Administrate Network and Hardware Peripherals
Administrate Network and Hardware Peripherals
1: Receive
1: Transmit
2: Receive
2: Transmit
3: Transmit
3: Receive
4: Not used
4: Not used
5: Not used
5: Not used
6: Transmit
6: Receive
7: Not used
7: Not used
8: Not used
8: Not used
B
A side
side
1: White Orange 1: White Green
2: Orange 2: Green
3: White Green 3: White Orange
4: Blue 4: Blue
5: White Blue 5: White Blue
6: Green 6: Orange
7: White Brown 7: White Brown
8: Brown 8: Brown
•Hubs •CSU/DSU
•Wireless access points
•Switches
(WAPs)
•Bridges •Modems
•Repeaters •Network interface
•Routers cards (NICs)
•Gateways •Transceivers
•Firewalls
Hubs are simple network devices, and their
simplicity is reflected in their low cost.
Small hubs with four or five ports (often referred
to as workgroup hubs) provide everything
needed to create a small network.
Most hubs are referred to as either active or
passive.
Active regenerate a signal before forwarding it to
all the ports on the device and requires a power
supply.
Passive hubs, which today are seen only on older
networks, do not need power and they don't
regenerate the data signal
The basic function of a hub is to take data from one of the
connected devices and forward it to all the other ports on
the hub. The method of sending data to all systems
regardless of the intended recipient is referred to as
broadcasting.
On the surface, a switch looks much like a hub.
Despite their similar appearance, switches are far
more efficient than hubs and are far more desirable
for today's network environments.
As with a hub, computers connect to a switch via a
length of twisted-pair cable. Multiple switches are
often interconnected to create larger networks.
Rather than forwarding data to all the connected
ports, a switch forwards data only to the port on
which the destination system is connected.
It looks at the Media Access Control (MAC)
addresses of the devices connected to it to
determine the correct port. A MAC address is a
unique number that is stamped into every NIC. By
forwarding data only to the system to which the
•Collisions occur on the network when two devices attempt to
transmit at the same time. Such collisions cause the
performance of the network to degrade. By channeling data
only to the connections that should receive it, switches
reduce the number of collisions that occur on the network.
•Switches can also further improve performance over the
performance of hubs by using a mechanism called full-
duplex. On a standard network connection, the
communication between the system and the hub is said to be
half-duplex.
Switching Methods
Cut-through
◦ the switch begins to forward the packet as soon as it is
received.
◦ No error checking is performed on the packet,
◦ so the packet is moved through quickly.
◦ the switch can propagate errors
◦ 30 times faster than store-and-forward switching
Store-and-forward
◦ the switch waits to receive the entire packet before
beginning to forward it.
◦ also performs basic error checking.
Fragment-free
◦ works by reading only the part of the packet that enables
it to identify fragments of a transmission.
On some managed switches, you can select the switching
method you want to use.
Working with Hubs and Switches
Hubs and switches have two types of ports: medium
dependent interface (MDI) or uplink port and medium
dependent interface crossed (MDI-X).
Uplink port allows you to connect two hubs and
switches to create larger networks.
Bridges are networking devices that connect
networks.
Sometimes it is necessary to divide networks into
subnets to reduce the amount of traffic on each
larger subnet or for security reasons.
Once divided, the bridge connects the two subnets
and manages the traffic flow between them. Today,
network switches have largely replaced bridges.
A bridge functions by blocking or forwarding data,
based on the destination MAC address written into
each frame of data.
If the bridge believes the destination address is on
a network other than that from which the data was
received, it can forward the data to the other
networks to which it is connected.
If the address is not on the other side of the bridge, the
data is blocked from passing. Bridges "learn" the MAC
addresses of devices on connected networks by
"listening" to network traffic and recording the network
from which the traffic originates.
The advantages of bridges are simple and significant. By
preventing unnecessary traffic from crossing onto other
network segments, a bridge can dramatically reduce the
amount of network traffic on a segment.
Repeaters are usually used to strengthen signals
going long distances.
A repeater amplifies the signal it receives on one
port before it transmits it on other ports.
Because the repeater does not check on the
contents of the data it receives or retransmits,
frames that are corrupted by noise and other
factors can also be repeated.
The development of the hub replaced the
repeater for all practical purposes, because it
performs the same functions, and can include
additional features.
Routers are network devices that literally route data
around the network.
By examining data as it arrives, the router can
determine the destination address for the data; then,
by using tables of defined routes, the router
determines the best way for the data to continue its
journey.
Unlike bridges and switches, which use the
hardware-configured MAC address to determine the
destination of the data, routers use the software-
configured network address to make decisions.
This approach makes routers more functional than
bridges or switches, and it also makes them more
complex because they have to work harder to
determine the information.
A router is used to provide connectivity across wide
area network (WAN) links and route information
between two LAN segments.
The figure below shows a router with two LAN
ports (marked AUI 0 and AUI 1) and two WAN ports
(marked Serial 0 and Serial 1). This router is
capable of routing data between two LAN segments
and two WAN segments.
Gateways
The term gateway is applied to any device,
system, or software application that can perform
the function of translating data from one format
to another.
Actually, the term gateway refers more to a
network role than a network device.
For example, a router that can route data from an
IPX network to an IP network is, technically, a
gateway.
Another example of a gateway involves the
Systems Network Architecture (SNA) gateway,
which converts the data format used on a PC to
that used on an IBM mainframe or minicomputer.
A system that acts as an SNA gateway sits
between the client PC and the mainframe and
translates requests and replies from both
directions.
The definition of gateways is vague, it's
because there is no definite answer. The
function of a gateway is very specific, but how
the gateway functionality is implemented is
not.
Modems
Modem is a contraction of the terms
modulator and demodulator.
Modems perform a simple function: They
translate digital signals from a computer into
analog signals that can travel across
conventional phone lines.
Modems provide a relatively slow method of
communication. In fact, the fastest modem
available on the market today has a
maximum speed of 56Kbps.
available as
◦ internal devices that plug into PCI/ISA slots
◦ external devices that plug into serial or USB ports;
◦ PCMCIA cards designed for use in laptops
Cont….
Cont….
Network Interface Cards (NICs)
NICs are the mechanisms by which computers
connect to a network.
NICs come in all shapes and sizes, and they
come in prices to suit all budgets.
Known as network card, network adapter, and
LAN adapter, etc.
When buying one consider
◦ Network compatibility – Ethernet/Token Ring
◦ Bus compatibility – PCI/ ISA /PCI-e
◦ Port compatibility – UTP/ Fibre
◦ Hardware compatibility – Easy to install /
Recognized by many OS’s
Cont….
Wireless Access Point (WAP)
are a transmitter and receiver (transceiver)
device used for wireless LAN (WLAN) radio
signals.
Depending on the size of the network, one or
more WAPs may be required. Additional WAPs
are used to allow access to more wireless
clients and to expand the range of the
wireless network.
Communication depends on
◦ Distance between the client and the WAP
◦ Environmental conditions
Cont….
Transceivers
The term transceiver does not necessarily
describe a separate network device but rather an
integrated technology embedded in devices.
transceiver = transmitter and a receiver
device that receives data, converts it, and then
sends it to another location
RF transceivers, fiber-optic transceivers, Ethernet
transceivers, are examples
can also be used in pairs to insert a fiber
segment into copper networks
Firewall
a hardware or software system that is used to
separate one computer or network from
another one.
The most common type is used to protect a
computer or an entire network from
unauthorized access from the Internet.
can also be used to control the flow of data to
and from multiple networks within the same
organization. Firewalls
can be programmed to filter data packets
based on the information that is contained in
the packets.
Bit A bit is one digit, either a 1 or a 0.
Byte A byte is 7 or 8 bits, depending on whether
parity is used.
Octet An octet, made up of 8 bits, is just an ordinary
8-bit binary number.
Network address This is the designation used in
routing to send packets to a remote network for
example, 10.0.0.0, 172.16.0.0, and 192.168.10.0.
You can depict an IP address using one of three
methods:
Dotted-decimal, as in 172.16.30.56
Binary, as in
10101100.00010000.00011110.00111000
Hexadecimal, as in AC.10.1E.38
Cont….
Summary of the three classes of networks
Cont….