SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Network devices I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Hubs, bridges, and switches.
– Modems.
– Routers.
Page 4
Network devices I.
Page 5
The Open System
Interconnect (OSI) model
was developed as a way to
help disparate computing
systems communicate with
each other.
It is composed of seven layers that work together in
order for communication to occur. Network devices tend
to fall within the first three of those layers. Layer 1—the
Physical Layer—deals with how bits are converted to
the appropriate signal and placed on the network. Layer
2—the Data Link Layer—is concerned more concerned
with making sure the appropriate host is reached on the
network. Finally, Layer 3—the Network Layer—is all
about making sure the right network is reached.
Network devices I.
Page 6
Network devices I.
– The hub.
» Operates at Layer 1 of the OSI model.
• It is only concerned with physically placing the signal on the
network.
» All devices that connect to hubs are in the same collision domain
and broadcast domain.
• Collision domains are areas where network traffic can collide and
cause problems.
• Broadcast domains are network segments where broadcast
traffic is heard by all of the devices on the network.
» A hub functions as a concentrator/repeater in that it doesn’t care
where the signal comes from or where it is going.
» A hub only operates in half-duplex.
• It can be sending or receiving, but not both at the same time.
» All of the network’s bandwidth is shared by all of the devices
connected to the network.
• This sharing of the bandwidth effectively reduces the amount of
bandwidth that is available to devices.
• As the size of the network increases, the performance of the
network will be reduced.
Page 7
Network devices I.
– The bridge.
» Operates at Layer 2 of the OSI model.
» Bridges connect different LAN segments together (by creating a
bridge between them) and break up collision domains.
• They can also bridge different types of network media and
different types of network transmissions (e.g., Ethernet to
token ring and/or wireless to Ethernet).
» They have a limited amount of ports.
– The wireless access point (WAP).
» Operates at Layer 2 of the OSI model.
• A specific type of network bridge that bridges wireless
network segments with wired network segments.
» Operates in half-duplex mode by using a method called carrier
sense multiple access with collision avoidance (CSMA/CA).
• With CSMA/CA, devices will listen to the line. If there is no
traffic on the line, the device is free to transmit. If there is
traffic on the line, the device waits a random period of time
and then listens in on the line again.
• While WAPs do not break up collision domains, collisions are
avoided by the use of CSMA/CA.
Page 8
Network devices I.
– The switch.
» Operates at Layer 2 of the OSI model.
» It is similar to a hub, but it is also much smarter than a hub.
• It utilizes an application-specific integrated circuit (ASIC) chip.
• The ASIC has specific programing that allows the switch to
learn what devices are on the network and which ports they
are connected to on the switch.
» Because they know which devices are on the segment and
where they are located, they can operate in full-duplex.
• Full-duplex is when a device can send and receive signals at
the same time.
• With full-duplex, all of the devices receive all of the possible
network bandwidth all of the time. They do not share the
bandwidth as in the case of a hub.
» Switches break up collisions domains. Each port on a switch is
its own collision domain.
» Switches do not break up broadcast domains. All devices
connected to a switch will receive network broadcasts.
Page 9
Network devices I.
Page 10
Network devices I.
– The modem.
» Operates at Layer 1 of the OSI model.
» The term “modem” is actually short for modulator/demodulator.
• It was originally developed to take the digital signal coming
from a node and convert it to an analog signal (modulating the
signal) to be placed on the wire. In return, it would accept an
analog signal from the wire and convert it (demodulating the
signal) to a digital signal that the node could understand.
» They were originally developed to create connections between
network segments via the public switched telephone network
(PSTN) using the plain old telephone system (POTS).
» Cable modems can be used to connect network segments to
the Internet by translating the network signal into a format that
can be handled by the cable network.
» A modem is not a router.
Page 11
Network devices I.
Page 12
Network devices I.
– The router.
» Operates at Layer 3 of the OSI model.
» It is responsible for connecting different networks together.
• It uses special programing to keep track of different networks
and the best possible paths to reach those networks.
» It is not concerned with what hosts are connected to networks.
» They are found at the edges of the network.
» They can connect different types of media together (e.g.,
Ethernet to serial and/or Ethernet to fiber optic).
» Routers break up collision domains.
» Routers break up broadcast domains. Because network
broadcasts are for a specific single network, they cannot pass
through a router interface.
• When a router receives a network broadcast, it just drops the
broadcast (it ignores the broadcast).
Page 13
Network devices I.
Hubs work at Layer 1 of the OSI model and function as a
concentrator/repeater. Every packet the hub receives is propagated out all
of its ports. Bridges work at Layer 2 of the OSI model. They are used to
connect network segments together. They can also be used to change
network media. A WAP is a specific type of bridge used to bridge wireless
and wired networks. Switches work at Layer 2 of the OSI model. The ASIC
allows them to know where and what devices are connected to them. The
bridge and the switch break up collision domains.
Topic
Hubs, bridges, and switches.
Summary
“Modem” stands for modulator/demodulator. Modems operate at Layer 1 of
the OSI model. Originally, they translated a digital network signal into an
analog signal that the PSTN could handle and reversed the process when
required. Cable modems translate the network signal into a format that the
cable network can handle.
Modems.
Routers work at Layer 3 of the OSI model. They are used to connect
networks together. They do not care what hosts are connected to a
network—just where that network is located and how to get to it. Routers
break up both collision domains and broadcast domains.
Routers.
Page 14
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercisejoelavery
 
Structure cabling technologies for networking
Structure cabling technologies for networkingStructure cabling technologies for networking
Structure cabling technologies for networkingRumesh Hapuarachchi
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System AdministrationLisa Dowdell, MSISTM
 
Technical Proposal - Structured Cabling
Technical Proposal - Structured CablingTechnical Proposal - Structured Cabling
Technical Proposal - Structured Cablingwolfthrone
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationRishabh Dangwal
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationCARMEN ALCIVAR
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012Samuel Dratwa
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networkingJyoti Kumari
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
Campas network design overview
Campas network design overviewCampas network design overview
Campas network design overviewAnushka Hapuhinna
 
10 floor-office-building-network-design
10 floor-office-building-network-design10 floor-office-building-network-design
10 floor-office-building-network-designMd. Asekur Rahman
 
Structured Cabling Technologies for Networking
Structured Cabling Technologies for NetworkingStructured Cabling Technologies for Networking
Structured Cabling Technologies for NetworkingTharindu Kumara
 

Was ist angesagt? (20)

A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
 
Structure cabling technologies for networking
Structure cabling technologies for networkingStructure cabling technologies for networking
Structure cabling technologies for networking
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
Technical Proposal - Structured Cabling
Technical Proposal - Structured CablingTechnical Proposal - Structured Cabling
Technical Proposal - Structured Cabling
 
Microsoft System center
Microsoft System centerMicrosoft System center
Microsoft System center
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006 PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Campas network design overview
Campas network design overviewCampas network design overview
Campas network design overview
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
Maintenance Network
Maintenance NetworkMaintenance Network
Maintenance Network
 
10 floor-office-building-network-design
10 floor-office-building-network-design10 floor-office-building-network-design
10 floor-office-building-network-design
 
200 301-ccna
200 301-ccna200 301-ccna
200 301-ccna
 
Structured Cabling Technologies for Networking
Structured Cabling Technologies for NetworkingStructured Cabling Technologies for Networking
Structured Cabling Technologies for Networking
 

Ähnlich wie Pace IT - Network Devices (part 1)

presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Data Communication Class Note
Data Communication Class NoteData Communication Class Note
Data Communication Class NoteAbul Kalam Robin
 
Computer network notes with company specific questions
Computer network notes with company specific questionsComputer network notes with company specific questions
Computer network notes with company specific questionsTaleManju
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenĐô GiẢn
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in BusinessNethan P
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet ProtocoltxMosesOkumu4
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshareBSITstudents
 
Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.pptMrAdhit1
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtapVikas Jagtap
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1paolo374233
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network ComponentsJyoti Akhter
 

Ähnlich wie Pace IT - Network Devices (part 1) (20)

PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006 PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Data Communication Class Note
Data Communication Class NoteData Communication Class Note
Data Communication Class Note
 
Computer network notes with company specific questions
Computer network notes with company specific questionsComputer network notes with company specific questions
Computer network notes with company specific questions
 
Networking devices
Networking  devices Networking  devices
Networking devices
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chen
 
Networks
Networks   Networks
Networks
 
Lan internetworking devices
Lan internetworking devicesLan internetworking devices
Lan internetworking devices
 
What is networking
What is networkingWhat is networking
What is networking
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in Business
 
PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)PACE-IT: Basic Network Concepts (part 1)
PACE-IT: Basic Network Concepts (part 1)
 
Pwani notes-Network Essentials.pp for Internet Protocoltx
Pwani notes-Network Essentials.pp  for Internet ProtocoltxPwani notes-Network Essentials.pp  for Internet Protocoltx
Pwani notes-Network Essentials.pp for Internet Protocoltx
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.ppt
 
Chapter4_2.ppt
Chapter4_2.pptChapter4_2.ppt
Chapter4_2.ppt
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtap
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Networking
NetworkingNetworking
Networking
 

Mehr von Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Kürzlich hochgeladen

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Kürzlich hochgeladen (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Pace IT - Network Devices (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Hubs, bridges, and switches. – Modems. – Routers.
  • 5. Page 5 The Open System Interconnect (OSI) model was developed as a way to help disparate computing systems communicate with each other. It is composed of seven layers that work together in order for communication to occur. Network devices tend to fall within the first three of those layers. Layer 1—the Physical Layer—deals with how bits are converted to the appropriate signal and placed on the network. Layer 2—the Data Link Layer—is concerned more concerned with making sure the appropriate host is reached on the network. Finally, Layer 3—the Network Layer—is all about making sure the right network is reached. Network devices I.
  • 6. Page 6 Network devices I. – The hub. » Operates at Layer 1 of the OSI model. • It is only concerned with physically placing the signal on the network. » All devices that connect to hubs are in the same collision domain and broadcast domain. • Collision domains are areas where network traffic can collide and cause problems. • Broadcast domains are network segments where broadcast traffic is heard by all of the devices on the network. » A hub functions as a concentrator/repeater in that it doesn’t care where the signal comes from or where it is going. » A hub only operates in half-duplex. • It can be sending or receiving, but not both at the same time. » All of the network’s bandwidth is shared by all of the devices connected to the network. • This sharing of the bandwidth effectively reduces the amount of bandwidth that is available to devices. • As the size of the network increases, the performance of the network will be reduced.
  • 7. Page 7 Network devices I. – The bridge. » Operates at Layer 2 of the OSI model. » Bridges connect different LAN segments together (by creating a bridge between them) and break up collision domains. • They can also bridge different types of network media and different types of network transmissions (e.g., Ethernet to token ring and/or wireless to Ethernet). » They have a limited amount of ports. – The wireless access point (WAP). » Operates at Layer 2 of the OSI model. • A specific type of network bridge that bridges wireless network segments with wired network segments. » Operates in half-duplex mode by using a method called carrier sense multiple access with collision avoidance (CSMA/CA). • With CSMA/CA, devices will listen to the line. If there is no traffic on the line, the device is free to transmit. If there is traffic on the line, the device waits a random period of time and then listens in on the line again. • While WAPs do not break up collision domains, collisions are avoided by the use of CSMA/CA.
  • 8. Page 8 Network devices I. – The switch. » Operates at Layer 2 of the OSI model. » It is similar to a hub, but it is also much smarter than a hub. • It utilizes an application-specific integrated circuit (ASIC) chip. • The ASIC has specific programing that allows the switch to learn what devices are on the network and which ports they are connected to on the switch. » Because they know which devices are on the segment and where they are located, they can operate in full-duplex. • Full-duplex is when a device can send and receive signals at the same time. • With full-duplex, all of the devices receive all of the possible network bandwidth all of the time. They do not share the bandwidth as in the case of a hub. » Switches break up collisions domains. Each port on a switch is its own collision domain. » Switches do not break up broadcast domains. All devices connected to a switch will receive network broadcasts.
  • 10. Page 10 Network devices I. – The modem. » Operates at Layer 1 of the OSI model. » The term “modem” is actually short for modulator/demodulator. • It was originally developed to take the digital signal coming from a node and convert it to an analog signal (modulating the signal) to be placed on the wire. In return, it would accept an analog signal from the wire and convert it (demodulating the signal) to a digital signal that the node could understand. » They were originally developed to create connections between network segments via the public switched telephone network (PSTN) using the plain old telephone system (POTS). » Cable modems can be used to connect network segments to the Internet by translating the network signal into a format that can be handled by the cable network. » A modem is not a router.
  • 12. Page 12 Network devices I. – The router. » Operates at Layer 3 of the OSI model. » It is responsible for connecting different networks together. • It uses special programing to keep track of different networks and the best possible paths to reach those networks. » It is not concerned with what hosts are connected to networks. » They are found at the edges of the network. » They can connect different types of media together (e.g., Ethernet to serial and/or Ethernet to fiber optic). » Routers break up collision domains. » Routers break up broadcast domains. Because network broadcasts are for a specific single network, they cannot pass through a router interface. • When a router receives a network broadcast, it just drops the broadcast (it ignores the broadcast).
  • 13. Page 13 Network devices I. Hubs work at Layer 1 of the OSI model and function as a concentrator/repeater. Every packet the hub receives is propagated out all of its ports. Bridges work at Layer 2 of the OSI model. They are used to connect network segments together. They can also be used to change network media. A WAP is a specific type of bridge used to bridge wireless and wired networks. Switches work at Layer 2 of the OSI model. The ASIC allows them to know where and what devices are connected to them. The bridge and the switch break up collision domains. Topic Hubs, bridges, and switches. Summary “Modem” stands for modulator/demodulator. Modems operate at Layer 1 of the OSI model. Originally, they translated a digital network signal into an analog signal that the PSTN could handle and reversed the process when required. Cable modems translate the network signal into a format that the cable network can handle. Modems. Routers work at Layer 3 of the OSI model. They are used to connect networks together. They do not care what hosts are connected to a network—just where that network is located and how to get to it. Routers break up both collision domains and broadcast domains. Routers.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.