0% found this document useful (0 votes)
3 views

Lecture 1 - Introduction

The document provides an overview of networking principles, including types of networking devices such as end-user devices, intermediary devices, and their functions. It discusses various network topologies like bus, ring, star, and mesh, along with the advantages and disadvantages of each. Additionally, it explains the roles of LANs and WANs in facilitating communication within and between networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Lecture 1 - Introduction

The document provides an overview of networking principles, including types of networking devices such as end-user devices, intermediary devices, and their functions. It discusses various network topologies like bus, ring, star, and mesh, along with the advantages and disadvantages of each. Additionally, it explains the roles of LANs and WANs in facilitating communication within and between networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

ITGN235

Principles of Networking

Introduction

1
Introduction to Networks
If you want to be a part of a global online
community, your computer, tablet, or smart
phone must first be connected to a network
Networking Devices
Equipment that connects directly to a network segment is
referred to as a device.

These devices are broken up into two classifications.


• end-user devices
• network devices

End-user devices include computers, printers, scanners,


and other devices that provide services directly to the
user.

Network devices include all the devices that connect the


end-user devices together to allow them to communicate.
3
End Devices

An end device is either the source or destination of a message


transmitted over the network.
Intermediary Devices
 Intermediary devices connect the individual end
devices to the network
 They can connect multiple individual networks to
form an internetwork
 These intermediary devices provide connectivity
and ensure that data flows across the network
Repeater
 A repeater is a network device used to regenerate a
signal.
 Repeaters regenerate analog or digital signals
distorted by transmission loss due to attenuation.
 A repeater does not perform intelligent routing.

6
Network Repeaters and
Hubs
Early networks didn’t use interconnecting
devices

Severely limited the total cable length and


number of computers
7
Network Repeaters and
Hubs
Some problems were resolved with a device
called a repeater
◦A repeater receives bit signals generated by
NICs(Network Interface Cards) and other devices,
strengthens them, and then “repeats” them to other
parts of the network
A repeater enables you to connect computers
whose distance from one another would make
communication impossible
A traditional repeater has two ports or
connections that you can use to extend your
network
8
Network Repeaters and
Hubs

Figure 2-2 A repeater extends the distance a network can cover

9
Multiport Repeaters and
Hubs
A multiport repeater is just a repeater with
several ports to which you can connect cabling
◦Also referred to as a hub
Receives bit signals generated from a
connected computer on one of its ports
Cleans the signal by filtering out electrical
noise
Regenerates the signal to full strength
Transmits the regenerated signal to all other
ports a computer (or other network device) is
connected to
10
Multiport Repeaters and
Hubs

11
Bandwidth

12
Hubs and Network
Bandwidth

Amount of data that can be transferred in an
interval is network bandwidth
–Usually measured in bits per second (bps)
and networks operate at speeds from 10
million bps up to 10 gigabit per second
(Gbps)
Hubs share bandwidth with all other
connected computers
–Only one computer can successfully
transmit data at a time
Bandwidth sharing – when all computers
connected to the hub must share the amount
of bandwidth the hub provides
13
Network Interface Cards
(NIC)
Most NICs are built into a computer’s
motherboard
◦Occasionally fail or additional NICs are needed for
an application
◦It is important to know how to install a new NIC

14
Network Switches
Looks just like a hub
◦ But a switch reads data in the message, determines
which port the destination device is connected to, and
forward the message to only that port
Basic Switch Operation
◦Data is sent onto the medium one frame at a time
◦Each frame has the destination MAC address
◦Switch reads the addresses:
 Keeps a record of which computer is on which port
(switching table)
 Forwards the frame to the port where the destination MAC
can be found

15
Network Switches

16
Switches and Network
Bandwidth
Each port gets dedicated bandwidth
◦Instead of having to share bandwidth with all ports
Multipleconversations can occur
simultaneously
Can operate in full-duplex mode
◦Can send an receive data simultaneously
Hubs can only operate in half-duplex mode
◦Can send or receive (but not both) at one time
Switches are the preferred device because of
these advantages

17
Bridge
Bridges convert network transmission data formats as
well as perform basic data transmission management.
Bridges, as the name implies, provide connections
between LANs. Not only do bridges connect LANs, but
they also perform a check on the data to determine
whether it should cross the bridge or not. This makes
each part of the network more efficient.

18
Router
Routers have all capabilities of the previous devices.
Routers can regenerate signals, concentrate multiple
connections, convert data transmission formats, and
manage data transfers. They can also connect to a WAN,
which allows them to connect LANs that are separated by
great distances.

19
The Cloud
The cloud is used in diagrams to represent where the
connection to the internet is.
It also represents all of the devices on the internet.

20
Topology Diagrams
Topology diagrams are mandatory
documentation for anyone working with
a network
They provide a visual map of how the
network is connected
There are two types of topology diagrams
 Physical topology
 Logical topology
Physical Topology
Diagrams
 Physical topology diagrams illustrate the physical
location of intermediary devices and cable
installation
 You can see that the rooms in which these devices
are located are labeled in this physical topology
Logical Topology Diagrams
 Logical topology diagrams illustrate devices,
ports, and the addressing scheme of the network
 You can see which end devices are connected to
which intermediary devices and what media is
being used
Physical Topologies

24
Bus
Topology
• A bus topology uses a single backbone cable that is terminated at
both ends.

• All the hosts connect directly to this backbone.

• Weaknesses
1. There’s a limit of 30 computers per cable segment
2. The maximum total length of cabling is 185 meters
3. Both ends of the bus must be terminated
4. Any break in the bus brings down the entire network

25
Ring
Topology
• A physical ring topology is like a bus

• A ring topology connects one host to the next and the last host to
the first.

• This creates a physical ring of cable.

• Data travels in one direction

• If any station in the ring fails, data can no longer be passed along

26
Star Topology

• Uses a central device (hub or switch) to connect computers

• Advantages:
1. Much faster technologies than a bus
2. Centralized monitoring and management of network traffic
are possible
3. Easier network upgrades

• Disadvantage:
1. The central device represents a single point of failure. If the
hub or switch fails or someone kicks the power cord out of
the outlet, the entire network goes down

27
Extended Star
Topology

• An extended star topology links individual stars together by


connecting the hubs and/or switches. This topology can extend
the scope and coverage of the network.

• Most widely used in networks containing more than just a few


computers

28
Mesh Topology

• A mesh topology is implemented to provide as much protection as


possible from interruption of service.

• Each host has its own connections to all other hosts. Although the
Internet has multiple paths to any one location, it does not adopt
the full mesh topology.

• Expensive due to multiple interfaces and cabling

29
LANs & WANs
One early solution was the creation of local-area network
(LAN) standards which provided an open set of
guidelines for creating network hardware and software,
making equipment from different companies compatible.

What was needed was a way for information to move


efficiently and quickly, not only within a company, but also
from one business to another.

The solution was the creation wide-area networks


(WANs).

30
LANs

31
WANs

32

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy