introduction to networking chapter 10
DESCRIPTION
Introduction to Networking Chapter 10. Learn how to…. Define the term networking and list three critical components. Describe the five basic topologies. Define the seven layers of the OSI model and the protocols that use it. Describe the differences among LAN, MAN, and WAN. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/1.jpg)
![Page 2: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/2.jpg)
Introduction to NetworkingChapter 10
![Page 3: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/3.jpg)
Learn how to…
• Define the term networking and list three critical components.
• Describe the five basic topologies. • Define the seven layers of the OSI model
and the protocols that use it.• Describe the differences among LAN,
MAN, and WAN.• Describe the physical network
components.
![Page 4: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/4.jpg)
Understanding Networks
![Page 5: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/5.jpg)
Networks
• A network is the connection of two or more digital devices for communicating, transferring, or obtaining data.
• The act of communicating over a network is called networking.
![Page 6: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/6.jpg)
Networking
![Page 7: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/7.jpg)
Characteristics of a Network
• All networks require:– A physical connection (or wireless connection).– A set of communication rules called protocols.– One or more network services that will receive
the communication.
![Page 8: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/8.jpg)
Mainframe/Terminal Model
• The mainframe/terminal model – A mainframe is a centralized computer to
which users connect to obtain network services.
– The terminal is a device with a keyboard, which you use to type commands or enter data to communicate with the mainframe computer.
![Page 9: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/9.jpg)
Client-Server Model
• Client-server refers to the manner in which computers exchange information by sending it (as servers) and receiving it (as clients).– Computers can serve dual roles as both
servers and clients.
![Page 10: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/10.jpg)
Multi-Tier
• Large organizations may subdivide complex applications into multiple stages called tiers.
• Multi-tier computing typically includes three tiers consisting of the user interface tier, the business tier, and the database tier.
![Page 11: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/11.jpg)
Peer-to-Peer Model
• Peer-to-peer (P2P) is a network architecture in which each workstation has equal responsibilities.
![Page 12: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/12.jpg)
Enterprise Model
• Enterprise model refers to networking within large organizations that dedicate entire servers to handling important tasks.– Serving mail– Hosting databases– Managing security– Routing network traffic
![Page 13: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/13.jpg)
Push-Pull Technology
• The push-pull metaphor– Pull means that you ask for the information.
• When you click a hyperlink.– Push means that the information is being
provided to you.• When stock quotes are automatically updated on
your desktop or when weather is automated updated on your desktop.
– See www.weatherbug.com
![Page 14: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/14.jpg)
Complex Network
![Page 15: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/15.jpg)
Network Operating Systems
• A network operating system is the software that adds to a computer the functions required for connecting computers together for networking.– Microsoft Windows– UNIX and Linux– Mac OS– Novel NetWare
![Page 16: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/16.jpg)
Microsoft Windows
• Microsoft Windows is the most wide spread network operating system.– Every version of Windows contains
networking capability, but some versions do not support all network services.
– For a history of Windows server products, visit www.microsoft.com/windows/winhistoryserver.mspx
![Page 17: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/17.jpg)
UNIX and Linux
• The UNIX and Linux operating systems support the full range of networking services, including both client- and server-side components.– The Open Group holds the trademark and
defines the official version of UNIX at www.unix-systems.org
– Linux is an open source version of UNIX• To learn more, go to www.linux.org
![Page 18: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/18.jpg)
Mac OS
• The Macintosh OS X operating system has networking built in.– Behind the Macintosh user interface is
a UNIX-based operating system.• To learn more, go to
www.apple.com/macosx/features/unix
![Page 19: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/19.jpg)
Novell NetWare
• NetWare is a PC-based local area networking product that was one of the most dominant network operating systems during the decade following its invention in 1983.– However, when Microsoft marketed Windows NT
in 1993, Novell NetWare’s market share dropped.– For more information, go to
www.novell.com/products/netware
![Page 20: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/20.jpg)
Classifying Network Topologies
![Page 21: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/21.jpg)
Network Topologies
• A network’s geographical shape is referred to as the network’s topology.
• The five kinds of network topologies are:– Bus topology– Ring topology– Star topology– Hybrid topology– Mesh topology
![Page 22: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/22.jpg)
Bus Topology
• The bus topology has a single cable, called the bus or the trunk, to which every device on the network connects.– All of the messages on the bus pass by each device, or
node, on the bus.– It uses inexpensive coaxial cable that is easy to install.– A break anywhere along the cable causes all network
traffic to stop.
![Page 23: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/23.jpg)
Ring Topology
• A ring topology forms when you connect a network’s nodes in a circle.– Messages flow in a single direction.– A small packet called a token circulates the
ring – a device must have the token to use the network.
![Page 24: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/24.jpg)
Star Topology
• In a star topology, each device in the network connects to a central hub, which distributes messages from one node to another.– Provides centralized
control– Easy expansion– Fault tolerance
![Page 25: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/25.jpg)
Hybrid Topology
• A hybrid topology in a network employs more than one topology to connect devices.
Star Bus topology
Star Ring topology
![Page 26: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/26.jpg)
Mesh Topology
• In a mesh topology, multiple connections are made.– In mission-critical
operations, you want as much redundancy as possible so that if one part of the network goes down, the packets can find an alternate path to their destination.
![Page 27: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/27.jpg)
Adopting Network Protocols
![Page 28: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/28.jpg)
Protocol
• A protocol is a set of rules that define how computers communicate with each other.
• The International Standards Organization (ISO) developed an international standard called the Open System Interconnection (OSI) Reference Model (OSI/RM).
![Page 29: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/29.jpg)
OSI Reference Model
• This model comprises of seven layers that describe the way data is shared on a network.
• Suppose you just clicked on a link on a Web page. The following slides describe the process from one layer to another.– Data is passed down from Layer 7 to Layer 1,
is then transmitted over the medium, and then goes back up from Layer 1 to Layer 7 in the receiving device.
– Headers are added at each layer.
![Page 30: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/30.jpg)
Layer 7: Application
• Through an Application Programming Interface (API), the browser informs the Application Layer of your request.
• The Application Layer begins to form the packet that will eventually travel across the network.
![Page 31: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/31.jpg)
Layer 6: Presentation
• The Presentation Layer translates the data into a standard network data format.
• It can use data compression to streamline the packet so it does not consume unnecessary bandwidth on the network.
• It can also encrypt the data for sensitive data transmissions.
![Page 32: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/32.jpg)
Layer 5: Session
• The Session Layer negotiates the connection that will be made between the two computers exchanging data.
• It inserts a checkpoint, which is a marker used to signal that a certain amount of the data has arrived all right.
![Page 33: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/33.jpg)
Layer 4: Transport
• The Transport Layer works to ensure that the data arrives reliably at its destination.
• If the amount of data is large, the data is split into fragments that are numbered sequentially.
![Page 34: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/34.jpg)
Layer 3: Network
• The Network Layer organizes data into datagrams consisting of the data from the Transport Layer and routing information such as the source and destination addresses.
![Page 35: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/35.jpg)
Layer 2: Datalink
• The Data Link Layer transforms the data into data frames.
• It consists of two sublayers:– Logical Link Control (LLC)
• Performs error checking and regulates the flow of data.
– Media Access Control (MAC)• Handles the actual placement of the packets
onto the Physical Layer.
![Page 36: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/36.jpg)
CRC
• The Data Link layer also calculates a cyclic redundancy check (CRC) based on the information in the frame.– The receiving machine calculates its own
CRC and compares it to the value in the frame. If they do not match, the frame is corrupt and discarded.
![Page 37: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/37.jpg)
Layer 1: Physical
• The Physical Layer transforms the 0’s and 1’s into signals that flow over the transmission media.
• At the receiving end, the Physical Layer converts these signals back into 0’s and 1’s and passes them up to the Data Link Layer.
![Page 38: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/38.jpg)
Communication
![Page 39: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/39.jpg)
To help you remember…
![Page 40: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/40.jpg)
Protocol Suites
• The term protocol suite refers to a collection of protocols that work together to conform to a multilayered protocol standard, such as the OSI/RM.
• Six major protocol suites follow the OSI/RM:– TCP/IP– NetBEUI– IPX/SPX– AppleTalk– DLC– SNA
![Page 41: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/41.jpg)
TCP/IP
• TCP/IP is the Internet’s protocol suite.– Transport Control Protocol (TCP)
• Manages the Transport Layer– Internet Protocol (IP)
• Handles the routing on the Network Layer
![Page 42: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/42.jpg)
NetBEUI
• NetBEUI stands for NetBIOS Extended User Interface– NetBIOS stands for Network Basic
Input/Output System– Not routable
![Page 43: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/43.jpg)
IPX/SPX
• IPX/SPX stands for Internetwork Packet Exchange (IPX) and Sequenced Packet Exchange (SPX).– Developed by Novell for use with the NetWare
network operating system.
![Page 44: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/44.jpg)
AppleTalk
• AppleTalk is the legacy protocol suite for peer-to-peer networking on local networks of Macintosh computers.
![Page 45: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/45.jpg)
DLC
• IBM invented Data Link Control (DLC) to enable microcomputers to connect as clients to legacy mainframes.– Still used by Hewlett-Packard printers that
have Network Interface Cards (NICs).
![Page 46: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/46.jpg)
SNA
• Systems Network Architecture (SNA) is a protocol suite for connecting different kinds of networks.
![Page 47: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/47.jpg)
Combining Protocols
• Most computers run more than one networking protocol.
• The process of assigning a protocol to a Network Interface Card (NIC) is called protocol binding.– The binding order is the order in which your
computer tries protocols when attempting to communicate over the network.
![Page 48: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/48.jpg)
Creating LANs, MANs, and WANs
![Page 49: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/49.jpg)
LAN
• A local area network (LAN) is the connection of two or more computer devices for networking within a relatively small area.
![Page 50: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/50.jpg)
MAN
• A metropolitan area network (MAN) connects local networks across a larger geographical region.– The term metropolitan implies that MANs
cover an area the size of a city.
![Page 51: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/51.jpg)
WAN
• A wide area network (WAN) uses high-speed transmission lines to connect MANs and LANs over large geographical areas.
![Page 52: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/52.jpg)
Project 802
• The Institute of Electrical and Electronic Engineers (IEEE, pronounced “I triple-E”) is in charge of defining the networking standards that connect devices to form different kinds of local and metropolitan area networks.– Called Project 802.
![Page 53: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/53.jpg)
Project 802
![Page 54: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/54.jpg)
IEEE 802.2
• The IEEE 802.2 standard is the Logical Link Control (LLC) sublayer of the OSI/RM Data Link Layer.
![Page 55: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/55.jpg)
IEEE 802.3
• The IEEE 802.3 standard defines Ethernet, which is the most popular method of local area networking.– Defines CSMA/CD, which stands for Carrier
Sense Multiple Access with Collision Detection.
– Ethernet works by detecting the data collisions that can occur when two or more devices use a data channel simultaneously.
![Page 56: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/56.jpg)
Ethernet
• The maximum speed of an ordinary 802.3 Ethernet is 10 Mbps.
• Fast Ethernet runs at 100 Mbps.• Gigabit Ethernet runs at 1000 Mpbs.
![Page 57: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/57.jpg)
IEEE 802.5
• The IEEE 802.5 standard defines token ring, which derives from IBM’s local area network design in which a token travels continually around the cable ring to which the network devices are attached.– A device can send data only when it has the
token.– Each device attaches to a central connecting
point called a Multi-Station Access Unit (MAU).
![Page 58: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/58.jpg)
IEEE 802.12
• The IEEE 802.12 standard defines a Demand Priority Access LAN that is known in the marketplace as 100VG-AnyLAN.– 100VG means that the network is designed to
transmit at a speed of 100 Mbps over voice grade (VG) telephone wiring.
– AnyLAN refers to the fact that this network can handle packets framed for transmission on either Ethernet or token-ring networks.
![Page 59: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/59.jpg)
FDDI
• Fiber Distributed Data Interface (FDDI) uses fiber optics to create a very fast network.– Uses two counter-rotating token rings.– Due to its high reliability, FDDI is often used
for backbones (network cables that act as the primary pathways for traffic).
![Page 60: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/60.jpg)
FDDI
![Page 61: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/61.jpg)
WANs
• A wide area network (WAN) is the connection of two or more LANs that can be located in different buildings, cities, countries, or continents.
• The local networks can be connected by:– Telephone lines– ISDN– Broadband– Frame Relay– Asynchronous Transfer Mode (ATM)
![Page 62: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/62.jpg)
X.25
• X.25 enables data to be transmitted over the packet-switched networks (PSNs) of the telephone companies.– Legacy WAN protocol with extensive error
checking.– Used by some for credit-card swiping and
automated bank machines.
![Page 63: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/63.jpg)
Frame Relay
• Frame Relay is a streamlined version of X.25.– No error checking.– Connections can be:
• Switched virtual circuit (SVC) created for each data transfer and terminated when the data transfer is complete.
• Permanent virtual circuit (PVC) that is constantly on.
– Bandwidth on demand allows customers to choose their connection speed.
![Page 64: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/64.jpg)
ATM
• Asynchronous Transfer Mode (ATM) is an ITU standard for cell relay that can transmit voice, video, or data in small, fixed-size 53-byte chunks called cells.– Asynchronous means that the cells do not
have to line up and wait to be transmitted sequentially over a single connection.
![Page 65: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/65.jpg)
ATM
![Page 66: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/66.jpg)
NAP
• A network access point (NAP) is a junction that provides direct access to the traffic on a network.– The three major NAPs used by the ISPs are
located in New York, Chicago, and San Francisco.
![Page 67: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/67.jpg)
T-Carriers
• NAPs often use the T-carrier system to connect a LAN to a WAN.– Organizations that cannot afford the cost of
a full T1 can lease a fractional T1.
![Page 68: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/68.jpg)
E-Carriers
• E-carriers are used in Europe.
![Page 69: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/69.jpg)
WAP
• Wireless access point (WAP) refers to wireless network junctions that enable workstations to communicate without cables.
![Page 70: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/70.jpg)
NAT
• Network address translation (NAT) transforms the IP addresses used for internal traffic into a second set of addresses for external traffic.– NAT hides internal addresses, acting as a
firewall against attacks.– Multiple internal addresses can be translated
into fewer external addresses.
![Page 71: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/71.jpg)
Network Cards
• Each workstation must have a Network Interface Card (NIC).
• On FDDI equipment, the network interface is called a MIC, which stands for Media Interface Card.
• On wide area networking equipment, the network interface is called a WIC, for WAN interface card.
![Page 72: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/72.jpg)
Network Components
• Users perform work on clients called workstations.
• A concentrator is an Ethernet multiport repeater used to connect multiple Ethernet devices to a single Ethernet cable.
• A hub serves as the center of a star network topology (Ethernet multiport repeater).
![Page 73: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/73.jpg)
Network Components
• A repeater interconnects two network cables so they can be treated as a single cable.– Allows one to extend the length of the cable.
• A switch filters, forwards, and floods frames based on the destination MAC address of each frame.– To flood is to pass traffic out all of the
switch’s connections except for the incoming interface through which the traffic was received.
![Page 74: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/74.jpg)
Network Components
• A bridge is used to connect two network segments and pass packets between them based on the destination MAC address of each frame.– A switch is a multiport bridge.
• A router forwards network traffic along the optimal path based on information in the packet’s Network Layer header.
![Page 75: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/75.jpg)
Network Components
• A bridge router (brouter) is a relay that functions as both a router and a bridge.
• A gateway is a computer that routes traffic from a workstation on an internal network to an external network such as the Internet.
![Page 76: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/76.jpg)
Coaxial Cabling
• Coaxial cable, also known as coax, consists of a cylindrically braided outer conductor that surrounds and shields a single solid inner copper wire conductor.
![Page 77: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/77.jpg)
Coaxial Cabling
• Coaxial cable comes in two forms:
• Thinnet– Thin coaxial cable– Used in 10Base2
Ethernet networks– Cable segments up to
185 meters in length
• Thicknet– Thick coaxial cable– Used in 10Base5
Ethernet networks– Cable segments up to
500 meters in length
![Page 78: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/78.jpg)
Coaxial Cabling
• Coaxial cables use the British Naval Connector (BNC) to plug the cables into workstations, hubs, and other kinds of network devices.
![Page 79: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/79.jpg)
Twisted Pair Cabling
• Twisted pair is a transmission medium consisting of two insulated wires that are twisted together to create a double helix that reduces noise levels and eliminates crosstalk between the wires.
• Unshielded twisted pair (UTP)
• Shielded twisted pair (STP) has an extra layer of insulation
![Page 80: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/80.jpg)
Twisted Pair Cabling
• Twisted-pair cabling is broken into categories.– CAT 5 means category 5.– The wires terminate in an RJ-45 connector.
![Page 81: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/81.jpg)
Twisted Pair Cabling
![Page 82: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/82.jpg)
Twisted Pair Cabling
• Twisted pair cables consist of four pairs of wires with RJ-45 connectors at the end.
![Page 83: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/83.jpg)
Fiber Optic Cabling
• Fiber optics is a transmission method that transmits light-modulated video, voice, or data signals through hair-thin strands of glass called fibers.– These strands are encased by a layer of
Kevlar-reinforced reflective material called cladding, which keeps the light inside the fiber.
![Page 84: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/84.jpg)
Wireless Media
• Includes cellular, radio, microwave, satellite, and infrared signals.
• Network nodes that use wireless connections must have a wireless NIC, which connects to a transceiver known as a wireless access point (WAP).
• Defined by the 802.11 standards.– For more information, go to
www.microsoft.com/windowsxp/mediacenter
![Page 85: Introduction to Networking Chapter 10](https://reader036.vdocuments.net/reader036/viewer/2022062501/56816804550346895ddd846d/html5/thumbnails/85.jpg)