Professional Documents
Culture Documents
Lecture 10 - Network Components
Lecture 10 - Network Components
1 2 3
1
Network Interface Cards Network Interface Cards Network Interface Cards
• Transceivers (Cont.) • Transceivers (Cont.)
• Transceivers: • Onboard transceivers: • External transceivers:
– Are built onto the network interface card. – The actual media connection is made external to the network
• A transceiver is that portion of the network interface that – With these transceivers, the media connector is built right on card using a small device that attaches to the NIC via an
the back of the NIC. extension cable.
actually transmits and receives electrical signals across the – These connections use an Attachment Unit Interface (AUI)
– Common examples of this type include RJ-45 receptacles
for twisted-pair cable and BNC connectors for thinnet connector, also called a Digital-Intel-Xerox (DIX) connector,
transmission media. on the back of the network card.
coaxial cable
• When the signal is traveling along the length of the wire, – The types of transceivers and media that can be served by a
NIC determine the appropriate connector. Each media type
the transceiver picks the signal up and verifies that the data has a typical connector type or connection method.
4 5 6
2
Network Interface Cards Network Interface Cards Network Interface Cards
• Transceivers (Cont.) • Transceivers (Cont.) • Transceivers (Cont.)
• Thicknet Coax: • Twisted-Pair Wiring: • Transceiver Configuration:
– Uses a connection method that typically involves an external –The typical connector for a twisted-pair connection is called an RJ-45 – A number of network cards have multiple types of
transceiver connected to the adapter’s AUI port. connector.
connectors on the back of the card (called combo cards in
–An RJ-45 patch cable can be plugged directly into the back of the
– This external transceiver has a connection called a vampire network adapter. The patch cable usually runs to a wall receptacle, this case) to allow you to use different types of cabling to
tap that attaches to the media by drilling a hole in the cable which is wired back to a patch panel and ultimately back to a wiring connect the system to the network.
using a special drilling jig that controls the depth of the hole. hub. – During configuration, the different transceivers can be
• Fiber-optic Cabling:
• Thinnet Coax: referred to in the following ways:
–Fiber-optic adapters generally have two connectors, one each for » DIX or AUI: The card uses an external thicknet transceiver.
– Thinnet coax can be attached directly to a network adapter if incoming and outgoing fiber cables.
an onboard transceiver is used. » Coax, 10Base2, or BNC : The card has an onboard thinnet
–The mechanical connectors that join the cable, called ST connectors, Ethernet connector known as a BNC connector.
– In this case, a connector called a Barrel Connector (BNC) on are designed to pass light seamlessly across the joined fiber
» TP, TX, UTP, 10BaseT, or 100BaseT : The card has an onboard RJ-
the network card attaches to a T-connector. segments.
45 connector.
–In many situations, fiber-optic cabling is used to connect high-speed
– The T-connector has a female fitting that attaches to the computers and provide a high-speed backbone to which slower LANs – Another setting you may want to configure on your network
card, as well as two additional male fittings that attach to are attached. card is the transmission method of either simplex, half
cable segments or a terminator. duplex, or full duplex.
6/5/2023 Buidangthanh.3i@gmail.com 7 6/5/2023 Buidangthanh.3i@gmail.com 8 6/5/2023 Buidangthanh.3i@gmail.com 9
7 8 9
3
Network Interface Cards Network Interface Cards Hubs, MAUs, and Repeaters
• Hubs:
• MAC Address:
• Hubs are one of the most important components of a
• Each network card has a unique address that is burned into the
network because they act as a central point for all
card by its manufacturer. • Troubleshooting Network Cards: network devices to connect to.
• This unique address, known as a MAC address, is used in the • Testing.
header of the packet for the source and destination addresses of • Passive Hubs:
the packet. • Network Card Diagnostics • The function of a passive hub is simply to receive data from
• The MAC address is a 48-bit address displayed in a • Loopback Test. one port of the hub and send it out to the other ports.
hexadecimal format that looks similar to 00-90-4B-4C-C1-59 or • Driver. • For example, an eight-port hub receives data from port 3
sometimes 00:90:4B:4C:C1:59. and then resends that data to ports 1, 2, 4, 5, 6, 7 and 8.
• The MAC address is made up of 12 characters and is in • A passive hub contains no power source or electrical
hexadecimal format. The first half of the MAC address is the components, there is no signal processing and there is no
manufacturer’s address, while the last half of the address is the regenerating of the signal to ensure that it is readable at the
unique address assigned to that network card by the destination.
manufacturer. • A passive hub simply attaches the ports internally and
enables communication to flow through the network
6/5/2023 Buidangthanh.3i@gmail.com 10 6/5/2023 Buidangthanh.3i@gmail.com 11 6/5/2023 Buidangthanh.3i@gmail.com 12
10 11 12
4
Hubs, MAUs, and Repeaters Hubs, MAUs, and Repeaters Hubs, MAUs, and Repeaters
• Hubs (Cont.) • Repeaters:
• Multistation Access Units (MAUs):
• Active Hubs: • One of the pitfalls of networking environments is that the electrical
• A multistation access unit (MAU) is a device to which multiple
• An active hub provides the same functionality as a passive hub with an signal that is traveling the wire is weakened over distance as a result
additional feature. workstations are connected in order to communicate on a Token
Ring network. of outside interference.
• Active hubs rebuild (regenerate) the data before sending it to all of the
destination ports on the hub. • A MAU is a hub-type device for Token Ring networks with some • if two systems are too far from one another, the signal is so weak that
features that make it a little bit different from a hub by the time it reaches the other side it is unreadable. This is where
• Using active hubs can increase the length of your network, because
although the signal weakens with distance, when the active hub receives repeaters come in.
• The first difference you will notice with MAUs over hubs is that a
the signal, it rebuilds the data, allowing it once more to go a greater
MAU does not have collision indicators on it because you can’t • If your network layout exceeds the normal specifications of the cable,
distance. you can use repeaters to allow the signal to travel the distance by
• An active hub has a power source and built-in repeaters to boost the have collisions on a Token Ring network.
placing the repeaters at different points in the network.
signal.
• Hybrid Hubs:
• A hybrid hub is a hub that can use many different types of cables in
addition to UTP cabling.
• A hybrid hub usually is cabled using thinnet or thicknet Ethernet along
with popular cable types such as twisted-pair cabling.
13 14 15
5
Hubs, MAUs, and Repeaters Bridges and Switches Bridges and Switches
• Repeaters: • Bridges: • Bridges:
The function of a repeater can be considered as belonging to the lower part • A bridge is a network connectivity device that is used to break In comparison to the OSI model, a bridge operates at the Logical Link Control
of the physical layer when compared to the OSI model. A repeater only the network down into multiple network segments. (LLC) layer, which is the upper part of Layer 2. Therefore, it implements
connects two segments of the same communication system, using the same • A bridge runs at layer 2, the data link layer, and is used to filter protocols below this layer for both network segments in order to facilitate
protocol and identical transmission medium. traffic by only forwarding traffic to the destination network the transmission of data packets between them.
segment.
Repeater in the OSI model Network with a bridge Bridge in the OSI model
16 17 18
6
Bridges and Switches Bridges and Switches Bridges and Switches
• Switches:
• Switches, also known as switching hubs, have become an
• Switches (Cont.)
• VLANs: Virtual LANs are a feature of special switches, known as
• Switches (Cont.)
increasingly important part of our networking today, because
when working with hubs, a hub sends the data to all ports on the managed switches, which allow the administrator to group ports • Switch features:
hub. on a switch to a “virtual LAN.” • Spanning Tree Protocol (STP)
• If you have a large network structure, this means that you have • When a port is configured for a particular VLAN, it is unable to • ISL and 802.1Q
probably linked a few hubs together, and when data is sent from communicate with systems that are not on that VLAN without • Trunking
one system to another, all computers see the traffic. the use of a routing device such as a router.
• Port Mirroring
• This leads to a lot of network traffic, which eventually slows • The purpose of a VLAN is to cut down on broadcast traffic
through the use of what are known as broadcast domains. • Port authentication
network performance.
• Different types of switches: • Content switch
• Layer-1 Switch
• Layer-2 Switch
Switches • Layer-3 Switch
19 20 21
7
Routers and Brouters Routers and Brouters Routers and Brouters
• Routers: • Routers:
• Routers:
For fieldbus networks, Layer 3 is largely insignificant, so routers only play a
• Routers are layer-3 devices and are responsible for routing or sending
significant role in more advanced network systems such as local area
data from one network to another.
networks (LANs) or wide area networks (WANs). • A router will have multiple network interfaces.
• Routers are typically used to connect the LAN to a WAN environment Cisco 1604 router with LAN and WAN interfaces
by having a network interface and a WAN interface connecting to each
type of network.
• Routers work with layer-3 addresses.
• Routers use a routing table stored in memory on the router to
determine how to reach a system on a destination network
Routers connecting LANs to a WAN
Router in the OSI model
6/5/2023 Buidangthanh.3i@gmail.com 22 6/5/2023 Buidangthanh.3i@gmail.com 23 6/5/2023 Buidangthanh.3i@gmail.com 24
22 23 24
8
Routers and Brouters Gateways and Security Devices Gateways and Security Devices
• Gateways: • Gateways:
• Brouters: • A gateway is responsible for translating information Due to its operation principles at the application layer, a gateway enables
• A number of network environments use multiple from one format to another and can run at any layer of the integration of systems based on the seven-layer OSI architecture as well
network protocols on the network to support different the OSI model, depending on what information the as systems that do not adhere to this model.
network applications or services. gateway translates.
• A brouter is the combination of a bridge and a router, • A typical use of a gateway is to ensure that systems in
and it makes the decision whether it needs to bridge one environment can access information in another
the data or route the data according to the protocol environment
being used.
• If the protocol is a nonroutable protocol such as
NetBEUI, the data will be bridged. If the protocol is
TCP/IP or IPX/SPX, the routing features of the brouter
will be used.
A gateway translates data from one format to another
Gateway in the OSI model
6/5/2023 Buidangthanh.3i@gmail.com 25 6/5/2023 Buidangthanh.3i@gmail.com 26 6/5/2023 Buidangthanh.3i@gmail.com 27
25 26 27
9
Gateways and Security Devices Gateways and Security Devices Other Networking Devices
• Wireless Access Points:
• Intrusion Detection Systems: • Wireless Access Points (WAPs) are network devices that can be
• An Intrusion Detection System (IDS) is a security device that connected to the wired network to allow a wireless client to pass
• Firewalls: monitors system or network activity and then notifies the through to get access to the wired network and its resources.
• Firewalls are a networking component responsible for administrator of any suspicious activity. • A wireless access point also is known as a cell, which is a
protecting the network from outside intruders. • Intrusion detection systems are important devices that will device that transmits and receives radio frequencies between
complement other security devices such as firewalls. the PCs and network devices with wireless transmitters
• The firewall is designed to block specific types of traffic connected to them.
while allowing certain information to pass through. • The IDS is an important device because it will notify you not only
of suspicious activity against the firewall, but also of suspicious • The wireless access point
• The firewall administrator selectively chooses which activity inside the network. is connected to a physical
traffic can and cannot pass through the firewall. • Two types of intrusion detection systems: cable, which connects the
• Host based: intrusion detection systems monitor the local system for
suspicious activity.
WAP device to the rest of
• Network based: monitors network traffic for suspicious behavior.
the network.
28 29 30
10
Other Networking Devices Other Networking Devices Other Networking Devices
31 32 33
11
Thank you for your attention!
6/5/2023 Buidangthanh.3i@gmail.com 34
34
12