SlideShare une entreprise Scribd logo
1  sur  43
Network Devices
1
Functions of network devices
• Separating (connecting) networks or
expanding network
• e.g. repeaters, hubs, bridges, routers,
brouters, switches, gateways
• Remote access
• e.g. 56K Modems and ADSL
modems
2
A. Expanding Network
• Networks cannot be made larger by simply
adding new computers and more cables
• Less efficient !!
• Can install components to
• segment (divide) large LAN to form smaller
LANs
• connect LANs
• Required components
• Repeaters, bridges, routers, brouters,
3
switches or gateways
a. Repeaters and Hubs
• Repeaters or hubs work at the OSI physical layer to
regenerate the network’s signal and resend them to
other segments
• Primitive hub can be viewed as a multiport repeater
• It regenerates data and broadcasts them to all
ports
Hub

4
Limitations and Features
• Cannot link unlike segments
• Cannot join segments with different access methods
(e.g. CSMA/CD and token passing)
• Do not isolate and filter packets
• Can connect
different types of
media
• The most economic
way of expanding
networks
5
b. Bridges
• Has one input and one output
• Used to isolate network traffic and computers
• Has the intelligent to examine incoming packet
source and destination addresses
• But cannot
interpret higherlevel information
• Hence cannot
filter packet
according to its
protocol
6
How Bridges Work
• Bridges work at the Media Access Control Sublayer of the OSI model
• Routing table is built
to record the segment
no. of address
• If destination address
is in the same segment
as the source address,
stop transmit
• Otherwise, forward to
7
the other segment
Creating a Switching Table
• Based on the addresses of the sending computers
• New addresses are added if they are not in the
table
Add02
S 02 D 01

Switching Table
Seg 1
Seg 2

Add01
Stop

Add03

8

S 01

D 02

01
02
Remote Bridges
• Bridges are often used in large networks that
have widely dispersed segments
• Remote bridges can be used to connect remote
segments via data-grade telephone line

9
Differences Between Bridges and Repeaters
Repeaters

Bridges

OSI layer

Physical layer

Data link layer

Data
regeneration

Regenerate data at
the signal level

Regenerate data
at the packet
level
Yes

Reduce network No
traffic
10
c. Switches
• Switches operate at the Data Link layer (layer 2)
of the OSI model
• Can interpret address information
• Switches resemble bridges and can be considered
as multiport bridges
• By having multiports,
can better use limited
bandwidth and prove
more cost-effective
than bridge
11
Cisco Catalyst 2900 switch
• Switches divide a network into several isolated
channels
• Packets sending from 1 channel will not go to
another if not specify
• Each channel has its own capacity and need not be
shared with other channels
Hub 3.3Mbps
10Mbps
3.3Mbps

Switch

3.3Mbps
10Mbps
10Mbps
12

10Mbps
Advantages of Switches
• Switches divide a network into several isolated
channels (or collision domains)
• Reduce the possibility of collision
• Collision only occurs when two devices try to get access
to one channel
• Can be solved by buffering one of them for later access

• Each channel has its own network capacity
• Suitable for real-time applications, e.g. video
conferencing

• Since isolated, hence secure
• Data will only go to the13destination, but not others
Limitations of Switches
• Although contains buffers to accommodate bursts of
traffic, can become overwhelmed by heavy traffic
• Device cannot detect collision when buffer full
• CSMA/CD scheme will not work since the data
channels are isolated, not the case as in Ethernet

• Some higher level protocols do not detect error
• E.g. UDP

• Those data packets are continuously pumped to
the switch and introduce more problems
14
Method of Switching - Cut Through Mode
Preamble

Des. Add

7
1
2/6
Bytes Byte Bytes

Sour. Add

2/6
Bytes

Length

Data

FCS

2
46 - 1500 Bytes
4
Bytes
Bytes

• Read the first 14 bytes of each packet, then transmit
• Much faster
• Cannot detect corrupt packets
• Can propagate the corrupt packets to the network
• Best suited to small workgroups
15
Method of Switching - Store and Forward Mode
• Read the whole packet before transmit
• Slower than the cut-through mode
• More accurate since corrupt packets can be detected
using the FCS
• More suit to large LAN since they will not propagate
error packets
• Facilitate data
DB
100Mbps
transfer between
segments of
different speed
16

10Mbps
Using Switches to Create VLANs
• Switches can logically group together some ports to
form a virtual local area network (VLAN)
SW1

SW2

SW3

VLAN1

VLAN2

Hub

Hub

Switches can
be configured
to communicate
only within the
devices in the
group
Hub
17
d. Routers
• Layer 2 Switches cannot take advantage of multiple
paths
• Routers work at the OSI layer 3 (network layer)
• They use the
“logical address”
of packets and
routing tables to
determine the best
path for data
delivery
18
How Routers Work
• As packets are passed from routers to routers, Data
Link layer source and destination addresses are
stripped off and then recreated
• Enables a router to route a packet from a TCP/IP
Ethernet network to a TCP/IP token ring network
• Only packets with known network addresses will be
passed - hence reduce traffic
• Routers can listen to a network and identify its
busiest part
• Will select the most cost effective path for
19
transmitting packets
How Routing Table is formed
• Routing table is formed based on communications
between routers using “Routing Protocols”
• Routing Protocols ≠ Routable Protocol
• Routing Protocols
collect data about
current network
status and
contribute to
selection of the
best path

Routers communicate
within themselves

20
Routing Protocol Example - RIP for IP Routing
• RIP (Routing Information Protocol) ― the oldest one
• Use no. of hops between nodes to determine best path
• Does not consider the network congestion condition
• Broadcast every 30 sec the routing table to
neighbouring routers to convey routing information
• RIP is limited to interpreting a maximum of 16 hops
• Not suitable for large network (e.g. Internet)
• Can create excessive network traffic due to
broadcasting
21

• May take a long time to reach the far reaches
Routing Protocol Example - OSPF for IP
• OSPF - Open Shortest Path First
• Make up the limitations of RIP - can coexist with RIP
• In general case, best path refers to the shortest path
• In case of traffic congestion, can go a longer path
• Each router maintains a database of other router’s
links
• If link failure notice is received, router can rapidly
compute an alternate path
22
• Require more memory and CPU power
Static and Dynamic Routers
Static Routers

Dynamic Routers

Manual configuration Manual configuration of the first
of routes
route. Automatic discovery of new
routes
Always use the same Can select the best route
route
More secure
Need manual configuration to
improve security

23
Distinguishing Between Bridges
and Routers
• Bridges forward everything
they don’t recognize
• Routers select the best
path
• Routers are layer 3
devices which recognize
network address
• Bridges are layer 2
devices which look at
the MAC sublayer node
address

24
Layer-3 Switches
• Layer-3 switches operate in both layer 2 (data link layer)
and 3 (network layer)
• Can perform both MAC switching and IP routing
• A combination of switch and router but much faster and
easier to configure than router

Why Layer-3 switches?
• Traffic of LAN is no longer
local
• Speed of LAN is much faster
• Need a much faster router,
however, very expensive
25

Excerpt from www.intel.com
Summary
• Repeaters are the least expensive way to expand a
network, but they are limited to connecting two
segments
• Bridges function similar to repeaters, but can
understand the node addresses
• Switches can be considered as multiport bridges, can
divide a network into some logical channels
• Routers interconnect networks and provide filtering
functions. They can determine the best route
26
B. Remote Access Devices
1. Modems
• Allow computers to
communicate over a
telephone line
• Enable communication
between networks or
connecting to the world
beyond the LAN
27
• Cannot send digital signal directly to telephone line
• Sending end: MODulate the computer’s digital
signal into analog signal and transmits
• Receiving end: DEModulate the analog signal back
into digital form

28
1

0

1

Amplitude
Modulation
Frequency
Modulation
Phase
Modulation
Normal
sine wave

29

1

1
• Modems typically have the following I/O interface:
• A serial RS-232 communication interface
• An RJ-11 telephone-line interface (a telephone
plug)

30

RS-232

RJ-11
Modem Standards
Standard
V.22bis
V.32
V.32bis
V.32terbo

bps Introduced
2,400
1984
9,600
1984
14,400
1991
19,200
1993

V.FastClass 28,800
V.34
28,800
V.42bis
115,200
V.90
56,000

1993
1994
1995
1998
31

Remarks

Communicate only with
another V.32terbo
(V.FC)
Improved V.FC
With compression
Resolved competition
between X2 and Flex56k
Modem Performance Measures
• Baud rate - the number of symbol change per
second on the transmission line
• Bit per second (bps) - number of bits transmitted
per second
• In the past, they are identical
• With compression technique, a change of signal
can mean more than one bits
• 28.8kbaud can mean 115.2kbps when using
32
V.42bis
How V.90 Works
• Modem speed is determined by channel noise level
• The noise level of traditional PSTN (public switch
telephone network) limits data rate to ~35kbps
• 56K modem technology assumes only one analog
link hence noise level is much lower

33
Why V.90 cannot achieve 56kbps in practice?
• The actual data link is 64kbps
• To prevent interference and allow some overhead
data in communication, ITU recommends a lower
rate to 56 kbps
• However, 56 kbps is a theoretical number
• Depending on the quality and length of the analog
link, the actual data rate can range from 30kbps to
53kbps
34
Types of Modem - Asynchronous Modems
• No clocking devices
• Commonly used in telephone networks
• Data is transmitted in a serial stream. Each
character is turned into a string of 8 bits
• Each of these characters is separated by one start
bit and one or two stop bits

35
Types of Modem - Synchronous Modems
• Need clocking devices
• Data are transmitted in blocks
• Used in digital networks

36
Comparison
• Asynchronous modems are relatively simple and
economic
• Large overhead - can be up to 20 to 27% of the
data traffic
• Error control is done by using parity bit or higher
layer protocols, e.g. MNP, V.42
• Synchronous modems are relatively complicated and
expensive
• Seldom use in home market
• Less overhead means higher efficiency
• More sophisticated error control protocol is
37
required
2. ADSL
• ADSL stands for Asymmetric Digital Subscriber
Line
• Particularly suitable for high speed multimedia
communications, general Internet applications
• Asymmetric - downstream 1.5 to 6.1Mbps
upstream 16 to 640kbps
• Digital - mainly for transmitting digital data
still require modulation and demodulation
• Subscriber line - make use of the analog connection
between household and CO
38
ADSL Illustration

normal
voice

2 to 3 miles
subscriber line
Splitter
local loop
low speed
data
high39
speed

Telephone
Company
Why Asymmetric?
• In general Internet applications, downstream often
requires a higher data rate than upstream
• Downstream - file download, video playback
• Upstream - click a link, send a form
• Reducing the
resource for
upstream can
provide more
resource for
downstream
40
Why Subscriber Line?
• By better controlling the length and quality of the
analog connection between household and CO, a
higher data rate can be achieved
Data Rate
Wire Gauge Distance
1.5 or 2 Mbps 24 AWG 18,000 ft
1.5 or 2 Mbps 26 AWG 15,000 ft
6.1 Mbps
24 AWG 12,000 ft
6.1 Mbps
26 AWG
9,000 ft

Wire Size
0.5 mm
0.4 mm
0.5 mm
0.4 mm

Distance
5.5 km
4.6 km
3.7 km
2.7 km

• More than 80% of the current installed subscriber
lines can fulfill this requirement
• Hence no extra cabling is required
41
Architecture of ADSL Services
IS P P O P

C e n tr a l O ffic e
C u s to m e r
P r e m is e s

T e le p h o n e
S w itc h

In te r n e t
F ir e w a ll

ADSL
M odem

N
I
D

DSLAM - Digital subscriber
line access module (central
office ADSL modem pool)

R o u te r

DSLAM

Copper
Loop

DHCP
DNS

T
N
I

T e le p h o n y
S p litte r
42

T r a n s p o r t N e tw o r k L in k
(D S x ; O C x ; fra m e ; A T M )

SNM P
Other DSL Technologies
• HDSL – High speed DSL
2 twisted pair, 12,000 feet
1.5Mbps (DS1) full-duplex
Symmetric
• VDSL – Very high bit rate DSL
Downstream: 52 Mbps (SONET STS-1) over 1000
feet; or 15 Mbps over 3000 feet
Upstream: 1.5 to 2.3 Mbps
• RDSL – Rate adaptive DSL
43
Intelligent DSL to adjust data rate

Contenu connexe

Tendances

Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devicesRaveena kumari
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices21viveksingh
 
Networking devices
Networking devicesNetworking devices
Networking devicesRavi KC
 
Networking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and DisadvantagesNetworking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and DisadvantagesAnit Thapaliya
 
Internetworking device
Internetworking deviceInternetworking device
Internetworking deviceRay Mkindo
 
Network switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegeNetwork switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegejackmakani
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)Dhani Ahmad
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devicesOnline
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers3Anetwork com
 
Networking devices
Networking devicesNetworking devices
Networking devicesuma swami
 
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric VanderburgCCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric VanderburgEric Vanderburg
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)howare
 

Tendances (20)

Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and DisadvantagesNetworking Devices & Its Advantages and Disadvantages
Networking Devices & Its Advantages and Disadvantages
 
Internetworking device
Internetworking deviceInternetworking device
Internetworking device
 
Network switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom collegeNetwork switch and switching Jenil patel semcom college
Network switch and switching Jenil patel semcom college
 
Interconnecting devies
Interconnecting deviesInterconnecting devies
Interconnecting devies
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
Network hardware essentials Lec#3
Network hardware essentials Lec#3Network hardware essentials Lec#3
Network hardware essentials Lec#3
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric VanderburgCCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
CCNA Routing and Switching Lesson 02 - Network Devices - Eric Vanderburg
 
Bridge
BridgeBridge
Bridge
 
Network devices
Network devicesNetwork devices
Network devices
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
 

En vedette (14)

Network & Internet Working Devices
Network & Internet Working DevicesNetwork & Internet Working Devices
Network & Internet Working Devices
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
NIC AND HUB CONNECTING DEVICES
NIC AND HUB CONNECTING DEVICESNIC AND HUB CONNECTING DEVICES
NIC AND HUB CONNECTING DEVICES
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Modem technology
Modem technologyModem technology
Modem technology
 
Presentation on modem
Presentation on modemPresentation on modem
Presentation on modem
 
Modem presentation
Modem presentationModem presentation
Modem presentation
 
Modem
ModemModem
Modem
 
Networking
NetworkingNetworking
Networking
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similaire à Network Devices Functions and Types

Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Aman Jaiswal
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptMekiPetitSeg
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptSmitNiks
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptssuser2cc0d4
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfADARSHN40
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overviewSyaiful Ahdan
 
BIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.pptBIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.pptAmanyaLaban
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.pptPatrick Theuri
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.pptVimalMallick
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network ComponentsJyoti Akhter
 
Basics Of Networking and routing.ppt
Basics Of Networking and routing.pptBasics Of Networking and routing.ppt
Basics Of Networking and routing.pptNiharikaDubey17
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONAswini Badatya
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptxitwkd
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Aneesh Nelavelly
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdfngusyirga
 

Similaire à Network Devices Functions and Types (20)

8 network devices
8 network devices8 network devices
8 network devices
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdf
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
 
BIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.pptBIT3114 lecture6 WAN.ppt
BIT3114 lecture6 WAN.ppt
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
 
layer2-network-design.ppt
layer2-network-design.pptlayer2-network-design.ppt
layer2-network-design.ppt
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Day 2.1 lan segmentation
Day 2.1 lan segmentationDay 2.1 lan segmentation
Day 2.1 lan segmentation
 
Basics Of Networking and routing.ppt
Basics Of Networking and routing.pptBasics Of Networking and routing.ppt
Basics Of Networking and routing.ppt
 
Ex-1 Network components.pptx
Ex-1 Network components.pptxEx-1 Network components.pptx
Ex-1 Network components.pptx
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
 
Network devices
Network devicesNetwork devices
Network devices
 

Dernier

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Dernier (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Network Devices Functions and Types

  • 2. Functions of network devices • Separating (connecting) networks or expanding network • e.g. repeaters, hubs, bridges, routers, brouters, switches, gateways • Remote access • e.g. 56K Modems and ADSL modems 2
  • 3. A. Expanding Network • Networks cannot be made larger by simply adding new computers and more cables • Less efficient !! • Can install components to • segment (divide) large LAN to form smaller LANs • connect LANs • Required components • Repeaters, bridges, routers, brouters, 3 switches or gateways
  • 4. a. Repeaters and Hubs • Repeaters or hubs work at the OSI physical layer to regenerate the network’s signal and resend them to other segments • Primitive hub can be viewed as a multiport repeater • It regenerates data and broadcasts them to all ports Hub 4
  • 5. Limitations and Features • Cannot link unlike segments • Cannot join segments with different access methods (e.g. CSMA/CD and token passing) • Do not isolate and filter packets • Can connect different types of media • The most economic way of expanding networks 5
  • 6. b. Bridges • Has one input and one output • Used to isolate network traffic and computers • Has the intelligent to examine incoming packet source and destination addresses • But cannot interpret higherlevel information • Hence cannot filter packet according to its protocol 6
  • 7. How Bridges Work • Bridges work at the Media Access Control Sublayer of the OSI model • Routing table is built to record the segment no. of address • If destination address is in the same segment as the source address, stop transmit • Otherwise, forward to 7 the other segment
  • 8. Creating a Switching Table • Based on the addresses of the sending computers • New addresses are added if they are not in the table Add02 S 02 D 01 Switching Table Seg 1 Seg 2 Add01 Stop Add03 8 S 01 D 02 01 02
  • 9. Remote Bridges • Bridges are often used in large networks that have widely dispersed segments • Remote bridges can be used to connect remote segments via data-grade telephone line 9
  • 10. Differences Between Bridges and Repeaters Repeaters Bridges OSI layer Physical layer Data link layer Data regeneration Regenerate data at the signal level Regenerate data at the packet level Yes Reduce network No traffic 10
  • 11. c. Switches • Switches operate at the Data Link layer (layer 2) of the OSI model • Can interpret address information • Switches resemble bridges and can be considered as multiport bridges • By having multiports, can better use limited bandwidth and prove more cost-effective than bridge 11 Cisco Catalyst 2900 switch
  • 12. • Switches divide a network into several isolated channels • Packets sending from 1 channel will not go to another if not specify • Each channel has its own capacity and need not be shared with other channels Hub 3.3Mbps 10Mbps 3.3Mbps Switch 3.3Mbps 10Mbps 10Mbps 12 10Mbps
  • 13. Advantages of Switches • Switches divide a network into several isolated channels (or collision domains) • Reduce the possibility of collision • Collision only occurs when two devices try to get access to one channel • Can be solved by buffering one of them for later access • Each channel has its own network capacity • Suitable for real-time applications, e.g. video conferencing • Since isolated, hence secure • Data will only go to the13destination, but not others
  • 14. Limitations of Switches • Although contains buffers to accommodate bursts of traffic, can become overwhelmed by heavy traffic • Device cannot detect collision when buffer full • CSMA/CD scheme will not work since the data channels are isolated, not the case as in Ethernet • Some higher level protocols do not detect error • E.g. UDP • Those data packets are continuously pumped to the switch and introduce more problems 14
  • 15. Method of Switching - Cut Through Mode Preamble Des. Add 7 1 2/6 Bytes Byte Bytes Sour. Add 2/6 Bytes Length Data FCS 2 46 - 1500 Bytes 4 Bytes Bytes • Read the first 14 bytes of each packet, then transmit • Much faster • Cannot detect corrupt packets • Can propagate the corrupt packets to the network • Best suited to small workgroups 15
  • 16. Method of Switching - Store and Forward Mode • Read the whole packet before transmit • Slower than the cut-through mode • More accurate since corrupt packets can be detected using the FCS • More suit to large LAN since they will not propagate error packets • Facilitate data DB 100Mbps transfer between segments of different speed 16 10Mbps
  • 17. Using Switches to Create VLANs • Switches can logically group together some ports to form a virtual local area network (VLAN) SW1 SW2 SW3 VLAN1 VLAN2 Hub Hub Switches can be configured to communicate only within the devices in the group Hub 17
  • 18. d. Routers • Layer 2 Switches cannot take advantage of multiple paths • Routers work at the OSI layer 3 (network layer) • They use the “logical address” of packets and routing tables to determine the best path for data delivery 18
  • 19. How Routers Work • As packets are passed from routers to routers, Data Link layer source and destination addresses are stripped off and then recreated • Enables a router to route a packet from a TCP/IP Ethernet network to a TCP/IP token ring network • Only packets with known network addresses will be passed - hence reduce traffic • Routers can listen to a network and identify its busiest part • Will select the most cost effective path for 19 transmitting packets
  • 20. How Routing Table is formed • Routing table is formed based on communications between routers using “Routing Protocols” • Routing Protocols ≠ Routable Protocol • Routing Protocols collect data about current network status and contribute to selection of the best path Routers communicate within themselves 20
  • 21. Routing Protocol Example - RIP for IP Routing • RIP (Routing Information Protocol) ― the oldest one • Use no. of hops between nodes to determine best path • Does not consider the network congestion condition • Broadcast every 30 sec the routing table to neighbouring routers to convey routing information • RIP is limited to interpreting a maximum of 16 hops • Not suitable for large network (e.g. Internet) • Can create excessive network traffic due to broadcasting 21 • May take a long time to reach the far reaches
  • 22. Routing Protocol Example - OSPF for IP • OSPF - Open Shortest Path First • Make up the limitations of RIP - can coexist with RIP • In general case, best path refers to the shortest path • In case of traffic congestion, can go a longer path • Each router maintains a database of other router’s links • If link failure notice is received, router can rapidly compute an alternate path 22 • Require more memory and CPU power
  • 23. Static and Dynamic Routers Static Routers Dynamic Routers Manual configuration Manual configuration of the first of routes route. Automatic discovery of new routes Always use the same Can select the best route route More secure Need manual configuration to improve security 23
  • 24. Distinguishing Between Bridges and Routers • Bridges forward everything they don’t recognize • Routers select the best path • Routers are layer 3 devices which recognize network address • Bridges are layer 2 devices which look at the MAC sublayer node address 24
  • 25. Layer-3 Switches • Layer-3 switches operate in both layer 2 (data link layer) and 3 (network layer) • Can perform both MAC switching and IP routing • A combination of switch and router but much faster and easier to configure than router Why Layer-3 switches? • Traffic of LAN is no longer local • Speed of LAN is much faster • Need a much faster router, however, very expensive 25 Excerpt from www.intel.com
  • 26. Summary • Repeaters are the least expensive way to expand a network, but they are limited to connecting two segments • Bridges function similar to repeaters, but can understand the node addresses • Switches can be considered as multiport bridges, can divide a network into some logical channels • Routers interconnect networks and provide filtering functions. They can determine the best route 26
  • 27. B. Remote Access Devices 1. Modems • Allow computers to communicate over a telephone line • Enable communication between networks or connecting to the world beyond the LAN 27
  • 28. • Cannot send digital signal directly to telephone line • Sending end: MODulate the computer’s digital signal into analog signal and transmits • Receiving end: DEModulate the analog signal back into digital form 28
  • 30. • Modems typically have the following I/O interface: • A serial RS-232 communication interface • An RJ-11 telephone-line interface (a telephone plug) 30 RS-232 RJ-11
  • 31. Modem Standards Standard V.22bis V.32 V.32bis V.32terbo bps Introduced 2,400 1984 9,600 1984 14,400 1991 19,200 1993 V.FastClass 28,800 V.34 28,800 V.42bis 115,200 V.90 56,000 1993 1994 1995 1998 31 Remarks Communicate only with another V.32terbo (V.FC) Improved V.FC With compression Resolved competition between X2 and Flex56k
  • 32. Modem Performance Measures • Baud rate - the number of symbol change per second on the transmission line • Bit per second (bps) - number of bits transmitted per second • In the past, they are identical • With compression technique, a change of signal can mean more than one bits • 28.8kbaud can mean 115.2kbps when using 32 V.42bis
  • 33. How V.90 Works • Modem speed is determined by channel noise level • The noise level of traditional PSTN (public switch telephone network) limits data rate to ~35kbps • 56K modem technology assumes only one analog link hence noise level is much lower 33
  • 34. Why V.90 cannot achieve 56kbps in practice? • The actual data link is 64kbps • To prevent interference and allow some overhead data in communication, ITU recommends a lower rate to 56 kbps • However, 56 kbps is a theoretical number • Depending on the quality and length of the analog link, the actual data rate can range from 30kbps to 53kbps 34
  • 35. Types of Modem - Asynchronous Modems • No clocking devices • Commonly used in telephone networks • Data is transmitted in a serial stream. Each character is turned into a string of 8 bits • Each of these characters is separated by one start bit and one or two stop bits 35
  • 36. Types of Modem - Synchronous Modems • Need clocking devices • Data are transmitted in blocks • Used in digital networks 36
  • 37. Comparison • Asynchronous modems are relatively simple and economic • Large overhead - can be up to 20 to 27% of the data traffic • Error control is done by using parity bit or higher layer protocols, e.g. MNP, V.42 • Synchronous modems are relatively complicated and expensive • Seldom use in home market • Less overhead means higher efficiency • More sophisticated error control protocol is 37 required
  • 38. 2. ADSL • ADSL stands for Asymmetric Digital Subscriber Line • Particularly suitable for high speed multimedia communications, general Internet applications • Asymmetric - downstream 1.5 to 6.1Mbps upstream 16 to 640kbps • Digital - mainly for transmitting digital data still require modulation and demodulation • Subscriber line - make use of the analog connection between household and CO 38
  • 39. ADSL Illustration normal voice 2 to 3 miles subscriber line Splitter local loop low speed data high39 speed Telephone Company
  • 40. Why Asymmetric? • In general Internet applications, downstream often requires a higher data rate than upstream • Downstream - file download, video playback • Upstream - click a link, send a form • Reducing the resource for upstream can provide more resource for downstream 40
  • 41. Why Subscriber Line? • By better controlling the length and quality of the analog connection between household and CO, a higher data rate can be achieved Data Rate Wire Gauge Distance 1.5 or 2 Mbps 24 AWG 18,000 ft 1.5 or 2 Mbps 26 AWG 15,000 ft 6.1 Mbps 24 AWG 12,000 ft 6.1 Mbps 26 AWG 9,000 ft Wire Size 0.5 mm 0.4 mm 0.5 mm 0.4 mm Distance 5.5 km 4.6 km 3.7 km 2.7 km • More than 80% of the current installed subscriber lines can fulfill this requirement • Hence no extra cabling is required 41
  • 42. Architecture of ADSL Services IS P P O P C e n tr a l O ffic e C u s to m e r P r e m is e s T e le p h o n e S w itc h In te r n e t F ir e w a ll ADSL M odem N I D DSLAM - Digital subscriber line access module (central office ADSL modem pool) R o u te r DSLAM Copper Loop DHCP DNS T N I T e le p h o n y S p litte r 42 T r a n s p o r t N e tw o r k L in k (D S x ; O C x ; fra m e ; A T M ) SNM P
  • 43. Other DSL Technologies • HDSL – High speed DSL 2 twisted pair, 12,000 feet 1.5Mbps (DS1) full-duplex Symmetric • VDSL – Very high bit rate DSL Downstream: 52 Mbps (SONET STS-1) over 1000 feet; or 15 Mbps over 3000 feet Upstream: 1.5 to 2.3 Mbps • RDSL – Rate adaptive DSL 43 Intelligent DSL to adjust data rate