SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Networking Devices
Repeaters
Hubs
Bridges
Routers
What are networking devices?
Networking devices are products used to connect networks.

As computer networks grow in size and complexity, so do
the networking devices used to connect them.
The purposes of having devices
First, they allow a greater number of nodes to be connected

to the network.
Second, they extend the distance over which a network can
extend.
Third, they localize traffic on the network.
Fourth, they can merge existing networks.
Fifth, they isolate network problems so that they can be
diagnosed more easily.
Network Hardware
Repeater
 Used to boost the signal between two cable segments or

wireless access points.
 Can not connect different network architecture.
 Does not simply amplify the signal, it regenerates the
packets and retimes them.
 Resides on Layer 1 of the OSI model.
What is a repeater and what are its
functions?
Used to boost the signal between two cable

segments or wireless access points
When signals first leave a transmitting station, they are clean

and easily recognizable. However, the longer the cable
length, the weaker and more deteriorated the signals become
as they pass along the networking media.
Repeaters (continued)
Repeaters (continued)
Limitations and Features
• Cannot connect different network architecture
• Cannot join segments with different access methods
(e.g. CSMA/CD and token passing)
• Do not isolate and filter packets
• Can connect
different types of
media
• The most economic
way of expanding
networks
8
What is the disadvantage associated
with using a repeater?


it can't filter network traffic. Data, sometimes referred to as
bits, arriving at one port of a repeater gets sent out on all other
ports
 data gets passed along by a repeater to all other LAN segments
of a network regardless of whether it needs to go there or no

› Traditionally, hubs are used for star topology networks, but they are often used with

other configurations to make it easy to add and remove computers without bringing
down the network.
› Resides on Layer 1 of the OSI model
Hub
Multi-port repeaters are often called hubs. Hubs are very

common internetworking devices. Generally speaking, the
term hub is used instead of repeater when referring to the
device that serves as the center of a star topology network.
Network Hardware
Hub

 An unintelligent network device that sends one signal to all

of the stations connected to it.
 All computers/devices are competing for attention because
it takes the data that comes into a port and sends it out all
the other ports in the hub.

OSI Model Layers
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
What problem could occur as a result of
too much traffic on a network?


if segments of a network are only connected by non-filtering
devices such as repeaters, this can result in more than one user
trying to send data on the network at the same time
 If more than one node attempts to transmit at the same time, a
collision will occur.
 When a collision occurs, the data from each device impact and
are damaged
What internetworking device can be used
to filter traffic on the network?
 One way to solve the problems of too much traffic on a

network and too many collisions is to use an
internetworking device called a bridge.
 A bridge eliminates unnecessary traffic and minimizes the
chances of collisions occurring on a network by dividing it
into segments
At what layer of the OSI model do
bridges operate?
 Because bridges operate at the data link layer, layer 2, they are not

required to examine upper-layer information.
How do bridges filter network traffic?
How are bridge data-forwarding
decisions limited?
 Although bridges use tables to determine whether or not to

forward data to other segments of the network, the types of
comparisons and decisions they make are relatively low level,
simple ones
What types of network traffic
problems is a bridge incapable of
solving?
Bridges work best where traffic from one segment of a

network to other segments is not too great.
However, when traffic between network segments becomes
too heavy, the bridge can become a bottleneck and actually
slow down communication.
How many addressing schemes are
there in networking?
You have already learned what one of these addressing

schemes is. It is the MAC address.
The second addressing scheme in networking makes use of
what is called the IP address.
How do IP addresses differ from
MAC addresses?


Like MAC addresses, every IP address is unique. No two IP
addresses are ever alike.
 However, while MAC addresses are physical addresses that are
actually hard-coded into the NIC card and occur at the data link
layer
 IP addresses are implemented in software and occur at the
network layer of the OSI model.
What are routers?


Routers are another type of internetworking device.
 These devices pass data packets between networks based on
network protocol or layer 3 information.
 Routers have the ability to make intelligent decisions as to
the best path for delivery of data on the network.
What network problems can routers
help resolve?
 The problem of excessive broadcast traffic can be solved by

using a router.
Routers are able to do this, because they do not forward
broadcast frames unless specifically told to do so
How do routers differ from bridges?


Routers differ from bridges in several respects. First,
bridging occurs at the data link layer or layer 2,while
routing occurs at the network layer or layer 3 of the
OSI model.
 Second, bridges use physical or MAC addresses to
make data forwarding decisions. Routers use a different
addressing scheme that occurs at layer three
How do routers work?
Routers are used to connect two or more networks. For

routing to be successful, each network must have a unique
network number
The port where a router connects to network
A would have an IP address of A5.
The IP address of the router's
second interface would be B5.
The router would determine to send the data
from network A to network B out its port with
the IP address B5.

Weitere ähnliche Inhalte

Was ist angesagt?

Network interface card(nic)
Network interface card(nic)Network interface card(nic)
Network interface card(nic)Anurag Tomar
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSICS_GDRCST
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets myrajendra
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networkingkieshore
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networkingSithu PM
 
Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking DevicesShubham Bathe
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 

Was ist angesagt? (20)

networking devices
networking devicesnetworking devices
networking devices
 
Network interface card(nic)
Network interface card(nic)Network interface card(nic)
Network interface card(nic)
 
Computer Networks basics and OSI
Computer Networks basics and OSIComputer Networks basics and OSI
Computer Networks basics and OSI
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
Router and types
Router and types Router and types
Router and types
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Frame relay
Frame relayFrame relay
Frame relay
 
Hub,Switch.Router
Hub,Switch.RouterHub,Switch.Router
Hub,Switch.Router
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Ip address
Ip addressIp address
Ip address
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Types of Networking Devices
Types of Networking DevicesTypes of Networking Devices
Types of Networking Devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 

Ähnlich wie Networking device Computer Application in Business

Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.pptMrAdhit1
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshareBSITstudents
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer ) dimuthu22
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networksDamaashaad
 
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdfanandatalapatra
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)Ankita Shetty
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHISowmya Jyothi
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 

Ähnlich wie Networking device Computer Application in Business (20)

Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.ppt
 
Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.ppt
 
Networking devices
Networking  devices Networking  devices
Networking devices
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Networks 2
Networks 2Networks 2
Networks 2
 
COMPUTER TAPALOGY
COMPUTER TAPALOGYCOMPUTER TAPALOGY
COMPUTER TAPALOGY
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networks
 
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
1.The Open Systems Interconnect (OSI) model has seven layers.The mod.pdf
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Networking
NetworkingNetworking
Networking
 
What is networking
What is networkingWhat is networking
What is networking
 
Networking hard copy (1)
Networking  hard copy (1)Networking  hard copy (1)
Networking hard copy (1)
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Networking
NetworkingNetworking
Networking
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 

Mehr von Nethan P

Unethical Business by Cocacola
Unethical Business by CocacolaUnethical Business by Cocacola
Unethical Business by CocacolaNethan P
 
HTC Max Mobile Features
HTC Max Mobile Features HTC Max Mobile Features
HTC Max Mobile Features Nethan P
 
Role of IT in Retail Industry
Role of IT in Retail IndustryRole of IT in Retail Industry
Role of IT in Retail IndustryNethan P
 
Wriitten communication Business Communication
Wriitten communication Business CommunicationWriitten communication Business Communication
Wriitten communication Business CommunicationNethan P
 
Speech Business Communication
Speech Business CommunicationSpeech Business Communication
Speech Business CommunicationNethan P
 
Procedures Business Communication
Procedures Business CommunicationProcedures Business Communication
Procedures Business CommunicationNethan P
 
Paper presentation Business Communication
Paper presentation Business CommunicationPaper presentation Business Communication
Paper presentation Business CommunicationNethan P
 
Long reports Business Communication
Long reports Business CommunicationLong reports Business Communication
Long reports Business CommunicationNethan P
 
Enquiries Business Communication
Enquiries Business CommunicationEnquiries Business Communication
Enquiries Business CommunicationNethan P
 
Crisis communication Business Communication
Crisis communication Business CommunicationCrisis communication Business Communication
Crisis communication Business CommunicationNethan P
 
Corporate meeting Business Communication
Corporate meeting Business CommunicationCorporate meeting Business Communication
Corporate meeting Business CommunicationNethan P
 
Wriiten communiaction
Wriiten communiactionWriiten communiaction
Wriiten communiactionNethan P
 
Production Managerial Economics
Production Managerial EconomicsProduction Managerial Economics
Production Managerial EconomicsNethan P
 
Ordinal utility Managerial Economics
Ordinal utility Managerial EconomicsOrdinal utility Managerial Economics
Ordinal utility Managerial EconomicsNethan P
 
National income Managerial Economics
National income Managerial EconomicsNational income Managerial Economics
National income Managerial EconomicsNethan P
 
Monopoly and price discrimination Managerial Economics
Monopoly and price discrimination Managerial EconomicsMonopoly and price discrimination Managerial Economics
Monopoly and price discrimination Managerial EconomicsNethan P
 
Monopolistic competition Managerial Economics
Monopolistic competition Managerial EconomicsMonopolistic competition Managerial Economics
Monopolistic competition Managerial EconomicsNethan P
 
Managerial economist
Managerial economist Managerial economist
Managerial economist Nethan P
 
Long run Managerial Economics
Long run Managerial EconomicsLong run Managerial Economics
Long run Managerial EconomicsNethan P
 
Inflation Managerial Economics
Inflation Managerial EconomicsInflation Managerial Economics
Inflation Managerial EconomicsNethan P
 

Mehr von Nethan P (20)

Unethical Business by Cocacola
Unethical Business by CocacolaUnethical Business by Cocacola
Unethical Business by Cocacola
 
HTC Max Mobile Features
HTC Max Mobile Features HTC Max Mobile Features
HTC Max Mobile Features
 
Role of IT in Retail Industry
Role of IT in Retail IndustryRole of IT in Retail Industry
Role of IT in Retail Industry
 
Wriitten communication Business Communication
Wriitten communication Business CommunicationWriitten communication Business Communication
Wriitten communication Business Communication
 
Speech Business Communication
Speech Business CommunicationSpeech Business Communication
Speech Business Communication
 
Procedures Business Communication
Procedures Business CommunicationProcedures Business Communication
Procedures Business Communication
 
Paper presentation Business Communication
Paper presentation Business CommunicationPaper presentation Business Communication
Paper presentation Business Communication
 
Long reports Business Communication
Long reports Business CommunicationLong reports Business Communication
Long reports Business Communication
 
Enquiries Business Communication
Enquiries Business CommunicationEnquiries Business Communication
Enquiries Business Communication
 
Crisis communication Business Communication
Crisis communication Business CommunicationCrisis communication Business Communication
Crisis communication Business Communication
 
Corporate meeting Business Communication
Corporate meeting Business CommunicationCorporate meeting Business Communication
Corporate meeting Business Communication
 
Wriiten communiaction
Wriiten communiactionWriiten communiaction
Wriiten communiaction
 
Production Managerial Economics
Production Managerial EconomicsProduction Managerial Economics
Production Managerial Economics
 
Ordinal utility Managerial Economics
Ordinal utility Managerial EconomicsOrdinal utility Managerial Economics
Ordinal utility Managerial Economics
 
National income Managerial Economics
National income Managerial EconomicsNational income Managerial Economics
National income Managerial Economics
 
Monopoly and price discrimination Managerial Economics
Monopoly and price discrimination Managerial EconomicsMonopoly and price discrimination Managerial Economics
Monopoly and price discrimination Managerial Economics
 
Monopolistic competition Managerial Economics
Monopolistic competition Managerial EconomicsMonopolistic competition Managerial Economics
Monopolistic competition Managerial Economics
 
Managerial economist
Managerial economist Managerial economist
Managerial economist
 
Long run Managerial Economics
Long run Managerial EconomicsLong run Managerial Economics
Long run Managerial Economics
 
Inflation Managerial Economics
Inflation Managerial EconomicsInflation Managerial Economics
Inflation Managerial Economics
 

Kürzlich hochgeladen

B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 

Kürzlich hochgeladen (20)

B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 

Networking device Computer Application in Business

  • 2. What are networking devices? Networking devices are products used to connect networks. As computer networks grow in size and complexity, so do the networking devices used to connect them.
  • 3. The purposes of having devices First, they allow a greater number of nodes to be connected to the network. Second, they extend the distance over which a network can extend. Third, they localize traffic on the network. Fourth, they can merge existing networks. Fifth, they isolate network problems so that they can be diagnosed more easily.
  • 4. Network Hardware Repeater  Used to boost the signal between two cable segments or wireless access points.  Can not connect different network architecture.  Does not simply amplify the signal, it regenerates the packets and retimes them.  Resides on Layer 1 of the OSI model.
  • 5. What is a repeater and what are its functions? Used to boost the signal between two cable segments or wireless access points When signals first leave a transmitting station, they are clean and easily recognizable. However, the longer the cable length, the weaker and more deteriorated the signals become as they pass along the networking media.
  • 8. Limitations and Features • Cannot connect different network architecture • Cannot join segments with different access methods (e.g. CSMA/CD and token passing) • Do not isolate and filter packets • Can connect different types of media • The most economic way of expanding networks 8
  • 9. What is the disadvantage associated with using a repeater?  it can't filter network traffic. Data, sometimes referred to as bits, arriving at one port of a repeater gets sent out on all other ports  data gets passed along by a repeater to all other LAN segments of a network regardless of whether it needs to go there or no › Traditionally, hubs are used for star topology networks, but they are often used with other configurations to make it easy to add and remove computers without bringing down the network. › Resides on Layer 1 of the OSI model
  • 10. Hub Multi-port repeaters are often called hubs. Hubs are very common internetworking devices. Generally speaking, the term hub is used instead of repeater when referring to the device that serves as the center of a star topology network.
  • 11. Network Hardware Hub  An unintelligent network device that sends one signal to all of the stations connected to it.  All computers/devices are competing for attention because it takes the data that comes into a port and sends it out all the other ports in the hub. OSI Model Layers 7 Application 6 Presentation 5 Session 4 Transport 3 Network 2 Data Link 1 Physical
  • 12. What problem could occur as a result of too much traffic on a network?  if segments of a network are only connected by non-filtering devices such as repeaters, this can result in more than one user trying to send data on the network at the same time  If more than one node attempts to transmit at the same time, a collision will occur.  When a collision occurs, the data from each device impact and are damaged
  • 13. What internetworking device can be used to filter traffic on the network?  One way to solve the problems of too much traffic on a network and too many collisions is to use an internetworking device called a bridge.  A bridge eliminates unnecessary traffic and minimizes the chances of collisions occurring on a network by dividing it into segments
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. At what layer of the OSI model do bridges operate?  Because bridges operate at the data link layer, layer 2, they are not required to examine upper-layer information.
  • 21. How do bridges filter network traffic?
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. How are bridge data-forwarding decisions limited?  Although bridges use tables to determine whether or not to forward data to other segments of the network, the types of comparisons and decisions they make are relatively low level, simple ones
  • 31. What types of network traffic problems is a bridge incapable of solving? Bridges work best where traffic from one segment of a network to other segments is not too great. However, when traffic between network segments becomes too heavy, the bridge can become a bottleneck and actually slow down communication.
  • 32. How many addressing schemes are there in networking? You have already learned what one of these addressing schemes is. It is the MAC address. The second addressing scheme in networking makes use of what is called the IP address.
  • 33. How do IP addresses differ from MAC addresses?  Like MAC addresses, every IP address is unique. No two IP addresses are ever alike.  However, while MAC addresses are physical addresses that are actually hard-coded into the NIC card and occur at the data link layer  IP addresses are implemented in software and occur at the network layer of the OSI model.
  • 34. What are routers?  Routers are another type of internetworking device.  These devices pass data packets between networks based on network protocol or layer 3 information.  Routers have the ability to make intelligent decisions as to the best path for delivery of data on the network.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. What network problems can routers help resolve?  The problem of excessive broadcast traffic can be solved by using a router. Routers are able to do this, because they do not forward broadcast frames unless specifically told to do so
  • 40.
  • 41. How do routers differ from bridges?  Routers differ from bridges in several respects. First, bridging occurs at the data link layer or layer 2,while routing occurs at the network layer or layer 3 of the OSI model.  Second, bridges use physical or MAC addresses to make data forwarding decisions. Routers use a different addressing scheme that occurs at layer three
  • 42. How do routers work? Routers are used to connect two or more networks. For routing to be successful, each network must have a unique network number
  • 43. The port where a router connects to network A would have an IP address of A5.
  • 44. The IP address of the router's second interface would be B5.
  • 45. The router would determine to send the data from network A to network B out its port with the IP address B5.