 - Motherboard - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric VanderburgComputer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
Computer Architecture - Hardware - Lesson 12 - Portables - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
Computer Architecture - Hardware - Lesson 3 - Electricity - Eric Vanderburg
 
Power point lesson 02
Power point lesson 02Power point lesson 02
Power point lesson 02
 
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric VanderburgComputer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
Computer Architecture - Hardware - Lesson 13 - Printers - Eric Vanderburg
 
1.4 network
1.4 network1.4 network
1.4 network
 
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric VanderburgComputer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
Computer Architecture - Hardware - Lesson 10 - Modems - Eric Vanderburg
 
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric VanderburgComputer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
Computer Architecture - Hardware - Lesson 5 - Memory - Eric Vanderburg
 
Upgrading the Computer Component
Upgrading the Computer ComponentUpgrading the Computer Component
Upgrading the Computer Component
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnar
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
 
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning MaterialK-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
K-12 Grade 9 - Computer Hardware Servicing ICT Learning Material
 
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
Computer Architecture - Hardware - Lesson 9 - Multimedia and Mass Storage - E...
 
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
Upgrading from Windows Server 2008 / 2008 R2 to Windows Server 2012
 
Handtools
HandtoolsHandtools
Handtools
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 

More from Eric Vanderburg

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Recently uploaded

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 

Recently uploaded (20)

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 

Computer Architecture - Hardware - Lesson 11 - Networking - Eric Vanderburg

  • 1. Computer Architecture: Core Hardware Chapter 11 Networking Eric Vanderburg Eric Vanderburg – Core Hardware © 2005
  • 2. Eric Vanderburg – Core Hardware © 2005 OSI Model • Application • Presentation • Session • Transport • Network • Datalink • Physical
  • 3. Eric Vanderburg – Core Hardware © 2005 Topologies • Bus • Ring • Star • Mesh
  • 4. Eric Vanderburg – Core Hardware © 2005 Devices • Repeater • Hub • Bridge • Switch • Router • Gateway • Cables
  • 5. Architectures • Ethernet • Token Ring • FDDI • WiFi Eric Vanderburg – Core Hardware © 2005
  • 6. Eric Vanderburg – Core Hardware © 2005 Protocols • TCP/IP • IPX/SPX • AppleTalk • NetBEUI
  • 7. Eric Vanderburg – Core Hardware © 2005 Protocols • TCP/IP • IPX/SPX • AppleTalk • NetBEUI