SlideShare une entreprise Scribd logo
1  sur  23
1Lesson 2—Networking BASICS
Networking BASICS
Network Media
Unit 1
Lesson 2
Lesson 2—Networking BASICS2
Types of Networks
• There are two types of
networks by which
information is transmitted:
– circuit switched networks
– packet switched networks
Lesson 2—Networking BASICS3
Circuit Switched Network
• There is a dedicated and direct physical
connection between sender and receiver.
• No other transmissions can take place while
the connection is active.
• Once the transmission is ended, other
connections can be made with other devices.
• It is ideal for voice communications because
there are no interruptions from other devices
or delays.
Lesson 2—Networking BASICS4
Packet Switched Network
• This network requires data transmission be broken
into smaller units called packets.
• Each packet is sent independently through the
network.
• It is used for data transmission because data is not
as time-sensitive as voice communication.
• It allows multiple devices to share one line or
frequency.
• It facilitates error correction.
Lesson 2—Networking BASICS5
Signaling Techniques
• There are two ways that a
signal is sent across a
network medium:
– baseband signaling
– broadband signaling
Lesson 2—Networking BASICS6
Baseband Signaling
• Sends one data signal across the network
media
• Entire capacity of the media is used for the
one data signal
• Signals are transmitted in a digital format
• Many devices can send and receive across
the medium, but only one at a time
Lesson 2—Networking BASICS7
Baseband Signaling
Lesson 2—Networking BASICS8
Broadband Signaling
• Divides the cable into several different
channels
• Signals are transmitted at different
frequencies in an analog mode
• Allows many different signals to be sent
simultaneously on a single cable
• Signal sent in only one direction
• Used for computer network data
transmissions
Lesson 2—Networking BASICS9
Broadband Signaling
Lesson 2—Networking BASICS10
Factors Affecting Transmissions
• The flow of a signal down the
network media can become
distorted.
• Common types of distortions are
attenuation and interference.
Lesson 2—Networking BASICS11
Attenuation
• Loss of signal power
• Measured by the decrease
in decibels (db) over a
specific distance
Lesson 2—Networking BASICS12
Interference
• Interference is caused when a strong external signal
interferes with a signal.
• Radio frequency interference (RFI) - interference
caused by broadcast signals from a radio or
television transmitter.
• Electromagnetic interference (EMI) - motor or
source of intense electrical activity creates an
electromagnetic signal that interferes with a data
signal.
• Near end crosstalk (NEXT) and Far end crosstalk
(FEXT) - interference from another data signal being
transmitted on adjacent wire.
Lesson 2—Networking BASICS13
Transmission Media
•Copper cables
•Fiber optic cables
•Wireless
Lesson 2—Networking BASICS14
Copper Cables
• Thin coaxial
• Shielded twisted pair (STP)
• Unshielded twisted pair
(UTP)
• UTP rated by Category 1 - 6
Lesson 2—Networking BASICS15
Copper Cables
Lesson 2—Networking BASICS16
Copper Cables
Lesson 2—Networking BASICS17
Fiber Optic
• This cable uses a thin cylinder of glass to
send light impulses.
• The cable consists of a strand of glass (core)
surrounded by a glass tube (cladding).
• Single mode - one light source flashes a light
down the cable.
• Multimode - supports many simultaneous
light transmissions.
Lesson 2—Networking BASICS18
Fiber Optic
Lesson 2—Networking BASICS19
Wireless
• Transmission is sent and received through
invisible waves
• Less expensive than copper or fiber optic
lines.
• Allows the user to move freely around the
office or campus and still remain connected
to the network
• Fastest-growing segment of network media
today
Lesson 2—Networking BASICS20
Wireless Transmissions
• Infrared transmits data using infrared (IR)
light.
• IR shares many of the same properties as
visible light .
• Radio frequency signals can be transmitted
over radio waves similar to local radio station
transmissions.
• The signal comes in at a lower power level
and does not reach as far.
Lesson 2—Networking BASICS21
Network Interface Card
• The NIC serves as the connection between
the personal computer and the network
media.
• It connects to the computer on its base by
plugging into an expansion slot of the
computer.
• Another connection is accessible from the
outside of the computer and has connections
for the cables to plug into the network.
Lesson 2—Networking BASICS22
Network Interface Card
• Changes from parallel to
serial transmission
• Creates packets
• Determines when to send
• Transmits packet
Lesson 2—Networking BASICS23
Network Interface Card

Contenu connexe

Tendances

Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerAbdelkhalik Mosa
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided mediaHassan Osama
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionRK Nayak
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Repeater and hub
Repeater and hubRepeater and hub
Repeater and hubMDSHABBIR12
 
Dispositivos de interconexion
Dispositivos de interconexionDispositivos de interconexion
Dispositivos de interconexionJaydiver23
 
Protocolos de la capa de red
Protocolos de la capa de redProtocolos de la capa de red
Protocolos de la capa de redEduardo J Onofre
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 

Tendances (20)

Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
HiperLAN.ppt
HiperLAN.pptHiperLAN.ppt
HiperLAN.ppt
 
Hub,Switch.Router
Hub,Switch.RouterHub,Switch.Router
Hub,Switch.Router
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided media
 
WLAN
WLANWLAN
WLAN
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
network Switch
 network Switch network Switch
network Switch
 
Repeater and hub
Repeater and hubRepeater and hub
Repeater and hub
 
Dispositivos de interconexion
Dispositivos de interconexionDispositivos de interconexion
Dispositivos de interconexion
 
Protocolos de la capa de red
Protocolos de la capa de redProtocolos de la capa de red
Protocolos de la capa de red
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 

En vedette (20)

Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
 
Unguided media in Networks
Unguided media in NetworksUnguided media in Networks
Unguided media in Networks
 
Guided media and Unguided media
Guided media and Unguided mediaGuided media and Unguided media
Guided media and Unguided media
 
Ring topologoy
Ring  topologoyRing  topologoy
Ring topologoy
 
TREE TOPOLOGY
TREE TOPOLOGY TREE TOPOLOGY
TREE TOPOLOGY
 
Ring topology
Ring topologyRing topology
Ring topology
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
Ch06
Ch06Ch06
Ch06
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
 
Ramadan 2008
Ramadan 2008Ramadan 2008
Ramadan 2008
 
Ch23 system administration
Ch23 system administration Ch23 system administration
Ch23 system administration
 
Ch18 system administration
Ch18 system administration Ch18 system administration
Ch18 system administration
 
Beat Anger
Beat AngerBeat Anger
Beat Anger
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Ch14 system administration
Ch14 system administration Ch14 system administration
Ch14 system administration
 
Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
 
Ch20 system administration
Ch20 system administration Ch20 system administration
Ch20 system administration
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 
Ch03
Ch03Ch03
Ch03
 
Ch04 system administration
Ch04 system administration Ch04 system administration
Ch04 system administration
 

Similaire à Chapter03 a - network media

01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
Network and its concepts
Network and its conceptsNetwork and its concepts
Network and its conceptsHimanshu Sajwan
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
5 Intro to Networking.ppt
5 Intro to Networking.ppt5 Intro to Networking.ppt
5 Intro to Networking.pptOliverCSilvano
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 
HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentationurmishabm
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptTestUser621581
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & MediaSoumyakatkam
 
Bca i-fundamental of computer-u-4-data communication and network
Bca  i-fundamental of  computer-u-4-data communication and networkBca  i-fundamental of  computer-u-4-data communication and network
Bca i-fundamental of computer-u-4-data communication and networkRai University
 
Mca i-fundamental of computer-u-4-data communication and network
Mca  i-fundamental of  computer-u-4-data communication and networkMca  i-fundamental of  computer-u-4-data communication and network
Mca i-fundamental of computer-u-4-data communication and networkRai University
 
Bsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksBsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksRai University
 
Bsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksBsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksRai University
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005SOLOMONCHINAEMEUCHEA
 
Bba i-introduction to computer-u-4-data communication and network
Bba  i-introduction to computer-u-4-data communication and networkBba  i-introduction to computer-u-4-data communication and network
Bba i-introduction to computer-u-4-data communication and networkRai University
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 
Data communication and network
Data communication and networkData communication and network
Data communication and networkHardik Patel
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingZaeem Hassan
 
It fundamentals wired and wireless troubleshooting
It fundamentals   wired and wireless troubleshootingIt fundamentals   wired and wireless troubleshooting
It fundamentals wired and wireless troubleshootingProf. Dr. AMOL KASTURE
 

Similaire à Chapter03 a - network media (20)

01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Network and its concepts
Network and its conceptsNetwork and its concepts
Network and its concepts
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
5 Intro to Networking.ppt
5 Intro to Networking.ppt5 Intro to Networking.ppt
5 Intro to Networking.ppt
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentation
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).ppt
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & Media
 
Bca i-fundamental of computer-u-4-data communication and network
Bca  i-fundamental of  computer-u-4-data communication and networkBca  i-fundamental of  computer-u-4-data communication and network
Bca i-fundamental of computer-u-4-data communication and network
 
Mca i-fundamental of computer-u-4-data communication and network
Mca  i-fundamental of  computer-u-4-data communication and networkMca  i-fundamental of  computer-u-4-data communication and network
Mca i-fundamental of computer-u-4-data communication and network
 
Bsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksBsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networks
 
Bsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksBsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networks
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Bba i-introduction to computer-u-4-data communication and network
Bba  i-introduction to computer-u-4-data communication and networkBba  i-introduction to computer-u-4-data communication and network
Bba i-introduction to computer-u-4-data communication and network
 
osi
osi osi
osi
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Data communication and network
Data communication and networkData communication and network
Data communication and network
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
It fundamentals wired and wireless troubleshooting
It fundamentals   wired and wireless troubleshootingIt fundamentals   wired and wireless troubleshooting
It fundamentals wired and wireless troubleshooting
 

Plus de Raja Waseem Akhtar

Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its toolsRaja Waseem Akhtar
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networksRaja Waseem Akhtar
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking securityRaja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problemsRaja Waseem Akhtar
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networkingRaja Waseem Akhtar
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linuxRaja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networkingRaja Waseem Akhtar
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivityRaja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methodsRaja Waseem Akhtar
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardwareRaja Waseem Akhtar
 

Plus de Raja Waseem Akhtar (20)

The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
 
God is Great
God is GreatGod is Great
God is Great
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
 
Jerusalm at night.pps
Jerusalm at night.ppsJerusalm at night.pps
Jerusalm at night.pps
 
From the sky
From the skyFrom the sky
From the sky
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
 

Dernier

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Dernier (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Chapter03 a - network media

  • 1. 1Lesson 2—Networking BASICS Networking BASICS Network Media Unit 1 Lesson 2
  • 2. Lesson 2—Networking BASICS2 Types of Networks • There are two types of networks by which information is transmitted: – circuit switched networks – packet switched networks
  • 3. Lesson 2—Networking BASICS3 Circuit Switched Network • There is a dedicated and direct physical connection between sender and receiver. • No other transmissions can take place while the connection is active. • Once the transmission is ended, other connections can be made with other devices. • It is ideal for voice communications because there are no interruptions from other devices or delays.
  • 4. Lesson 2—Networking BASICS4 Packet Switched Network • This network requires data transmission be broken into smaller units called packets. • Each packet is sent independently through the network. • It is used for data transmission because data is not as time-sensitive as voice communication. • It allows multiple devices to share one line or frequency. • It facilitates error correction.
  • 5. Lesson 2—Networking BASICS5 Signaling Techniques • There are two ways that a signal is sent across a network medium: – baseband signaling – broadband signaling
  • 6. Lesson 2—Networking BASICS6 Baseband Signaling • Sends one data signal across the network media • Entire capacity of the media is used for the one data signal • Signals are transmitted in a digital format • Many devices can send and receive across the medium, but only one at a time
  • 8. Lesson 2—Networking BASICS8 Broadband Signaling • Divides the cable into several different channels • Signals are transmitted at different frequencies in an analog mode • Allows many different signals to be sent simultaneously on a single cable • Signal sent in only one direction • Used for computer network data transmissions
  • 10. Lesson 2—Networking BASICS10 Factors Affecting Transmissions • The flow of a signal down the network media can become distorted. • Common types of distortions are attenuation and interference.
  • 11. Lesson 2—Networking BASICS11 Attenuation • Loss of signal power • Measured by the decrease in decibels (db) over a specific distance
  • 12. Lesson 2—Networking BASICS12 Interference • Interference is caused when a strong external signal interferes with a signal. • Radio frequency interference (RFI) - interference caused by broadcast signals from a radio or television transmitter. • Electromagnetic interference (EMI) - motor or source of intense electrical activity creates an electromagnetic signal that interferes with a data signal. • Near end crosstalk (NEXT) and Far end crosstalk (FEXT) - interference from another data signal being transmitted on adjacent wire.
  • 13. Lesson 2—Networking BASICS13 Transmission Media •Copper cables •Fiber optic cables •Wireless
  • 14. Lesson 2—Networking BASICS14 Copper Cables • Thin coaxial • Shielded twisted pair (STP) • Unshielded twisted pair (UTP) • UTP rated by Category 1 - 6
  • 17. Lesson 2—Networking BASICS17 Fiber Optic • This cable uses a thin cylinder of glass to send light impulses. • The cable consists of a strand of glass (core) surrounded by a glass tube (cladding). • Single mode - one light source flashes a light down the cable. • Multimode - supports many simultaneous light transmissions.
  • 19. Lesson 2—Networking BASICS19 Wireless • Transmission is sent and received through invisible waves • Less expensive than copper or fiber optic lines. • Allows the user to move freely around the office or campus and still remain connected to the network • Fastest-growing segment of network media today
  • 20. Lesson 2—Networking BASICS20 Wireless Transmissions • Infrared transmits data using infrared (IR) light. • IR shares many of the same properties as visible light . • Radio frequency signals can be transmitted over radio waves similar to local radio station transmissions. • The signal comes in at a lower power level and does not reach as far.
  • 21. Lesson 2—Networking BASICS21 Network Interface Card • The NIC serves as the connection between the personal computer and the network media. • It connects to the computer on its base by plugging into an expansion slot of the computer. • Another connection is accessible from the outside of the computer and has connections for the cables to plug into the network.
  • 22. Lesson 2—Networking BASICS22 Network Interface Card • Changes from parallel to serial transmission • Creates packets • Determines when to send • Transmits packet