Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Chapter Overview Network Interface Cards

INDUSTRIAL INSTRUMETATION AND


• The network interface card (NIC), or network card, is a
CONTROL SYSTEMS
❑ Network Interface Cards device installed on the system that is responsible for
Lecture 10. Network ❑ Hubs, MAUs and Repeaters
sending and receiving data onto the network.
Components ❑ Bridges and Switches
• The network card also is known as a network adapter.
❑ Routers and Brouters
❑ Gateways and Security Devices • Network cards that are installed on the computer as an
❑ Other Network Devices
Assoc. Prof. Dr. BUI Dang Thanh add-on can be installed into the system by inserting the
School of Electronic & Electrical Engineering,
Hanoi University of Science and Technology card into the expansion bus of the system or by plugging
Dai Co Viet road, Ha Noi, Viet Nam
in a USB device.

6/5/2023 Buidangthanh.3i@gmail.com 1 6/5/2023 Buidangthanh.3i@gmail.com 2 6/5/2023 Buidangthanh.3i@gmail.com 3

1 2 3

1
Network Interface Cards Network Interface Cards Network Interface Cards
• Transceivers (Cont.) • Transceivers (Cont.)
• Transceivers: • Onboard transceivers: • External transceivers:
– Are built onto the network interface card. – The actual media connection is made external to the network
• A transceiver is that portion of the network interface that – With these transceivers, the media connector is built right on card using a small device that attaches to the NIC via an
the back of the NIC. extension cable.
actually transmits and receives electrical signals across the – These connections use an Attachment Unit Interface (AUI)
– Common examples of this type include RJ-45 receptacles
for twisted-pair cable and BNC connectors for thinnet connector, also called a Digital-Intel-Xerox (DIX) connector,
transmission media. on the back of the network card.
coaxial cable
• When the signal is traveling along the length of the wire, – The types of transceivers and media that can be served by a
NIC determine the appropriate connector. Each media type
the transceiver picks the signal up and verifies that the data has a typical connector type or connection method.

is destined for the local system.

• There are two types of transceivers: onboard and external


RJ-45 and BNC onboard transceivers on a network card
An AUI connector on the back of a network switch
6/5/2023 Buidangthanh.3i@gmail.com 4 6/5/2023 Buidangthanh.3i@gmail.com 5 6/5/2023 Buidangthanh.3i@gmail.com 6

4 5 6

2
Network Interface Cards Network Interface Cards Network Interface Cards
• Transceivers (Cont.) • Transceivers (Cont.) • Transceivers (Cont.)
• Thicknet Coax: • Twisted-Pair Wiring: • Transceiver Configuration:
– Uses a connection method that typically involves an external –The typical connector for a twisted-pair connection is called an RJ-45 – A number of network cards have multiple types of
transceiver connected to the adapter’s AUI port. connector.
connectors on the back of the card (called combo cards in
–An RJ-45 patch cable can be plugged directly into the back of the
– This external transceiver has a connection called a vampire network adapter. The patch cable usually runs to a wall receptacle, this case) to allow you to use different types of cabling to
tap that attaches to the media by drilling a hole in the cable which is wired back to a patch panel and ultimately back to a wiring connect the system to the network.
using a special drilling jig that controls the depth of the hole. hub. – During configuration, the different transceivers can be
• Fiber-optic Cabling:
• Thinnet Coax: referred to in the following ways:
–Fiber-optic adapters generally have two connectors, one each for » DIX or AUI: The card uses an external thicknet transceiver.
– Thinnet coax can be attached directly to a network adapter if incoming and outgoing fiber cables.
an onboard transceiver is used. » Coax, 10Base2, or BNC : The card has an onboard thinnet
–The mechanical connectors that join the cable, called ST connectors, Ethernet connector known as a BNC connector.
– In this case, a connector called a Barrel Connector (BNC) on are designed to pass light seamlessly across the joined fiber
» TP, TX, UTP, 10BaseT, or 100BaseT : The card has an onboard RJ-
the network card attaches to a T-connector. segments.
45 connector.
–In many situations, fiber-optic cabling is used to connect high-speed
– The T-connector has a female fitting that attaches to the computers and provide a high-speed backbone to which slower LANs – Another setting you may want to configure on your network
card, as well as two additional male fittings that attach to are attached. card is the transmission method of either simplex, half
cable segments or a terminator. duplex, or full duplex.
6/5/2023 Buidangthanh.3i@gmail.com 7 6/5/2023 Buidangthanh.3i@gmail.com 8 6/5/2023 Buidangthanh.3i@gmail.com 9

7 8 9

3
Network Interface Cards Network Interface Cards Hubs, MAUs, and Repeaters
• Hubs:
• MAC Address:
• Hubs are one of the most important components of a
• Each network card has a unique address that is burned into the
network because they act as a central point for all
card by its manufacturer. • Troubleshooting Network Cards: network devices to connect to.
• This unique address, known as a MAC address, is used in the • Testing.
header of the packet for the source and destination addresses of • Passive Hubs:
the packet. • Network Card Diagnostics • The function of a passive hub is simply to receive data from
• The MAC address is a 48-bit address displayed in a • Loopback Test. one port of the hub and send it out to the other ports.
hexadecimal format that looks similar to 00-90-4B-4C-C1-59 or • Driver. • For example, an eight-port hub receives data from port 3
sometimes 00:90:4B:4C:C1:59. and then resends that data to ports 1, 2, 4, 5, 6, 7 and 8.
• The MAC address is made up of 12 characters and is in • A passive hub contains no power source or electrical
hexadecimal format. The first half of the MAC address is the components, there is no signal processing and there is no
manufacturer’s address, while the last half of the address is the regenerating of the signal to ensure that it is readable at the
unique address assigned to that network card by the destination.
manufacturer. • A passive hub simply attaches the ports internally and
enables communication to flow through the network
6/5/2023 Buidangthanh.3i@gmail.com 10 6/5/2023 Buidangthanh.3i@gmail.com 11 6/5/2023 Buidangthanh.3i@gmail.com 12

10 11 12

4
Hubs, MAUs, and Repeaters Hubs, MAUs, and Repeaters Hubs, MAUs, and Repeaters
• Hubs (Cont.) • Repeaters:
• Multistation Access Units (MAUs):
• Active Hubs: • One of the pitfalls of networking environments is that the electrical
• A multistation access unit (MAU) is a device to which multiple
• An active hub provides the same functionality as a passive hub with an signal that is traveling the wire is weakened over distance as a result
additional feature. workstations are connected in order to communicate on a Token
Ring network. of outside interference.
• Active hubs rebuild (regenerate) the data before sending it to all of the
destination ports on the hub. • A MAU is a hub-type device for Token Ring networks with some • if two systems are too far from one another, the signal is so weak that
features that make it a little bit different from a hub by the time it reaches the other side it is unreadable. This is where
• Using active hubs can increase the length of your network, because
although the signal weakens with distance, when the active hub receives repeaters come in.
• The first difference you will notice with MAUs over hubs is that a
the signal, it rebuilds the data, allowing it once more to go a greater
MAU does not have collision indicators on it because you can’t • If your network layout exceeds the normal specifications of the cable,
distance. you can use repeaters to allow the signal to travel the distance by
• An active hub has a power source and built-in repeaters to boost the have collisions on a Token Ring network.
placing the repeaters at different points in the network.
signal.
• Hybrid Hubs:
• A hybrid hub is a hub that can use many different types of cables in
addition to UTP cabling.
• A hybrid hub usually is cabled using thinnet or thicknet Ethernet along
with popular cable types such as twisted-pair cabling.

6/5/2023 Buidangthanh.3i@gmail.com 13 6/5/2023 Buidangthanh.3i@gmail.com 14 6/5/2023 Buidangthanh.3i@gmail.com 15

13 14 15

5
Hubs, MAUs, and Repeaters Bridges and Switches Bridges and Switches
• Repeaters: • Bridges: • Bridges:
The function of a repeater can be considered as belonging to the lower part • A bridge is a network connectivity device that is used to break In comparison to the OSI model, a bridge operates at the Logical Link Control
of the physical layer when compared to the OSI model. A repeater only the network down into multiple network segments. (LLC) layer, which is the upper part of Layer 2. Therefore, it implements
connects two segments of the same communication system, using the same • A bridge runs at layer 2, the data link layer, and is used to filter protocols below this layer for both network segments in order to facilitate
protocol and identical transmission medium. traffic by only forwarding traffic to the destination network the transmission of data packets between them.
segment.

Repeater in the OSI model Network with a bridge Bridge in the OSI model

6/5/2023 Buidangthanh.3i@gmail.com 16 6/5/2023 Buidangthanh.3i@gmail.com 17 6/5/2023 Buidangthanh.3i@gmail.com 18

16 17 18

6
Bridges and Switches Bridges and Switches Bridges and Switches

• Switches:
• Switches, also known as switching hubs, have become an
• Switches (Cont.)
• VLANs: Virtual LANs are a feature of special switches, known as
• Switches (Cont.)
increasingly important part of our networking today, because
when working with hubs, a hub sends the data to all ports on the managed switches, which allow the administrator to group ports • Switch features:
hub. on a switch to a “virtual LAN.” • Spanning Tree Protocol (STP)
• If you have a large network structure, this means that you have • When a port is configured for a particular VLAN, it is unable to • ISL and 802.1Q
probably linked a few hubs together, and when data is sent from communicate with systems that are not on that VLAN without • Trunking
one system to another, all computers see the traffic. the use of a routing device such as a router.
• Port Mirroring
• This leads to a lot of network traffic, which eventually slows • The purpose of a VLAN is to cut down on broadcast traffic
through the use of what are known as broadcast domains. • Port authentication
network performance.
• Different types of switches: • Content switch
• Layer-1 Switch
• Layer-2 Switch
Switches • Layer-3 Switch

6/5/2023 Buidangthanh.3i@gmail.com 19 6/5/2023 Buidangthanh.3i@gmail.com 20 6/5/2023 Buidangthanh.3i@gmail.com 21

19 20 21

7
Routers and Brouters Routers and Brouters Routers and Brouters
• Routers: • Routers:
• Routers:
For fieldbus networks, Layer 3 is largely insignificant, so routers only play a
• Routers are layer-3 devices and are responsible for routing or sending
significant role in more advanced network systems such as local area
data from one network to another.
networks (LANs) or wide area networks (WANs). • A router will have multiple network interfaces.
• Routers are typically used to connect the LAN to a WAN environment Cisco 1604 router with LAN and WAN interfaces
by having a network interface and a WAN interface connecting to each
type of network.
• Routers work with layer-3 addresses.
• Routers use a routing table stored in memory on the router to
determine how to reach a system on a destination network
Routers connecting LANs to a WAN
Router in the OSI model
6/5/2023 Buidangthanh.3i@gmail.com 22 6/5/2023 Buidangthanh.3i@gmail.com 23 6/5/2023 Buidangthanh.3i@gmail.com 24

22 23 24

8
Routers and Brouters Gateways and Security Devices Gateways and Security Devices
• Gateways: • Gateways:
• Brouters: • A gateway is responsible for translating information Due to its operation principles at the application layer, a gateway enables
• A number of network environments use multiple from one format to another and can run at any layer of the integration of systems based on the seven-layer OSI architecture as well
network protocols on the network to support different the OSI model, depending on what information the as systems that do not adhere to this model.
network applications or services. gateway translates.
• A brouter is the combination of a bridge and a router, • A typical use of a gateway is to ensure that systems in
and it makes the decision whether it needs to bridge one environment can access information in another
the data or route the data according to the protocol environment
being used.
• If the protocol is a nonroutable protocol such as
NetBEUI, the data will be bridged. If the protocol is
TCP/IP or IPX/SPX, the routing features of the brouter
will be used.
A gateway translates data from one format to another
Gateway in the OSI model
6/5/2023 Buidangthanh.3i@gmail.com 25 6/5/2023 Buidangthanh.3i@gmail.com 26 6/5/2023 Buidangthanh.3i@gmail.com 27

25 26 27

9
Gateways and Security Devices Gateways and Security Devices Other Networking Devices
• Wireless Access Points:
• Intrusion Detection Systems: • Wireless Access Points (WAPs) are network devices that can be
• An Intrusion Detection System (IDS) is a security device that connected to the wired network to allow a wireless client to pass
• Firewalls: monitors system or network activity and then notifies the through to get access to the wired network and its resources.
• Firewalls are a networking component responsible for administrator of any suspicious activity. • A wireless access point also is known as a cell, which is a
protecting the network from outside intruders. • Intrusion detection systems are important devices that will device that transmits and receives radio frequencies between
complement other security devices such as firewalls. the PCs and network devices with wireless transmitters
• The firewall is designed to block specific types of traffic connected to them.
while allowing certain information to pass through. • The IDS is an important device because it will notify you not only
of suspicious activity against the firewall, but also of suspicious • The wireless access point
• The firewall administrator selectively chooses which activity inside the network. is connected to a physical
traffic can and cannot pass through the firewall. • Two types of intrusion detection systems: cable, which connects the
• Host based: intrusion detection systems monitor the local system for
suspicious activity.
WAP device to the rest of
• Network based: monitors network traffic for suspicious behavior.
the network.

A home router being used as a wireless access point

6/5/2023 Buidangthanh.3i@gmail.com 28 6/5/2023 Buidangthanh.3i@gmail.com 29 6/5/2023 Buidangthanh.3i@gmail.com 30

28 29 30

10
Other Networking Devices Other Networking Devices Other Networking Devices

• Wireless Access Points (Cont.) • CSU/DSU:


• There are other forms of networking devices beyond the typical • A channel service unit/data service unit is either one device or a
network card; for instance, modems can be used to pair of devices that allows an organization to get a very-high-
communicate with other systems across the public switched speed WAN connection from the telephone company, such as a • Wiring Distribution:
T1 or T3 link.
telephone network (PSTN). • Plenum vs nonplenum
• A wireless access point also is known as a cell, which is a • The CSU is used at the business end to get the connection to
the WAN, and the DSU may be used at the provider’s end to • Patch Panel
device that transmits and receives radio frequencies between
the PCs and network devices with wireless transmitters allow the CSU to connect. • Cross Connects, MDF and IDF
connected to them. • ISDN:
• Used to convert digital data from the PC to analog transmission • The Integrated Services Digital Network (ISDN) is a
so that the information can be transmitted over the analog communication standard for sending voice and data over normal
phone lines. telephone lines or digital telephone lines
• The modem on the receiving end is designed to convert the • Two popular types of ISDN connections: Basic rate interface
analog signal to a digital format readable by the system. (BRI) and Primary rate interface (PRI).

6/5/2023 Buidangthanh.3i@gmail.com 31 6/5/2023 Buidangthanh.3i@gmail.com 32 6/5/2023 Buidangthanh.3i@gmail.com 33

31 32 33

11
Thank you for your attention!

6/5/2023 Buidangthanh.3i@gmail.com 34

34

12

You might also like