0% found this document useful (0 votes)
5 views

5-NETWORK-Coonection

The document provides an overview of Network Interface Cards (NICs), detailing their functions, types, and the role of connectors in networking. It explains the importance of packets and protocols in data transmission, including the structure of packets and popular protocol suites. Additionally, the document covers IP addressing, including its significance, classes, and the identification of network and host IDs.

Uploaded by

romnicktorres883
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

5-NETWORK-Coonection

The document provides an overview of Network Interface Cards (NICs), detailing their functions, types, and the role of connectors in networking. It explains the importance of packets and protocols in data transmission, including the structure of packets and popular protocol suites. Additionally, the document covers IP addressing, including its significance, classes, and the identification of network and host IDs.

Uploaded by

romnicktorres883
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Network Interface Card

• Is an adapter card that plugs into the system bus


of a computer and allows the computer to send
and receive signals on a network.
• Is also known as a network adapter card, LAN
Card or simply a Network Card.
Network Interface Card

• Provides both hardware and software interface. It allows the


computer to be physically connected to the network cable and
provides physical-layer connection from the computer to the
network. Specialized NICs allows users to connect each other
wirelessly.
• Provide software interface by transforming data sent by the
sending device into signals that are carried across the
transmission media and transforming back the signal into
information that computer can understand in the destination
device.
Network Interface Card

The functions of NICs are:


• To translate data from the parallel data bus to a serial
bit stream for transmission across the network;
• To formal packets of data in accordance with protocol;
• And to transmit and receive data based on the
hardware address of the card. The type of adapter
being used determines how the adapter exactly
function.
Network Interface Card

Both an OSI layer 1( physical layer) and layer


2(data link layer) device, as it provide physical
access to a networking medium and provide a low-
level addressing system through the use of MAC
addresses.
Network Interface Card

Ethernet Network Interface Card is installed in an


available slot inside the system unit.
Network Interface Card

Assign a unique address called a MAC(Media


Access Control) to the machine. The MACs on
the network are used to direct traffic between
the computers. The back plate of the network
interface card features a port that looks similar
to a phone jack, but is slightly larger. This port
accommodates an Ethernet cable, which
resembles a thicker version of a standard
telephone line.
Network Adapter Port

To provide connectivity between computers


and network cabling, network connectors must
be used. The type of connector to be used
depends on the types of network to which it is
connecting.
Most Common Connector Types
RJ45 (Registered Jack 45)
is one of the most used networking connector in network world. RJ45 is a
connector made by plastic and it is larger than a classical telephone
connector, RJ11. RJ45 is the connector of UTP and STP type cables. It is
located at the two side of the cables (CAT-5, CAT-6 etc.) and with this
connectors we can connect the cable between any two network devices, to
routers, to switches, firewalls etc. Here, RJ45 is the point that we terminate a
cable. This process is called as “termination” in network terminology. With
this way, these two network devices are connected. This process is done with
the help of RJ-45 Crimping tool.
Most Common Connector Types
RJ45 (Registered Jack 45)
Most Common Connector Types
Coaxial Cable Network Connectors

BNC (Bayone-Neill-Concelman) Connector is one of


the most used Coaxial Cable Connectors. This BNC
Connectors are use with different types of adapters.
T-connector, Barrel Connector, Terminator etc.
Most Common Connector Types
Coaxial Cable Network Connectors
Most Common Connector Types
Fiber Optic Cables

are one of the most used cables in network World.


With the need of high speeds, this types of cables
usage increased and different types of fiber
connectors has developed. The design of these fiber
optic cables are similar. But there are some different
connector types
Most Common Connector Types
Fiber Optic Cables
There are four common elements of a fiber optic
connector. These elements are :

is the cover that protects the fiber.

is the structure that covers the fiber.

is the exact conduit part of the fiber that light passes


through.
is the cover that prevents signals in the core from
escaping.
Most Common Connector Types
Fiber Optic Cables
According to the connector number at the end there are
mainly two types fiber optic connectors. These are :

Simplex End Duplex End


If there is a one If there are two
connector at connectors the
the fiber end the fiber end
Most Common Connector Types
Fiber Optic Cables

Optical Cables can be used with different types of


connectors. The most used optical cable connectors are
LC, SC and ST connector. With this connectors optical
cables are plugged to the optical ports in the network
devices.
Most Common Connector Types
Fiber Optic Cables
The most common Fiber Optic Networking Connectors are
given below:
Most Common Connector Types
Guided and Unguided Media
The most common Fiber Optic Networking Connectors are
given below:
Guided Media Unguided Media
The guided media is also called wired The unguided media is also called
communication or bounded wireless communication or
transmission media. unbounded transmission media.
used for point-to-point generally suited for radio
communication. broadcasting in all directions.
twisted pair wires, coaxial cables, microwave or radio links and infrared
and optical fiber cables. light.
unable to pass through walls. can pass through walls.
NETWORK PROTOCOLS

Prepared by: Mr. Rhoniel Faustino


UNDERSTANDING PACKETS
• Packets and protocols are thee basic elements of data
transmission over the network. Without them, networks will be
useless.
• Packets (also knowns as datagram, frame or cell) and protocols
allow different application to communicate with any device on
the network.
• Packets contain information about the source and destination of
the data as well as other control information, while protocols are
used to encapsulate those data and information.
UNDERSTANDING PACKETS
• Packets carry data from one point to another with the help of
protocols. During the process, protocols require that packets
contain information that will ensure successful transmission of
data.
• Protocol defines structure of a packet. This is very essential
because it a packet is structured incorrectly, it is considered
corrupted and ignored by the receiving device.
UNDERSTANDING PACKETS
• Packets may vary in size and structure, but generally it include:
1. A header
2. A payload(data)
3. An optional trailer(footer)
NETWORK PROTOCOLS
• Protocol is set of rules that define how machines on a network
communicate. In order to converse, devices must agree on a
common protocol and understand the rules in these protocol for
successful transmission.
• Protocols may be grouped together to enhance their
functionalities – that group is also known as protocol suite. Most
commonly known protocol suites are Internetwork Packet
Exchange(IPX) and Sequenced Packet Exchange(SPX), the
Internet’s TCP/IP protocol suite, NetBeui(NetBIOS Extended
User Interface) and AppleTalk.
FUNCTION OF PROTOCOLS

• Segmentation and • Error Control


reassembly • Synchronization
• Encapsulation • Addressing
• Connection control • Multiplexing
• Ordered delivery • Transmission Services
• Flow delivery
Popular Protocol Suites

MICROSOFT PROTOCOLS TCP/IP PROTOCOL SUITE


1. Server Message Block (SMB) 1. Application Layer Protocols
2. NetBIOS 2. Transport Layer Protocols
3. NetBEUI 3. Internet Layer Protocols
4. Network Driver Interface 4. Network Layer Protocols
Specification(NDIS)
Popular Protocol Suites
IPX/SPX PROTOCOL SUITE OTHER PROTOCOL SUITE
1. Multiple Link Interface Driver 1. Apple Talk
(MLID) Protocol
2. Digital Network Architecture
2. Link Support Layer (LSL) Protocol Protocols
3. Internetwork Packet
Exchanging(IPX) 3. Ethernet Protocol
4. Sequenced Packet Exchange 4. Digital Data Communication
5. Network Link Services Message Protocol(DDCMP)
Protocol(NLSP)
6. NetWare Core Protocol(NCP)
7. Service Access Protocol(SAP)
IP Addressing
• An IP address is a unique address that identifies a device on the
internet or a local network. IP stands for "Internet Protocol,"
which is the set of rules governing the format of data sent via the
internet or local network.
• In essence, IP addresses are the identifier that allows information
to be sent between devices on a network: they contain location
information and make devices accessible for communication. The
internet needs a way to differentiate between different
computers, routers, and websites. IP addresses provide a way of
doing so and form an essential part of how the internet works.
IP Addressing
• Before two computers on a network can communicate,
they need to know how to contact each other, just as
every computer has MAC(Physical) address that is
encoded into the network card; computers also have an
IP(Logical) address. This is an address that is usually set
by the administrator, though the network protocol suite
sometimes automatically sets it.
IP Addressing
• Every host an a TCP/IP network is given an IP Address. This
address is a unique 4-byte(32 bit) address in dotted notation.
Each byte , or octet, is represented by a decimal number from 0
to 255 and separated by a period. Although eight bits have 256
possible combinations, the numbers 0 and 255 are reserved for
broadcasts as stated earlier. Both network and hosts (individual
computers) can used the number 1 through 254 only. Part of the
IP Address indicates which network the computer is located,
whereas the remainder f the address represents the hosts ID of
that computer.
IP Addressing
128 64 32 16 8 4 2 1

IP ADDRESS
192.168.8.10
bytes/octets
Binary
11000000 10101000 00001000 00001010
format

128+64 128+32+8 8 8+2


IP Addressing
128 64 32 16 8 4 2 1

IP ADDRESS
224.130.25.50
bytes/octets
Binary
11100000 10000010 00011001 00110010
format

128+64+32 128+32+8 16+8+1 32+16+2


IP Addressing(Practice 1)
128 64 32 16 8 4 2 1

IP ADDRESS
199.110.125.10
bytes/octets
Binary
11000111 01101110 01111101 00001010
format
128+64+4+2+1 64+32+8+4+2 64+32+16+8+4+1 8+2
IP Address Classes
IP address Number of Number of
Class Network Mask Prefix
range Networks host

A 1-127 255.0.0.0 /8 125 16,77,214

B 128-191 255.255.0.0 /16 16,384 65,534

C 192-223 255.255.255.0 /24 2,097,152 254

D 224-239 Multicast Addresses

E 240-254 Restricted/Experimental

127.0.0.0 is a reserved IP Address


IP Address Classes
Assigning IP Addresses
SUBNET MASK

CLASS SUBNET MASK


A 255.0.0.0
B 255.255.0.0
C 255.255.255.0
IDENTIFYING NETWORK ID AND HOST ID

NETWORK
IP ADDRESS SUBNET MASK HOST ID
ID
192.168.2.5 255.255.255.0 192.168.2 5

223.200.10.6 255.255.255.0 223.200.10 6

110.22.100.9 255.0.0.0 110 22.100.9


162.10.120.1 255.255.0.0 162.10 120.1

128.190.2.10 255.255.0.0 128.190 2.10


References:

➢ Digna, D.S, & Mendoza, R.A, & Gonzales, L.Y.Introduction to


networking and Web Page Development
➢ https://www.geeksforgeeks.org/difference-between-guided-
and-unguided-media/

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy