Adaptek Automation Technology, Chennai, Computer Hardware & Networking Device
Networking device Computer Application in Business
description
Transcript of Networking device Computer Application in Business
![Page 1: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/1.jpg)
Networking DevicesRepeatersHubsBridgesRouters
![Page 2: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/2.jpg)
What are networking devices?
Networking devices are products used to connect networks. As computer networks grow in size and complexity, so do the networking devices used to connect them.
![Page 3: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/3.jpg)
The purposes of having devices
First, they allow a greater number of nodes to be connected to the network.
Second, they extend the distance over which a network can extend.
Third, they localize traffic on the network. Fourth, they can merge existing networks.Fifth, they isolate network problems so that
they can be diagnosed more easily.
![Page 4: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/4.jpg)
Network Hardware
RepeaterUsed to boost the signal between two
cable segments or wireless access points.Can not connect different network
architecture.Does not simply amplify the signal, it
regenerates the packets and retimes them.
Resides on Layer 1 of the OSI model.
![Page 5: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/5.jpg)
What is a repeater and what are its functions?
Used to boost the signal between two cable segments or wireless access points
When signals first leave a transmitting station, they are clean and easily recognizable. However, the longer the cable length, the weaker and more deteriorated the signals become as they pass along the networking media.
![Page 6: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/6.jpg)
Repeaters (continued)
![Page 7: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/7.jpg)
Repeaters (continued)
![Page 8: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/8.jpg)
8
Limitations and Features
•Cannot connect different network architecture •Cannot join segments with different access
methods (e.g. CSMA/CD and token passing)•Do not isolate and filter packets
•Can connect different types of media
•The most economic way of expanding networks
![Page 9: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/9.jpg)
What is the disadvantage associated with using a repeater?
it can't filter network traffic. Data, sometimes referred to as bits, arriving at one port of a repeater gets sent out on all other ports
data gets passed along by a repeater to all other LAN segments of a network regardless of whether it needs to go there or no
› Traditionally, hubs are used for star topology networks, but they are often used with other configurations to make it easy to add and remove computers without bringing down the network.
› Resides on Layer 1 of the OSI model
![Page 10: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/10.jpg)
HubMulti-port repeaters are often called hubs.
Hubs are very common internetworking devices. Generally speaking, the term hub is used instead of repeater when referring to the device that serves as the center of a star topology network.
![Page 11: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/11.jpg)
Network Hardware
HubAn unintelligent network device that sends
one signal to all of the stations connected to it.
All computers/devices are competing for attention because it takes the data that comes into a port and sends it out all the other ports in the hub.
OSI Model Layers
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
![Page 12: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/12.jpg)
What problem could occur as a result of too much traffic on a network?
if segments of a network are only connected by non-filtering devices such as repeaters, this can result in more than one user trying to send data on the network at the same time
If more than one node attempts to transmit at the same time, a collision will occur.
When a collision occurs, the data from each device impact and are damaged
![Page 13: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/13.jpg)
What internetworking device can be used to filter traffic on the network?
One way to solve the problems of too much traffic on a network and too many collisions is to use an internetworking device called a bridge.
A bridge eliminates unnecessary traffic and minimizes the chances of collisions occurring on a network by dividing it into segments
![Page 14: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/14.jpg)
![Page 15: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/15.jpg)
![Page 16: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/16.jpg)
![Page 17: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/17.jpg)
![Page 18: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/18.jpg)
![Page 19: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/19.jpg)
![Page 20: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/20.jpg)
At what layer of the OSI model do bridges operate?
Because bridges operate at the data link layer, layer 2, they are not required to examine upper-layer information.
![Page 21: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/21.jpg)
How do bridges filter network traffic?
![Page 22: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/22.jpg)
![Page 23: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/23.jpg)
![Page 24: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/24.jpg)
![Page 25: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/25.jpg)
![Page 26: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/26.jpg)
![Page 27: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/27.jpg)
![Page 28: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/28.jpg)
![Page 29: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/29.jpg)
![Page 30: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/30.jpg)
How are bridge data-forwarding decisions limited?
Although bridges use tables to determine whether or not to forward data to other segments of the network, the types of comparisons and decisions they make are relatively low level, simple ones
![Page 31: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/31.jpg)
What types of network traffic problems is a bridge incapable of solving?
Bridges work best where traffic from one segment of a network to other segments is not too great.
However, when traffic between network segments becomes too heavy, the bridge can become a bottleneck and actually slow down communication.
![Page 32: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/32.jpg)
How many addressing schemes are there in networking?
You have already learned what one of these addressing schemes is. It is the MAC address.
The second addressing scheme in networking makes use of what is called the IP address.
![Page 33: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/33.jpg)
How do IP addresses differ from MAC addresses?
Like MAC addresses, every IP address is unique. No two IP addresses are ever alike.
However, while MAC addresses are physical addresses that are actually hard-coded into the NIC card and occur at the data link layer
IP addresses are implemented in software and occur at the network layer of the OSI model.
![Page 34: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/34.jpg)
What are routers?
Routers are another type of internetworking device.
These devices pass data packets between networks based on network protocol or layer 3 information.
Routers have the ability to make intelligent decisions as to the best path for delivery of data on the network.
![Page 35: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/35.jpg)
![Page 36: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/36.jpg)
![Page 37: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/37.jpg)
![Page 38: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/38.jpg)
![Page 39: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/39.jpg)
What network problems can routers help resolve?
The problem of excessive broadcast traffic can be solved by using a router.
Routers are able to do this, because they do not forward broadcast frames unless specifically told to do so
![Page 40: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/40.jpg)
![Page 41: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/41.jpg)
How do routers differ from bridges?
Routers differ from bridges in several respects. First, bridging occurs at the data link layer or layer 2,while routing occurs at the network layer or layer 3 of the OSI model.
Second, bridges use physical or MAC addresses to make data forwarding decisions. Routers use a different addressing scheme that occurs at layer three
![Page 42: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/42.jpg)
How do routers work?
Routers are used to connect two or more networks. For routing to be successful, each network must have a unique network number
![Page 43: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/43.jpg)
The port where a router connects to network A would have an IP address of A5.
![Page 44: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/44.jpg)
The IP address of the router's second interface would be B5.
![Page 45: Networking device Computer Application in Business](https://reader036.fdocuments.net/reader036/viewer/2022062511/54be89da4a7959c97d8b45fe/html5/thumbnails/45.jpg)
The router would determine to send the data from network A to network B out its port with the IP address B5.