SlideShare a Scribd company logo
Chapter 5:  Networking Hardware Network+ Guide to Networks
Objectives Identify the functions of LAN connectivity hardware Install and configure a network adapter (network interface card) Identify problems associated with connectivity hardware
Objectives (continued) Describe the factors involved in choosing a network adapter, hub, switch, or router Discuss the functions of repeaters, hubs, bridges, switches, routers, and gateways, and the OSI Model layers at which they operate Describe the uses and types of routing protocols
Network Adapters Also called network interface cards, NICs, or network cards Connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media NICs belong to both the Physical layer and Data Link layer of the OSI Model, because they apply data signals to the wire and assemble or disassemble data frames
Network Adapters (continued) Types of Network Adapters Expansion Board Network Adapters A circuit board used to connect a device to the system board (the main circuit board that controls a computer, also known as a motherboard) Expansion boards connect to the system board through expansion slots, which are openings with multiple electrical contacts into which the expansion board can be inserted
Network Adapters (continued) The circuit, or signaling pathway, used by the system board to transmit data to the computer’s components is the computer’s bus The capacity of a bus is defined principally by the width of its data path (expressed in bits) and its clock speed (expressed in MHz) A data path size equals the number of bits that it can transmit in parallel at any given time
Network Adapters (continued) PCI (Peripheral Component Interconnect) is a 32- or 64-bit bus with a 33- or 66-MHz clock speed whose maximum data transfer rate is 264 MBps The most popular expansion board NIC is one that uses a PCI bus
Network Adapters (continued) Characterized by a shorter connector length and a much faster data transmission capability than previous bus types (such as ISA or EISA) PCI adapters work within both PCs and Macintosh computers, allowing an organization to standardize on one type of NIC for use with all of its workstations
Network Adapters (continued) A newer version of the PCI standard is PCI Express, which specifies a 64-bit bus with a 133-MHz clock speed capable of transferring data at up to 500 MBps in full-duplex transmission More efficient data transfer, support for quality of service distinctions, error reporting and handling, and compatibility with the current PCI software Designed to fit into PCs that currently have older PCI slots
Network Adapters (continued) Externally Attached Network Adapters USB (universal serial bus), PCMCIA (Personal Computer Memory Card International Association), or CompactFlash slots are used to connect network adapters One advantage to externally attached network adapters is their simple installation The first standard PCMCIA-standard adapter to be released, called PC Card, specified a 16-bit interface running at 8 MHz
Network Adapters (continued) USB (universal serial bus) port is a standard interface used to connect multiple type of peripherals, including modems, mice, audio players, and network adapters USB adapters may follow one of two USB standards: USB 1.1 or USB 2.0 The primary difference between the two standards is speed The USB 1.1 standard has a maximum data transfer rate of 12 Mbps and the 2.0 standard can reach 480 Mbps
Network Adapters (continued) Compact Flash as an ultra-small removable data and input/output device that would connect to many kinds of peripherals Compact Flash slots can also be used to connect to a network Compact Flash network adapters are most likely to be found connecting devices too small to handle PCMCIA slots
Network Adapters (continued) Wireless Network Adapters use an antenna (either internal or external) to exchange signals with a base station transceiver or another wireless NIC One disadvantage to using wireless network adapters is that currently they are somewhat more expensive than wire-bound network adapters
Network Adapters (continued) Installing Network Adapters Firmware, a set of data or instructions that has been saved to a read-only memory (ROM) chip (which is on the network adapter) Data can be erased or changed by applying electrical charges to the chip (via the software program), this particular type of ROM is called EEPROM (electrically erasable programmable read-only memory)
Network Adapters (continued) Installing and Configuring Network Adapter Software A device driver (sometimes called, simply, a driver) is software that enables an attached device to communicate with the computer’s operating system Most operating systems come with a multitude of built-in device drivers Each time a computer boots up, the device drivers for all its connected peripherals are loaded into RAM so that the computer can communicate with those devices at any time
Network Adapters (continued) Interpreting LED Indicators Most modern NICs have LEDs that indicate whether or not they’re communicating with the network The only way to know for certain what your NIC’s LEDs are trying to tell you is to read the documentation Your NIC may have one or more of the following lights, and they may or may not be labeled:  ACT, LNK, TX or RX
Network Adapters (continued) IRQ (Interrupt Request) IRQ is a message to the computer that instructs it to stop what it is doing and pay attention to something else An interrupt is the circuit board wire over which a device issues voltage to signal this request Each interrupt must have a unique IRQ number, a number that uniquely identifies that component to the main bus
Network Adapters (continued) If two devices attempt to use the same interrupt, resource conflicts and performance problems will result If IRQ conflicts do occur, you must reassign a device’s IRQ Network adapter IRQs can also be changed through the adapter’s EEPROM configuration utility or through the computer’s CMOS configuration utility
Network Adapters (continued) CMOS (complementary metal oxide semiconductor) is a type of microchip that requires very little energy to operate In a PC, the CMOS stores settings pertaining to a computer’s devices  These settings are saved even after you turn off a PC because the CMOS is powered by a tiny battery in your computer
Network Adapters (continued) Information saved in CMOS is used by the computer’s BIOS (basic input/output system) The BIOS is a simple set of instructions that enables a computer to initially recognize its hardware
Network Adapters (continued) Memory Range The memory range indicates, in hexadecimal notation, the area of memory that the network adapter and CPU will use for exchanging, or buffering, data Some memory ranges are reserved for specific devices—most notably, the system board Reserved address ranges should never be selected for new devices
Network Adapters (continued) Memory range settings are less likely to cause resource conflicts than IRQ settings, mainly because there are more available memory ranges than IRQs
Network Adapters (continued) Base I/O Port The base I/O port setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the network adapter and the CPU A device’s base I/O port cannot be used by any other device
Network Adapters (continued) Firmware Settings Transmission characteristics are held in the adapter’s firmware  Network adapter configuration utilities allow you to perform diagnostics In order to perform the entire group of the diagnostic tests on the NIC’s utility disk, you must have a loopback plug
Network Adapters (continued) A loopback plug (also called a loopback adapter) is a connector that plugs into a port and crosses over the transmit line to the receive line so that outgoing signals can be redirected into the computer for testing
Network Adapters (continued) Choosing the Right Network Adapter compatibility with your existing system must match the network’s bus type, access method, connector types, and transmission speed correct drivers available
Repeaters Repeaters are the simplest type of connectivity devices that regenerate a digital signal Repeaters operate in the Physical layer of the OSI Model A repeater contains one input port and one output port, so it is capable of receiving and repeating only the data stream
Repeaters (continued) Repeaters are suited only to bus topology networks The advantage to using a repeater is that it allows you to extend a network inexpensively
Hubs A hub is a repeater with more than one output port A simple hub may contain multiple ports connecting a group of computers in a peer-to-peer fashion, accepting and repeating signals from each node
Hubs (continued) A slightly more sophisticated hub may contain multiple ports for devices and one port that connects to a network’s backbone On Token Ring networks, hubs are called Multistation Access Units (MAUs)
Hubs (continued) The elements shared by most hubs are described in the following list: Ports—Receptacles where patch cables connect workstations or other devices to the hub Uplink port—The receptacle used to connect one hub to another hub in a daisy-chain or hierarchical fashion Link LED—The light on a port that indicates whether it is in use
Hubs (continued) Collision LED (Ethernet hubs only)—The light that roughly indicates collisions —when one frame interferes with another’s transmission—by blinking, usually orange Status LED—The light that indicates that the hub is receiving power Power supply—The device that provides power to the hub Ventilation fan—A device used to cool a device’s internal electronics
Hubs (continued) Types of Hubs Standalone hubs, as their name implies, are hubs that serve a group of computers that are isolated from the rest of the network or that form their own small network Stackable hubs resemble standalone hubs, but they are physically designed to be linked with other hubs in a single telecommunications closet
Hubs (continued) Stackable hubs linked together logically represent one large hub to the network A great benefit to using stackable hubs is that your network or workgroup does not depend on a single hub, which could present a single point of failure Stackable hubs may support a number of different media connectors and transmission speeds and may come with or without special processing features
Hubs (continued) The simplest type of hubs—known as passive hubs—do nothing but repeat signals Intelligent hubs are also called managed hubs, because they can be managed from anywhere on the network
Bridges Bridges are devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame’s MAC address They have a single input and a single output port
Bridges (continued) They can interpret physical addressing information Bridges are protocol-independent Bridges can move data more rapidly than traditional routers
Bridges (continued) Bridges take longer to transmit data than either repeaters or hubs, because bridges actually analyze each packet Inserting a bridge into a network, you can add length beyond the maximum limits that apply to segments
Bridges (continued) Bridges can help improve network performance because they can be programmed to filter out certain types of frames As nodes transmit data through the bridge, the bridge establishes a filtering database (also known as a forwarding table) of known MAC addresses and their locations on the network
Switches Switches are connectivity devices that subdivide a network into smaller logical pieces, or segments Switches interpret MAC address information Most switches have an internal processor, an operating system, memory, and several ports that enable other nodes to connect to it Because they have multiple ports, switches can make better use of limited bandwidth and prove more cost-efficient than bridges
Switches (continued) A collision domain is a logically or physically distinct Ethernet network segment on which all participating devices must detect and accommodate data collisions Switches provide at least two advantages: better security and better performance
Switches (continued) Switches provide separate channels for (potentially) every device, performance stands to gain Switches can become overwhelmed by continuous, heavy traffic and then cannot prevent data loss
Switches (continued) Switches differ in the method of switching they use—namely, cut-through mode or store and forward mode A switch running in cut-through mode will read a frame’s header and decide where to forward the data before it receives the entire packet
Switches (continued) Cut-through switches can detect runts, or erroneously shortened packets Cut-through switches cannot detect corrupt packets The most significant advantage of the cut-through mode is its speed
Switches (continued) In store and forward mode, a switch reads the entire data frame into its memory and checks it for accuracy before transmitting the information Store and forward switches transmit data more accurately They are more appropriate for larger LAN environments, because they do not propagate data errors They can also transfer data between segments running different transmission speeds
Switches (continued) Using Switches to Create VLANs Switches can create virtual local area networks (VLANs), logically separate networks within networks, by grouping a number of ports into a broadcast domain A broadcast domain is a combination of ports that make up a Layer 2 segment In contrast to a collision domain, ports in the same broadcast domain do not share a single channel
Switches (continued) VLANs can be designed with flexibility They can include ports from more than one switch or segment On a wireless network,VLANs allow mobile clients to move from one access point’s range to another without losing network functionality or having to re-authenticate with the network VLANs are created by properly configuring a switch’s software
Switches (continued) Reasons for using VLANs include:  Separating groups of users who need special security or network functions Isolating connections with heavy or unpredictable traffic patterns  Identifying groups of devices whose data should be given priority handling Containing groups of devices that rely on legacy protocols incompatible with the majority of the network’s traffic
Switches (continued) Higher-Layer Switches A switch capable of interpreting Layer 3 data is called a Layer 3 switch (and sometimes called a routing switch) A switch capable of interpreting Layer 4 data is called a Layer 4 switch These higher-layer switches may also be called routing switches or application switches can cost three times more than Layer 2 switches, and are typically used as part of a network’s backbone
Routers A router is a multiport connectivity device that directs data between nodes on a network Routers can integrate LANs and WANs running at different transmission speeds and using a variety of protocols Routers are finding niches in specialized applications such as linking large Internet nodes or completing digitized telephone calls
Routers (continued) Routers can also determine the shortest, fastest path between two nodes A typical router has an internal processor, an operating system, memory, input and output jacks for different types of network connectors (depending on the network type), and, usually, a management console interface A router with multiple slots that can hold different interface cards or other devices is called a modular router
Routers (continued) A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as an interior router Exterior routers direct data between nodes external to a given autonomous LAN. Routers that operate on the Internet backbone are exterior routers Between interior and exterior routers are border routers (or gateway routers)
Routers (continued) Routers may use one of two methods for directing data on the network: static or dynamic routing Static routing is a technique in which a network administrator programs a router to use specific paths between nodes Dynamic routing, on the other hand, automatically calculates the best path between two nodes and accumulates this information in a routing table By default,when a router is added to a network, routing protocols update its routing tables
Routers (continued) Routing Protocols: RIP, OSPF, EIGRP, and BGP Best path refers to the most efficient route from one node on a network to another To determine the best path, routers communicate with each other through routing protocols In addition to its ability to find the best path, a routing protocol can be characterized according to its router convergence time, the time it takes for a router to recognize a best path in the event of a change or network outage
Routers (continued) RIP (Routing Information Protocol) for IP and IPX—The oldest routing protocol, RIP, which is still widely used, factors in only the number of hops between nodes when determining a path from one point to another Routers using RIP broadcast their routing tables every 30 seconds to other routers, whether or not the tables have changed One advantage to RIP is its stability If the number of hops in a path exceeds 15, the network destination is considered unreachable
Routers (continued) OSPF (Open Shortest Path First) for IP—This routing protocol, also used on interior or border routers, makes up for some of the limitations of RIP and can coexist with RIP on a network OSPF imposes no hop limits on a transmission path In OSPF, each router maintains a database of the other routers’ links, and if notice is received indicating the failure of a given link, the router can rapidly compute an alternate path It is commonly used on LANs that rely on a mix of routers from different manufacturers
Routers (continued) EIGRP (Enhanced Interior Gateway Routing Protocol) for IP, IPX, and AppleTalk It has a fast convergence time and a low network overhead, and is easier to configure and less CPU-intensive than OSPF EIGRP also offers the benefits of supporting multiple protocols and limiting unnecessary network traffic between routers It accommodates very large and heterogeneous networks, but is only supported by Cisco routers
Routers (continued) BGP (Border Gateway Protocol) for IP—BGP is the routing protocol of Internet backbones and is not used to route between nodes on an autonomous LAN The most complex of the routing protocols
Routers (continued) Brouters The networking industry has adopted the term bridge router, or brouter, to describe routers that take on some characteristics of bridges The advantage of crossing a router with a bridge is that you can forward nonroutable protocols, such as NetBEUI, plus connect multiple network types through one device
Gateways In broad terms, they are combinations of networking hardware and software that connect two dissimilar kind of networks Gateways actually repackage information so that it can be read by another system
Gateways Gateways can reside on servers, microcomputers, connectivity devices (such as routers), or mainframes They transmit data more slowly than bridges or routers because of the complex translations they conduct Slow, gateways have the potential to cause extreme network congestion
Gateways (continued) Popular types of gateways E-mail gateway—A gateway that translates messages from one type of e-mail system to another IBM host gateway—A gateway that establishes and manages communication between a PC and an IBM mainframe computer Internet gateway—A gateway that allows and manages access between LANs and the Internet
Gateways (continued) Popular types of gateways (continued) LAN gateway—A gateway that allows segments of a LAN running different protocols or different network models to communicate with each other Voice/data gateway—A gateway that connects the part of a network that handles data traffic with the part of a network that handles voice traffic Firewall—A gateway that selectively blocks or filters traffic between networks
Summary Functions of LAN connectivity hardware Install and configure a network adapter cards Identify problems associated with connectivity hardware
Summary (continued) Describe the factors involved in choosing a network adapter, hub, switch, or router Discuss the functions of repeaters, hubs, bridges, switches, routers, and gateways, and the OSI Model layers at which they operate Describe the uses and types of routing protocols

More Related Content

PPT
Networking hardware-objectives-identify-major-hardware4986
PDF
Networking devices
PPTX
Interconnecting devies
PPT
Networking and Internetworking Devices
PDF
Study of Network Devices
PPTX
COMPLETE COMPUTER NETWORK
PPT
1 networking devices 2014
PPTX
Network switch and switching Jenil patel semcom college
Networking hardware-objectives-identify-major-hardware4986
Networking devices
Interconnecting devies
Networking and Internetworking Devices
Study of Network Devices
COMPLETE COMPUTER NETWORK
1 networking devices 2014
Network switch and switching Jenil patel semcom college

What's hot (20)

DOCX
Network switches, functions & role in networks
PPTX
Networking devices
PPTX
Network Management Devices
PPT
Network devices
DOC
Hubs vs switches vs routers
DOCX
Networking Devices & Its Advantages and Disadvantages
PPTX
Internetworking device
PPT
Networking devices
PPT
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
PPTX
Basics of Gateway By Naveen Karn
PPT
Internetworking devices
PPTX
Networking devices
PPTX
Connecting devices
PPTX
Networking and internetworking devices
PPTX
Network interface card(nic)
PPTX
Neetika (ppt)
PPTX
Networking devices
PPT
Internetworking devices(networking)
DOCX
Report on Router
Network switches, functions & role in networks
Networking devices
Network Management Devices
Network devices
Hubs vs switches vs routers
Networking Devices & Its Advantages and Disadvantages
Internetworking device
Networking devices
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
Basics of Gateway By Naveen Karn
Internetworking devices
Networking devices
Connecting devices
Networking and internetworking devices
Network interface card(nic)
Neetika (ppt)
Networking devices
Internetworking devices(networking)
Report on Router
Ad

Viewers also liked (20)

PPT
Ch04 system administration
PPT
Ch20 system administration
PPT
Chapter11 -- networking with tcpip and the internet
PPT
Ch18 system administration
PPT
Chapter10 -- netware-based networking
PPT
Ch24 system administration
PPT
Chapter13 -- ensuring integrity and availability
PPT
Ch10 system administration
PPT
Ch08 system administration
PPT
Drink Water To Your Health
PPT
Ramadan 2008
PPT
Ch09 system administration
PPT
Ch16 system administration
PPT
Ch14 system administration
Ch04 system administration
Ch20 system administration
Chapter11 -- networking with tcpip and the internet
Ch18 system administration
Chapter10 -- netware-based networking
Ch24 system administration
Chapter13 -- ensuring integrity and availability
Ch10 system administration
Ch08 system administration
Drink Water To Your Health
Ramadan 2008
Ch09 system administration
Ch16 system administration
Ch14 system administration
Ad

Similar to Chapter05 -- networking hardware (20)

PDF
Introduction to computing ITC_lec_2.pdf
PDF
Network Interface Card (NIC) AND NETWORKING DEVICES
PPT
Itc lec 3 Ip cycle , system unit, interface
PPT
Ch 06
PPT
W 10 introduction to network
PDF
Geek speak it terminology
PDF
Sample elements of computer networking
PPT
Introduction to Computer Networks Lecture slides ppt
PPT
Networking
PPT
Class_notes_InternetTechnology
PPT
Wa ns and routers
DOCX
Motherboard components and their functions
PPTX
Peripherals
PPT
13. Computer Systems Input And Output Architecture
PPTX
networking devices -161021181705452555
PPTX
Computer summary
PPTX
Basic networking in power point by suprabha
PDF
Introduction to networking
PPTX
fundamentalofcomputer 2.pptx
Introduction to computing ITC_lec_2.pdf
Network Interface Card (NIC) AND NETWORKING DEVICES
Itc lec 3 Ip cycle , system unit, interface
Ch 06
W 10 introduction to network
Geek speak it terminology
Sample elements of computer networking
Introduction to Computer Networks Lecture slides ppt
Networking
Class_notes_InternetTechnology
Wa ns and routers
Motherboard components and their functions
Peripherals
13. Computer Systems Input And Output Architecture
networking devices -161021181705452555
Computer summary
Basic networking in power point by suprabha
Introduction to networking
fundamentalofcomputer 2.pptx

More from Raja Waseem Akhtar (20)

PPS
The prophet's wives
PPS
God is Great
PPS
Namaz ka tareeqa
PPS
Aayat ul qursi
PPT
Indiansoldiers
PPS
2ªwwii how did it fought
PPT
Fun with EMC2
PPS
Jerusalm at night.pps
PPS
From the sky
PPS
Discover the discovery
PPT
Solaris servers sec
PPT
The OSI - seven layers
PPT
Chapter16 - the internet and its tools
PPT
Chapter15 -- implementing and managing networks
PPT
Chapter14 -- networking security
PPT
Chapter12 -- troubleshooting networking problems
PPT
Chapter09 -- networking with unix and linux
PPT
Chapter08 -- network operating systems and windows server 2003-based networking
PPT
Chapter07 -- wa ns and remote connectivity
PPT
Chapter06 -- topologies and access methods
The prophet's wives
God is Great
Namaz ka tareeqa
Aayat ul qursi
Indiansoldiers
2ªwwii how did it fought
Fun with EMC2
Jerusalm at night.pps
From the sky
Discover the discovery
Solaris servers sec
The OSI - seven layers
Chapter16 - the internet and its tools
Chapter15 -- implementing and managing networks
Chapter14 -- networking security
Chapter12 -- troubleshooting networking problems
Chapter09 -- networking with unix and linux
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter07 -- wa ns and remote connectivity
Chapter06 -- topologies and access methods

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation theory and applications.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Assigned Numbers - 2025 - Bluetooth® Document
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation theory and applications.pdf
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25-Week II
A comparative analysis of optical character recognition models for extracting...
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Advanced methodologies resolving dimensionality complications for autism neur...
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Assigned Numbers - 2025 - Bluetooth® Document

Chapter05 -- networking hardware

  • 1. Chapter 5: Networking Hardware Network+ Guide to Networks
  • 2. Objectives Identify the functions of LAN connectivity hardware Install and configure a network adapter (network interface card) Identify problems associated with connectivity hardware
  • 3. Objectives (continued) Describe the factors involved in choosing a network adapter, hub, switch, or router Discuss the functions of repeaters, hubs, bridges, switches, routers, and gateways, and the OSI Model layers at which they operate Describe the uses and types of routing protocols
  • 4. Network Adapters Also called network interface cards, NICs, or network cards Connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media NICs belong to both the Physical layer and Data Link layer of the OSI Model, because they apply data signals to the wire and assemble or disassemble data frames
  • 5. Network Adapters (continued) Types of Network Adapters Expansion Board Network Adapters A circuit board used to connect a device to the system board (the main circuit board that controls a computer, also known as a motherboard) Expansion boards connect to the system board through expansion slots, which are openings with multiple electrical contacts into which the expansion board can be inserted
  • 6. Network Adapters (continued) The circuit, or signaling pathway, used by the system board to transmit data to the computer’s components is the computer’s bus The capacity of a bus is defined principally by the width of its data path (expressed in bits) and its clock speed (expressed in MHz) A data path size equals the number of bits that it can transmit in parallel at any given time
  • 7. Network Adapters (continued) PCI (Peripheral Component Interconnect) is a 32- or 64-bit bus with a 33- or 66-MHz clock speed whose maximum data transfer rate is 264 MBps The most popular expansion board NIC is one that uses a PCI bus
  • 8. Network Adapters (continued) Characterized by a shorter connector length and a much faster data transmission capability than previous bus types (such as ISA or EISA) PCI adapters work within both PCs and Macintosh computers, allowing an organization to standardize on one type of NIC for use with all of its workstations
  • 9. Network Adapters (continued) A newer version of the PCI standard is PCI Express, which specifies a 64-bit bus with a 133-MHz clock speed capable of transferring data at up to 500 MBps in full-duplex transmission More efficient data transfer, support for quality of service distinctions, error reporting and handling, and compatibility with the current PCI software Designed to fit into PCs that currently have older PCI slots
  • 10. Network Adapters (continued) Externally Attached Network Adapters USB (universal serial bus), PCMCIA (Personal Computer Memory Card International Association), or CompactFlash slots are used to connect network adapters One advantage to externally attached network adapters is their simple installation The first standard PCMCIA-standard adapter to be released, called PC Card, specified a 16-bit interface running at 8 MHz
  • 11. Network Adapters (continued) USB (universal serial bus) port is a standard interface used to connect multiple type of peripherals, including modems, mice, audio players, and network adapters USB adapters may follow one of two USB standards: USB 1.1 or USB 2.0 The primary difference between the two standards is speed The USB 1.1 standard has a maximum data transfer rate of 12 Mbps and the 2.0 standard can reach 480 Mbps
  • 12. Network Adapters (continued) Compact Flash as an ultra-small removable data and input/output device that would connect to many kinds of peripherals Compact Flash slots can also be used to connect to a network Compact Flash network adapters are most likely to be found connecting devices too small to handle PCMCIA slots
  • 13. Network Adapters (continued) Wireless Network Adapters use an antenna (either internal or external) to exchange signals with a base station transceiver or another wireless NIC One disadvantage to using wireless network adapters is that currently they are somewhat more expensive than wire-bound network adapters
  • 14. Network Adapters (continued) Installing Network Adapters Firmware, a set of data or instructions that has been saved to a read-only memory (ROM) chip (which is on the network adapter) Data can be erased or changed by applying electrical charges to the chip (via the software program), this particular type of ROM is called EEPROM (electrically erasable programmable read-only memory)
  • 15. Network Adapters (continued) Installing and Configuring Network Adapter Software A device driver (sometimes called, simply, a driver) is software that enables an attached device to communicate with the computer’s operating system Most operating systems come with a multitude of built-in device drivers Each time a computer boots up, the device drivers for all its connected peripherals are loaded into RAM so that the computer can communicate with those devices at any time
  • 16. Network Adapters (continued) Interpreting LED Indicators Most modern NICs have LEDs that indicate whether or not they’re communicating with the network The only way to know for certain what your NIC’s LEDs are trying to tell you is to read the documentation Your NIC may have one or more of the following lights, and they may or may not be labeled: ACT, LNK, TX or RX
  • 17. Network Adapters (continued) IRQ (Interrupt Request) IRQ is a message to the computer that instructs it to stop what it is doing and pay attention to something else An interrupt is the circuit board wire over which a device issues voltage to signal this request Each interrupt must have a unique IRQ number, a number that uniquely identifies that component to the main bus
  • 18. Network Adapters (continued) If two devices attempt to use the same interrupt, resource conflicts and performance problems will result If IRQ conflicts do occur, you must reassign a device’s IRQ Network adapter IRQs can also be changed through the adapter’s EEPROM configuration utility or through the computer’s CMOS configuration utility
  • 19. Network Adapters (continued) CMOS (complementary metal oxide semiconductor) is a type of microchip that requires very little energy to operate In a PC, the CMOS stores settings pertaining to a computer’s devices These settings are saved even after you turn off a PC because the CMOS is powered by a tiny battery in your computer
  • 20. Network Adapters (continued) Information saved in CMOS is used by the computer’s BIOS (basic input/output system) The BIOS is a simple set of instructions that enables a computer to initially recognize its hardware
  • 21. Network Adapters (continued) Memory Range The memory range indicates, in hexadecimal notation, the area of memory that the network adapter and CPU will use for exchanging, or buffering, data Some memory ranges are reserved for specific devices—most notably, the system board Reserved address ranges should never be selected for new devices
  • 22. Network Adapters (continued) Memory range settings are less likely to cause resource conflicts than IRQ settings, mainly because there are more available memory ranges than IRQs
  • 23. Network Adapters (continued) Base I/O Port The base I/O port setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the network adapter and the CPU A device’s base I/O port cannot be used by any other device
  • 24. Network Adapters (continued) Firmware Settings Transmission characteristics are held in the adapter’s firmware Network adapter configuration utilities allow you to perform diagnostics In order to perform the entire group of the diagnostic tests on the NIC’s utility disk, you must have a loopback plug
  • 25. Network Adapters (continued) A loopback plug (also called a loopback adapter) is a connector that plugs into a port and crosses over the transmit line to the receive line so that outgoing signals can be redirected into the computer for testing
  • 26. Network Adapters (continued) Choosing the Right Network Adapter compatibility with your existing system must match the network’s bus type, access method, connector types, and transmission speed correct drivers available
  • 27. Repeaters Repeaters are the simplest type of connectivity devices that regenerate a digital signal Repeaters operate in the Physical layer of the OSI Model A repeater contains one input port and one output port, so it is capable of receiving and repeating only the data stream
  • 28. Repeaters (continued) Repeaters are suited only to bus topology networks The advantage to using a repeater is that it allows you to extend a network inexpensively
  • 29. Hubs A hub is a repeater with more than one output port A simple hub may contain multiple ports connecting a group of computers in a peer-to-peer fashion, accepting and repeating signals from each node
  • 30. Hubs (continued) A slightly more sophisticated hub may contain multiple ports for devices and one port that connects to a network’s backbone On Token Ring networks, hubs are called Multistation Access Units (MAUs)
  • 31. Hubs (continued) The elements shared by most hubs are described in the following list: Ports—Receptacles where patch cables connect workstations or other devices to the hub Uplink port—The receptacle used to connect one hub to another hub in a daisy-chain or hierarchical fashion Link LED—The light on a port that indicates whether it is in use
  • 32. Hubs (continued) Collision LED (Ethernet hubs only)—The light that roughly indicates collisions —when one frame interferes with another’s transmission—by blinking, usually orange Status LED—The light that indicates that the hub is receiving power Power supply—The device that provides power to the hub Ventilation fan—A device used to cool a device’s internal electronics
  • 33. Hubs (continued) Types of Hubs Standalone hubs, as their name implies, are hubs that serve a group of computers that are isolated from the rest of the network or that form their own small network Stackable hubs resemble standalone hubs, but they are physically designed to be linked with other hubs in a single telecommunications closet
  • 34. Hubs (continued) Stackable hubs linked together logically represent one large hub to the network A great benefit to using stackable hubs is that your network or workgroup does not depend on a single hub, which could present a single point of failure Stackable hubs may support a number of different media connectors and transmission speeds and may come with or without special processing features
  • 35. Hubs (continued) The simplest type of hubs—known as passive hubs—do nothing but repeat signals Intelligent hubs are also called managed hubs, because they can be managed from anywhere on the network
  • 36. Bridges Bridges are devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame’s MAC address They have a single input and a single output port
  • 37. Bridges (continued) They can interpret physical addressing information Bridges are protocol-independent Bridges can move data more rapidly than traditional routers
  • 38. Bridges (continued) Bridges take longer to transmit data than either repeaters or hubs, because bridges actually analyze each packet Inserting a bridge into a network, you can add length beyond the maximum limits that apply to segments
  • 39. Bridges (continued) Bridges can help improve network performance because they can be programmed to filter out certain types of frames As nodes transmit data through the bridge, the bridge establishes a filtering database (also known as a forwarding table) of known MAC addresses and their locations on the network
  • 40. Switches Switches are connectivity devices that subdivide a network into smaller logical pieces, or segments Switches interpret MAC address information Most switches have an internal processor, an operating system, memory, and several ports that enable other nodes to connect to it Because they have multiple ports, switches can make better use of limited bandwidth and prove more cost-efficient than bridges
  • 41. Switches (continued) A collision domain is a logically or physically distinct Ethernet network segment on which all participating devices must detect and accommodate data collisions Switches provide at least two advantages: better security and better performance
  • 42. Switches (continued) Switches provide separate channels for (potentially) every device, performance stands to gain Switches can become overwhelmed by continuous, heavy traffic and then cannot prevent data loss
  • 43. Switches (continued) Switches differ in the method of switching they use—namely, cut-through mode or store and forward mode A switch running in cut-through mode will read a frame’s header and decide where to forward the data before it receives the entire packet
  • 44. Switches (continued) Cut-through switches can detect runts, or erroneously shortened packets Cut-through switches cannot detect corrupt packets The most significant advantage of the cut-through mode is its speed
  • 45. Switches (continued) In store and forward mode, a switch reads the entire data frame into its memory and checks it for accuracy before transmitting the information Store and forward switches transmit data more accurately They are more appropriate for larger LAN environments, because they do not propagate data errors They can also transfer data between segments running different transmission speeds
  • 46. Switches (continued) Using Switches to Create VLANs Switches can create virtual local area networks (VLANs), logically separate networks within networks, by grouping a number of ports into a broadcast domain A broadcast domain is a combination of ports that make up a Layer 2 segment In contrast to a collision domain, ports in the same broadcast domain do not share a single channel
  • 47. Switches (continued) VLANs can be designed with flexibility They can include ports from more than one switch or segment On a wireless network,VLANs allow mobile clients to move from one access point’s range to another without losing network functionality or having to re-authenticate with the network VLANs are created by properly configuring a switch’s software
  • 48. Switches (continued) Reasons for using VLANs include: Separating groups of users who need special security or network functions Isolating connections with heavy or unpredictable traffic patterns Identifying groups of devices whose data should be given priority handling Containing groups of devices that rely on legacy protocols incompatible with the majority of the network’s traffic
  • 49. Switches (continued) Higher-Layer Switches A switch capable of interpreting Layer 3 data is called a Layer 3 switch (and sometimes called a routing switch) A switch capable of interpreting Layer 4 data is called a Layer 4 switch These higher-layer switches may also be called routing switches or application switches can cost three times more than Layer 2 switches, and are typically used as part of a network’s backbone
  • 50. Routers A router is a multiport connectivity device that directs data between nodes on a network Routers can integrate LANs and WANs running at different transmission speeds and using a variety of protocols Routers are finding niches in specialized applications such as linking large Internet nodes or completing digitized telephone calls
  • 51. Routers (continued) Routers can also determine the shortest, fastest path between two nodes A typical router has an internal processor, an operating system, memory, input and output jacks for different types of network connectors (depending on the network type), and, usually, a management console interface A router with multiple slots that can hold different interface cards or other devices is called a modular router
  • 52. Routers (continued) A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as an interior router Exterior routers direct data between nodes external to a given autonomous LAN. Routers that operate on the Internet backbone are exterior routers Between interior and exterior routers are border routers (or gateway routers)
  • 53. Routers (continued) Routers may use one of two methods for directing data on the network: static or dynamic routing Static routing is a technique in which a network administrator programs a router to use specific paths between nodes Dynamic routing, on the other hand, automatically calculates the best path between two nodes and accumulates this information in a routing table By default,when a router is added to a network, routing protocols update its routing tables
  • 54. Routers (continued) Routing Protocols: RIP, OSPF, EIGRP, and BGP Best path refers to the most efficient route from one node on a network to another To determine the best path, routers communicate with each other through routing protocols In addition to its ability to find the best path, a routing protocol can be characterized according to its router convergence time, the time it takes for a router to recognize a best path in the event of a change or network outage
  • 55. Routers (continued) RIP (Routing Information Protocol) for IP and IPX—The oldest routing protocol, RIP, which is still widely used, factors in only the number of hops between nodes when determining a path from one point to another Routers using RIP broadcast their routing tables every 30 seconds to other routers, whether or not the tables have changed One advantage to RIP is its stability If the number of hops in a path exceeds 15, the network destination is considered unreachable
  • 56. Routers (continued) OSPF (Open Shortest Path First) for IP—This routing protocol, also used on interior or border routers, makes up for some of the limitations of RIP and can coexist with RIP on a network OSPF imposes no hop limits on a transmission path In OSPF, each router maintains a database of the other routers’ links, and if notice is received indicating the failure of a given link, the router can rapidly compute an alternate path It is commonly used on LANs that rely on a mix of routers from different manufacturers
  • 57. Routers (continued) EIGRP (Enhanced Interior Gateway Routing Protocol) for IP, IPX, and AppleTalk It has a fast convergence time and a low network overhead, and is easier to configure and less CPU-intensive than OSPF EIGRP also offers the benefits of supporting multiple protocols and limiting unnecessary network traffic between routers It accommodates very large and heterogeneous networks, but is only supported by Cisco routers
  • 58. Routers (continued) BGP (Border Gateway Protocol) for IP—BGP is the routing protocol of Internet backbones and is not used to route between nodes on an autonomous LAN The most complex of the routing protocols
  • 59. Routers (continued) Brouters The networking industry has adopted the term bridge router, or brouter, to describe routers that take on some characteristics of bridges The advantage of crossing a router with a bridge is that you can forward nonroutable protocols, such as NetBEUI, plus connect multiple network types through one device
  • 60. Gateways In broad terms, they are combinations of networking hardware and software that connect two dissimilar kind of networks Gateways actually repackage information so that it can be read by another system
  • 61. Gateways Gateways can reside on servers, microcomputers, connectivity devices (such as routers), or mainframes They transmit data more slowly than bridges or routers because of the complex translations they conduct Slow, gateways have the potential to cause extreme network congestion
  • 62. Gateways (continued) Popular types of gateways E-mail gateway—A gateway that translates messages from one type of e-mail system to another IBM host gateway—A gateway that establishes and manages communication between a PC and an IBM mainframe computer Internet gateway—A gateway that allows and manages access between LANs and the Internet
  • 63. Gateways (continued) Popular types of gateways (continued) LAN gateway—A gateway that allows segments of a LAN running different protocols or different network models to communicate with each other Voice/data gateway—A gateway that connects the part of a network that handles data traffic with the part of a network that handles voice traffic Firewall—A gateway that selectively blocks or filters traffic between networks
  • 64. Summary Functions of LAN connectivity hardware Install and configure a network adapter cards Identify problems associated with connectivity hardware
  • 65. Summary (continued) Describe the factors involved in choosing a network adapter, hub, switch, or router Discuss the functions of repeaters, hubs, bridges, switches, routers, and gateways, and the OSI Model layers at which they operate Describe the uses and types of routing protocols