This document discusses different networking devices and concepts for connecting devices in a local area network (LAN). It describes bridges, switches, routers, hubs, and repeaters. Bridges segment networks at layer 2, switches create virtual circuits to maximize bandwidth, and routers route traffic between layer 3 networks. The document also covers half and full duplex transmissions, collision domains, broadcast domains, and how devices such as hubs, switches, and routers handle sending and receiving Ethernet frames. It discusses using VLANs to create separate broadcast domains within a switch and needing routers to pass traffic between VLANs.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
The Network Layer is concerned about getting packets from source to destination, no matter how many hops it may take. It’s all about routing.
5.1 Network Layer Design Issues
What do we need to think about in this layer?
5.2 Routing Algorithms
Strategies for getting from source to destination.
5.3 Congestion Control Algorithms
How do we keep from bottlenecking from too many packets?
5.4 Internetworking
Working with multiple networks and protocols in order to deliver packets.
5.5 The Network Layer in the Internet
Gluing together a collection of subnets.
Information Technology
Rrjeta Kompjuterike. Computer Networks.
Vetëm për qëllime edukative. For Educational Purposes Only.
NOTE: Some text does not display correctly (behind image) because SlideShare deformed it during upload.
Disa nga tekstet nuk duket mire apo duken mas fotove ketu ka faj SlideShare.
Switching characteristics of power electronic devicesSunny Purani
the characteristics of power electronic devices in one touch.
only image files are there & the detailed explanations of these are given in different slide shares.
This presentation is about the introduction to network switch layer technology. A network switch is a device tha is used to connect different segments over the network.This ppt includes introduction to switch,types of switches or layer specification,advantages and disadvantages of switch..
I hope it will be very helpful for the engineering students and the others who are interested to search in deep about network switch.
difference between hub, bridge, switch and routerAkmal Cikmat
An additional information that might be useful for Computing/Computer Science students especially.
made this as a homework assigned to me.
Hope this may be the thing that you've been looking for
The Future of Marketing 2016: New Roles, and Trends Mathew Sweezey
2016 is almost here, and with it will come a host of new marketing challenges. To help prepare you I've crafted this presentation with
- New Data from Google on Marketing Moments
- New ideas on breaking though the noise
- New roles for the CMO and Demand Gen Teams
- New metrics for showing holistic marketing value
The presentation is created to inspire you, and help you see new ways to market in 2016. Please feel free to share this content, and reach out to me with any questions you may have. Best, Mat
Introduction, Virtual and Datagram networks, study of router, IP protocol and addressing in the Internet, Routing algorithms, Broadcast and Multicast routing
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
4. BRIDGES
• A bridge is a Layer 2 device used to divide, or segment, a network.
• A bridge is capable of collecting and selectively passing data frames
between two network segments.
• Bridges do this by learning the MAC address of all devices on each
connected segment. Using this information, the bridge builds a
bridging table and forwards or blocks traffic based on that table.
• This results in smaller collision domains and greater network
efficiency.
• Bridges do NOT restrict broadcast traffic.
6. SWITCHES
• Switches create a virtual circuit between two connected devices,
establishing a dedicated communication path between two devices.
• Switches on the network provide micro segmentation.
• This allows maximum utilization of the available bandwidth.
• A switch is also able to facilitate multiple, simultaneous virtual circuit
connections.
• Broadcast frames to all connected devices on the network.
8. ROUTER
• A router is a Layer 3 device.
• Used to “route” traffic between two or more Layer 3 networks.
• Routers make decisions based on groups of network addresses, or
classes, as opposed to individual Layer 2 MAC addresses.
• Routers use routing tables to record the Layer 3 addresses of the
networks that are directly connected to the local interfaces and
network paths learned from neighboring routers.
• Routers are not compelled to forward broadcasts.
9. HALF-DUPLEX
• Using half-duplex, a host could either transmit or receive at one time,
but not both.
• If the network is already in use, the transmission is delayed.
• When a collision occurs, the host that first detects the collision will
send out a jam signal to the other hosts.
• Upon receiving the jam signal, each host will stop sending data, then
wait for a random period of time before attempting to retransmit.
• The back-off algorithm generates this random delay.
• As more hosts are added to the network and begin transmitting,
collisions are more likely to occur.
10. DUPLEX TRANSMISSIONS
• Simplex Transmission: One way and one way only.
• One way street
• Half-duplex Transmission: Either way, but only one way at a time.
• Two way street, but only one way at a time (land slide).
• Full-duplex Transmission: Both ways at the same time.
• Two way street
11. SENDING AND RECEIVING ETHERNET
FRAMES VIA A HUB
• The hub will flood it out all ports except for the incoming port.
• Hub is a layer 1 device.
• A hub does NOT look at layer 2 addresses, so it is fast in transmitting
data.
• Disadvantage with hubs: A hub or series of hubs is a single collision
domain.
• A collision will occur if any two or more devices transmit at the same
time within the collision domain.
12. SENDING AND RECEIVING ETHERNET
FRAMES ON A BUS
• When an Ethernet frame is sent out on the “bus” all devices on the
bus receive it.
• Each NIC card compares its own MAC address with the Destination MAC
Address.
• If it matches, it copies in the rest of the frame.
• If it does NOT match, it ignores the rest of the frame.
• Unless you are running a Sniffer program
14. ETHERNET/802.3 LAN DEVELOPMENT
• Distance limitations
• Ethernet is fundamentally a shared technology where all users on a given
LAN segment compete for the same available bandwidth.
• This situation is analogous to a number of cars all trying to access a one-
lane road at the same time.
• Because the road has only one lane, only one car can access it at a time.
• The introduction of hubs into a network resulted in more users competing for
the same bandwidth.
• Collisions are a by-product of Ethernet networks.
15. ELEMENTS OF ETHERNET 802.3 NETWORKS
• Broadcast data frame delivery of Ethernet/802.3
• The carrier sense multiple access/collision detect (CSMA/CD) method
allows only one station to transmit at a time.
• Multimedia applications with higher bandwidth demand such as video
and the Internet, coupled with the broadcast nature of Ethernet, can
create network congestion.
• Normal latency as the frames travel across the layers
• Extending the distances and increasing latency of the Ethernet/802.3
LANs by using Layer 1 repeaters.
16. NETWORK LATENCY
• Latency, or delay, is the time a frame or a packet takes to travel
from the source station to the final destination.
• It is important to quantify the total latency of the path between the
source and the destination for LANs and WANs.
• Latency has at least three sources:
• First, there is the time it takes the source NIC to place voltage
pulses on the wire and the time it takes the receiving NIC to
interpret these pulses. This is sometimes called NIC delay.
• Second, there is the actual propagation delay as the signal
takes time to travel along the cable.
• Third, latency is added according to which networking
devices, whether they are Layer 1, Layer 2, or Layer 3, are
added to the path between the two communicating computers.
17. SENDING AND RECEIVING ETHERNET
FRAMES VIA A SWITCH
• Switches are also known as learning bridges or learning switches.
• A switch has a source address table in cache (RAM) where it stores
source MAC address after it learns about them.
• A switch receives an Ethernet frame it searches the source address
table for the Destination MAC address.
• If it finds a match, it filters the frame by only sending it out that port.
• If there is not a match if floods it out all ports.
18. COLLISION DOMAINS
• When there is only one device on a switch port, the collision domain is only between
the PC and the switch.
• With a full-duplex PC and switch port, there will be no collision, since the devices
and the medium can send and receive at the same time.
20. LAN SEGMENTATION WITH ROUTERS
• Routers provide segmentation of networks, adding a latency factor of
20% to 30% over a switched network.
• This increased latency is because a router operates at the network
layer and uses the IP address to determine the best path to the
destination node.
• Bridges and switches provide segmentation within a single network or
subnetwork.
• Routers provide connectivity between networks and
subnetworks.
• Routers also do not forward broadcasts while switches and
bridges must forward broadcast frames.
25. ETHERNET SWITCH LATENCY
• Latency is the period of time from when the beginning of a frame
enters to when the end of the frame exits the switch.
• Latency is directly related to the configured switching process and
volume of traffic.
26. MEMORY BUFFERING
• An Ethernet switch may use a buffering technique to store and forward
frames.
• Buffering may also be used when the destination port is busy.
• The area of memory where the switch stores the data is called the
memory buffer.
• This memory buffer can use two methods for forwarding frame:
• port-based memory buffering
• shared memory buffering
• In port-based memory buffering frames are stored in queues that are
linked to specific incoming ports.
• Shared memory buffering deposits all frames into a common memory
buffer which all the ports on the switch share.
27. SWITCHING METHODS
1. Store-and-forward – The entire frame is received before any
forwarding takes place.
• The destination and source addresses are read and filters
are applied before the frame is forwarded.
• CRC Check done
2. Cut-through – The frame is forwarded through the switch
before the entire frame is received.
• This mode decreases the latency of the transmission, but
also reduces error detection.
• In1900 and 2800 series switches, this is configurable,
otherwise depends on the model of the switch.
28. CUT-THROUGH
• Fast-forward – Offers the lowest level of latency.
• Fast-forward switching immediately forwards a packet after reading
the destination address.
• There may be times when packets are relayed with errors.
• Although this occurs infrequently and the destination network adapter
will discard the faulty packet upon receipt.
• Fragment-free – Fragment-free switching filters out collision fragments before
• forwarding begins.
• Collision fragments are the majority of packet errors.
• In a properly functioning network, collision fragments must be smaller than 64
bytes.
• Anything greater than 64 bytes is a valid packet and is usually received without
error.
• Fragment-free switching waits until the packet is determined not to be a
collision fragment before forwarding.
29. . Adaptive cut-through
• In this mode, the switch uses cut-through until it detects a given
number of errors.
• Once the error threshold is reached, the switch changes to store-and-
forward mode.
30. USING HUBS
• Layer 1 devices
• Inexpensive
• In one port, out the others
• One collision domain
• One broadcast domain
32. USING SWITCHES
• Layer 2 devices
• Layer 2 filtering based on Destination MAC addresses and Source
Address Table
• One collision domain per port
• One broadcast domain across all switches
33. INTRODUCING VLANS
• VLAN = Subnet
• VLANs create separate broadcast domains within the switch.
• Routers are needed to pass information between different VLANs
34. INTER-VLAN TRAFFIC
Remember that VLAN IDs (numbers) are assigned to the switch port and
not to the host. (Port-centric VLAN switches)
2. Be sure to have all of the hosts on the same subnet belong to the
same VLAN, or you will have problems.
• Hosts on subnet 172.30.1.0/24 - VLAN 1
• Hosts on subnet 172.30.2.0/24 - VLAN 2
35. INTER-VLAN ROUTING NEEDS A ROUTER
• A router is need to route traffic between VLANs (VLAN = Subnet).
• There are various methods of doing this including Router-on-a-stick
with trunking (more than one VLAN on the link).
• This will be discussed later when we get to the chapter on VLANs and
Inter-VLAN Routing.