Presentation is loading. Please wait.

Presentation is loading. Please wait.

Section 4.1 Identify important network connectivity devices Define hubs, switches, routers, and gateways Describe modem functionality Section 4.2 Differentiate.

Similar presentations


Presentation on theme: "Section 4.1 Identify important network connectivity devices Define hubs, switches, routers, and gateways Describe modem functionality Section 4.2 Differentiate."— Presentation transcript:

1 Section 4.1 Identify important network connectivity devices Define hubs, switches, routers, and gateways Describe modem functionality Section 4.2 Differentiate between types of network cabling Select cabling based on network needs

2 Section 4.3 Explain how a NIC functions Understand NIC configurations Section 4.4 Describe types of wireless network technologies Explain risks of wireless networking

3 pp. 104-109 4.1 Main Ideas Nodes, hubs, switches, and routers are all connective devices that allow the transmission of communications traffic over networks. The traffic moves between nodes on the network. Modems are devices that allow remote nodes to access a network. Key Terms repeater segment bridge switch router brouter gateway modulation demodulation Guide to Reading Network Connectivity Devices

4 pp. 104-109 4.1 Hubs The hub is a central hardware component for many LANs. Hubs operate at the Physical Layer in the OSI model. Hubs contain multiple ports, and can connect to other hubs to expand the network. Network Connectivity Devices

5 pp. 104-109 4.1 Repeaters segment Repeaters operate at the Physical Layer of the OSI model. Essentially, repeaters allow smaller LANs to grow into larger LANs by moving transmissions from one network segment to another. repeater A device that can be used to connect two cables and that boosts the signal before sending it along. (p. 105) segment A section of the network that includes the cable and nodes that are connected to a device, such as a repeater, hub, or bridge. (p. 105) Repeaters Network Connectivity Devices

6 pp. 104-109 4.1 Bridges Bridges can be used to connect dissimilar network segments that use different methods of transferring data. switches In today’s networks, it is uncommon to find bridges because switches provide “multibridge” capability. bridge A device used to connect two network segments together. (p. 105) switch A multiport bridge that allows several segments of a network to communicate with one another. (p. 106) Bridges and Switches Network Connectivity Devices

7 pp. 104-109 4.1 Bridges and Switches An important function of bridges and switches is to minimize collision of data packets by creating collision domains. Bridges and switches prevent the passing of collisions from one network segment to another. Network Connectivity Devices

8 pp. 104-109 4.1 routers Bridges are clever devices, but they are not as smart as routers. Brides forward data from one network segment to another, routers: forward packets from one network to another determine the best route to use to deliver the data router A network device used to connect networks of different types and that forwards packets from one network to another, even those separated by great distances. A router determines the best route to use to deliver the data. (p. 107) Routers Network Connectivity Devices

9 pp. 104-109 4.1 Brouters Brouters are hybrids that combine the capabilities of bridges and routers. Like bridges, they work at the Data Link Layer to transfer and filter network traffic. Like routers, they also work at the Network Layer to route packets from one network to another. brouter A network hybrid device that combines the capabilities of bridges and routers. (p. 108) Routers Network Connectivity Devices

10 pp. 104-109 4.1 Gateways enable dissimilar networks to communicate. Gateways operate at higher levels in the OSI model such as the Application, Presentation, and Session layers. In some cases, they operate at all seven layers. gateway A dedicated network computer whose job is to convert data packets from one network protocol to another. Enables dissimilar networks to communicate. (p. 109) Gateways Network Connectivity Devices

11 pp. 104-109 4.1 A modem is a computer- to-computer communication device that converts digital signals from the computer to analog signals for the telephone lines. The word “modem” comes from the two operations it handles: modulation modulation demodulation demodulation modulation The process on changing the digital signal to an analog signal on the sending computer. (p. 109) demodulation The process of converting the analog signal back to a digital signal on the receiving computer. (p. 109) Modems Network Connectivity Devices

12 pp. 111-116 4.2 Main Ideas Cable is used to connect network devices. There are many types of networking cable in use today. Different types of cable have particular strengths and weaknesses, most notably in the speed at which they can transfer information. Key Terms shielding noise crosstalk attenuation BNC connector twisted-pair cable unshielded twisted-pair (UTP) shielded twisted-pair (STP) fiber optic cable Guide to Reading Network Media

13 pp. 111-116 4.2 Cables The vast majority of networks are connected by some sort of cabling. The cables are the network transmission media that carry signals between computers. Three major groups of cabling connect the majority of networks: coaxial twisted-pair fiber optic Network Media

14 pp. 111-116 4.2 shielding Coaxial cable consists of a core of copper wire surrounded by insulation, a braided metal shielding, and an outer cover. shielding A layer of covering that grounds a cable and protects it from electric noise and crosstalk. (p. 111) Cables Network Media

15 pp. 111-116 4.2 noise crosstalk The shielding layer grounds the cable and protects it from electrical noise and crosstalk so the data are not distorted. attenuation Coaxial cable is more resistant to interference and attenuation than twisted-pair cabling. The farther the signal travels, the more the signal fades. Coaxial cable is more resistant to interference and attenuation than twisted-pair cabling. noise Stray electronic signals that interfere with data transmissions along a cable and slow the transmission speed. (p. 111) crosstalk Signal overflow from an adjacent wire that distorts the data signal. (p. 111) attenuation The process of data losing signal strength as the data are transmitted along a cable. (p. 112) Cables Network Media

16 pp. 111-116 4.2 Connection Hardware BNC connectors 10Base2 and 10Base5 cabling use special connection components, known as BNC connectors. BNC connector A hardware component used to make the connections between the cable and the computers. (p. 112) Cables Network Media

17 pp. 111-116 4.2 Cables Network Media There are several components in the BNC family, such as: The BNC cable connector The BNC T connector The BNC barrel connector The BNC terminator

18 pp. 111-116 4.2 twisted-paircable The twisting of the twisted-pair cable wire cancels out crosstalk from adjacent pairs of cable. The higher the number of twists per foot of cable, the more effectively it cancels out crosstalk. The total number of pairs in a cable varies, depending on the purpose of the cable. twisted-pair cable A type of cable that consists of two insulated strands of copper wire twisted around each other. (p. 113) Cables Network Media

19 pp. 111-116 4.2 Two types of twisted-pair cable are: unshielded twisted-pair (UTP) unshielded twisted-pair (UTP) shielded twisted-pair (STP) shielded twisted-pair (STP) Of the two types, UTP cable is most prevalent. Its popularity can be attributed to the fact that most buildings are prewired for telephone service. unshielded twisted-pair (UTP) A type of twisted-pair cabling that does not have an extra shielding layer to help eliminate noise interference. However, it is highly affordable. (p. 113) shielded twisted-pair (STP) A type of twisted-pair cabling that uses a woven copper- braid jacket to protect the transmitted data from outside interference. (p. 113) Cables Network Media

20 pp. 111-116 4.2 Cables Twisted-pair cabling uses RJ-45 connectors, which are similar to RJ-11 telephone connectors, to connect to a computer. Network Media

21 pp. 111-116 4.2 fiber optic cable In a fiber optic cable, pulses of light travel down extremely thin tubes of glass or plastic to transmit data. The signal—a light pulse—can be transmitted over many miles very quickly. fiber optic cable A type of cable made up of extremely thin tubes of glass or plastic that allow pulses of light to travel through it to transmit data. (p. 115) Cables Network Media

22 pp. 111-116 4.2 Selecting Cabling The cabling you select depends on the needs of a particular site. To determine which type of cable is best, consider the following guidelines. Network Media

23 pp. 111-116 4.2 You Try It Activity 4A – Making Your Own Network Cable (p. 114) Network Media

24 pp. 117-123 4.3 Main Ideas The NIC is the direct link between the computer and the cable. Choose NICs carefully by identifying the computer’s bus architecture and the connector type used on the network. Specialized NICs allow connections through different media. Key Terms programmable read-only memory (PROM) boot-on-LAN Guide to Reading Network Interface Cards

25 pp. 117-123 4.3 The Role of the NIC The NIC has four primary roles: 1.The NIC prepares data from the computer for the network cable. 2.It sends the data to another computer. 3.It controls the flow of data between the computer and the cabling system. 4.It receives incoming data from the cable and translates the data into bytes that can be understood by the computer’s central processing unit (CPU). Network Interface Cards

26 pp. 117-123 4.3 The Role of the NIC Before data are sent over the network, a conversation between the sending and receiving NICs takes place. The following items must be determined before any transmission can begin: maximum size of the data groups to be sent amount of data to be sent before confirmation of receipt is given time intervals between sending data chunks amount of time to wait before confirmation is sent how much data each NIC can hold before it overflows data transmission speed Network Interface Cards

27 pp. 117-123 4.3 Installation of a NIC NICs act as the physical interface between the computer and the network cable. Network Interface Cards

28 pp. 117-123 4.3 Selecting the Right NIC To ensure compatibility between the computer and the network, the NIC must: fit with the computer’s internal structure (data bus architecture). contain the correct type of cable connector for the cabling. Network Interface Cards

29 pp. 117-123 4.3 Selecting the Right NIC The NIC performs three important functions to coordinate activities between the computer and the cabling: 1. Makes the physical connection to the cable 2. Generates the electrical signals that travel over the cable 3. Controls access to the cable by following specific rules Network Interface Cards

30 pp. 117-123 4.3 You may encounter some situations that require the use of specialized network cards. Some examples include: wireless NICs fiber optic NICs programmable read-only memory programmable read-only memory (PROM) boot-on-LAN programmable read-only memory (PROM) A chip that contains the hardwired code to start the computer and connect the user to the network. With remote-boot PROMs, diskless workstations can join the network when they start. (p. 122) boot-on-LAN The process that enables the PC to boot from a server rather than the local hard drive. (p. 122) Specialized NICs Network Interface Cards

31 pp. 117-123 4.3 You Try It Activity 4B – Installing a Network Interface Card (p. 119) Network Interface Cards

32 pp. 125-128 4.4 Main Ideas Infrared signals use light beams to transmit from computer to device. Narrowband radio signals use radio frequencies to transmit data. Spread- spectrum radio broadcasts data over a range of frequencies. Microwave technology includes ground to satellite transmission. Key Terms infrared narrowband radio spread-spectrum radio hop microwave wired encryption privacy (WEP) Guide to Reading Wireless Networking

33 pp. 125-128 4.4 infrared There are four types of infrared networks: line-of-sight scatter infrared reflective broadband optical telepoint infrared A type of light beam used in wireless networks to transmit the data between devices. (p. 125) Infrared Light Wireless Networking

34 pp. 125-128 4.4 Narrowband radio Narrowband radio is similar to broadcasting from a radio station. The broadcast range is 3,000 meters (9,842 feet), and does not require line-of- sight focusing. However, because the signal is high frequency, it is subject to attenuation from steel and load-bearing walls. narrowband radio A high- frequency transmission similar to broadcasting from a radio station. The user tunes both the transmitter and the receiver to a certain frequency. (p. 126) Narrowband Radio Wireless Networking

35 pp. 125-128 4.4 Spread-spectrum radio hops Spread-spectrum radio broadcasts signals over a range of frequencies. This helps it avoid narrowband communication problems. The available frequencies are divided into channels, known as hops. spread-spectrum radio A transmission technology that broadcasts signals over a range of frequencies, thus providing security for the transmission. (p. 126) hop One portion of a transmission’s journey between two points. (p. 126) Spread-Spectrum Wireless Networking

36 pp. 125-128 4.4 Microwave Microwave systems can be used for the following: satellite-to-ground links between two buildings across large, flat, and open areas, such as bodies of water or deserts microwave Part of the electromagnetic spectrum, and a form of radiation that can be used for short- and long-distance communications systems. (p. 127) Microwave Technology Wireless Networking

37 pp. 125-128 4.4 Microwave Technology A microwave system can be used to transmit data from building to building. Wireless Networking

38 pp. 125-128 4.4 Wireless technology is somewhat more prone to security risks. Due to the fact that the signal is broadcast in a certain radius, anyone within that radius can potentially intercept that signal. wired encryption privacy (WEP) Most wireless NICs and access points have a built-in security feature, called wired encryption privacy (WEP). wired encryption privacy (WEP) A security feature that, when activated, encrypts the data prior to transmission by the NIC. At the receiving end, the data are decrypted. Most wireless NICs and access points have this security feature built in. (p. 128) Security Risks Wireless Networking

39 Resources For more resources on this chapter, go to the Introduction to Networks and Networking Web site at http://networking.glencoe.com. http://networking.glencoe.com Chapter 4


Download ppt "Section 4.1 Identify important network connectivity devices Define hubs, switches, routers, and gateways Describe modem functionality Section 4.2 Differentiate."

Similar presentations


Ads by Google