n etworking h ardware ( networking devices ). o bjectives identify major hardware devices in a...

Post on 29-Dec-2015

217 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

NETWORKING HARDWARE (NETWORKING

DEVICES)

OBJECTIVES Identify major hardware devices in a computer

network Describe the factors involved in choosing a

network adapter, hub, switch, or router Describe the functions of repeaters, hubs,

bridges, switches, and gateways Identify problems associated with connectivity

hardware

2

NETWORKING DEVICES Device: Equipment that connects directly to a network

segment.End user devices or hosts

Hosts are devices that connect directly to a network segment. It includes: Computers (Client / Servers), Printers, Scanners, etc.

Network Devices:Include all devices that connect the end-user devices to

allow them communicate.

3

NETWORK ADAPTERS Also called network interface cards (NICs) Connectivity devices enabling a workstation, server,

printer, or other node to receive and transmit data over the network media

In most modern network devices, network adapters contain the data transceiver.

The NIC controls the host’s access to the medium. Translates parallel signals produced by the computer

into serial format that is sent over the network. The MAC address is hard coded onto the NIC.

4

NETWORK INTERFACE CARD - NIC Transceiver:

Send and receive signalsConvert one type of signal (or connector)

into another. Internal and / or External Layer 1 device. It looks only at bits and not

at any address information or higher level protocols

5

NETWORK INTERFACE CARD

6

FROM PARALLEL TO SERIAL, AND VICE VERSA

7

SELECTING A NETWORK CARD Consider the following factors

Network Architecture or LAN Technology: Ethernet, Token Ring, FDDI, etc.

Type of Media: Thinnet or 10Base2, Thicknet or 10Base5, 10BaseT, Fiber Optic)

Data Transfer SpeedType of System Bus:

ISA, EISA, Microchanel, PCI, PCIMCA)Some NICs connect through SCSI busSome NICs use USB Integrated on the Motherboard

8

AN ETHERNET NIC

9

TYPES OF NETWORK ADAPTERS

PCMIADeveloped in early 1990s to provide standard interface for

connecting any type of device to a portable computerMore commonly known as PC Cards

USB (universal serial bus) portStandard external bus that can be used to connect multiple

types of peripherals A parallel port network adapter Wireless network adapters A variety of Ethernet network adapters

10

TYPES OF NETWORK ADAPTERS

PCMIADeveloped in early 1990s to provide standard interface for

connecting any type of device to a portable computerMore commonly known as PC Cards

11

TYPES OF NETWORK ADAPTERS

USB (universal serial bus) portStandard external

bus that can be used to connect multiple types of peripherals

12

TYPES OF NETWORK ADAPTERS

A parallel port network adapter 13

TYPES OF NETWORK ADAPTERS

Wireless network adapters

14

TYPES OF NETWORK ADAPTERS

Ethernet network adapters for printers

15

NETWORK DEVICES

Provide transport for the data that needs to be transferred between end-user devices.

Extend cable connections Concentrate connections Convert Data Formats Manage data transfer

16

CONNECTIVITY DEVICES Each topology and network architecture has its

limits. Beyond a point networks networks can not be

expanded by simple adding more servers or cabling

Connectivity devices are the basic building blocks of network expansion

Are used to connect separate segments of the network or inter-network

A segment is a portion of the network transmission media that is assigned a network address.

17

CREATING LARGER NETWORKS

Physically expand the network

Segment network to filter traffic

Extend network to connect separate LANs

Connect two separate computer environments

18

DEVICES TO EXPAND NETWORKS

Repeaters BridgesSwitchesRoutersGateway

19

INTERNETWORK CONNECTIVITY DEVICES

Routers Gateways

20

A repeater can be used to increase the length of your network by eliminating the effect of attenuation on the signal.

A repeater contains one input port and one output port, so it is capable only of receiving and repeating a data stream.

It connects two segments of the same network, overcoming the distance limitations of the transmission media.

Repeaters are suited only to bus topology. Some repeaters also serve as transmission media adapters,

connecting two different types of media.

REPEATERS

21

Repeaters repeat signalsClean and boost digital transmissionAnalog networks use amplifiers to boost signal

Repeaters only work with the physical signalCannot reformat, resize, or manipulate the data

Physical layer (layer 1) device.

REPEATERS

22

REPEATERS

23

REPEATERS

24

A hub is referred as a concentrator or a multiport repeater containing multiple ports to interconnect multiple devices

A hub accepts signals from a transmitting node and repeats those signals to all other connected nodes in a broadcast fashion.

All devices connected to a hub share the same amount of bandwidth and the same collision domain.

Regenerate and repeat signals Propagate signals through the network Can not filter network traffic Can not determine the best path 25

HUB

26

HUB

ADVANTAGES AND DISADVANTAGES OF REPEATERS AND HUBS Advantages of using repeaters

Extend network physical distanceDo not seriously affect network performanceSpecial repeaters connect different media

Copper to fiber Disadvantages of using repeaters

Cannot connect different network architecturesToken Ring and Ethernet

Cannot reduce network traffic27

Disadvantages of using repeaters Do not segment the network

Repeat everything without discriminationNumber of repeaters must be limited

Repeaters are part of a collision domain

ADVANTAGES AND DISADVANTAGES OF REPEATERS AND HUBS

28

Layer 2 (Data Link Layer) device.Divide a network into segments and filter traffic. Each segment is a collision domain.Limit or filter traffic keeping local traffic local yet allow connectivity to other parts (segments)Forward or drop framesCannot filter broadcastsMAC to segment # tableMAC to segment # table initial developmentMake decision based on the MAC address listConnect different architectures and Forward packets between architectures: Ethernet & Token-Ring.

BRIDGES

29

Addresses are 6 bytes long Generally written in hexadecimal Globally unique (unicast)

00.0C.12.34.AB.CD - legal FF.FF.FF.FF.FF.FF - legal 00.00.01.10.45.G2 - illegal

To ensure a unique MAC address, the Ethernet card manufacturers encode the MAC address onto the card, usually in a ROM chip. The first half of the address identifies the manufacturer of the card. This code, which is assigned to each manufacturer by the IEEE, is called the organizationally unique identifier (OUI). Each manufacturer assigns a MAC address with its own OUI as the first half of the address, with the second half of the address being assigned a number that this manufacturer has never used on another card

MAC ADDRESS

30

31

BRIDGES

32

Creating a Forwarding Table• Based on the addresses of the sending computers• New addresses are added if they are not in the table

Add01

Add03

Add02

S 01 D 02

Forwarding tableSeg 1 Seg 2

01

02Stop

S 02 D 01

BRIDGES

33

BRIDGES

Transparent bridges are also called learning bridges. Build a table of MAC addresses as frames arrive Ethernet networks use transparent bridges. Token Ring networks use source-routing bridges. Translation bridges Connect networks with different

network architecture, example: Token ring connecting to Ethernet.

34

BRIDGES

ADVANTAGES AND DISADVANTAGES OF BRIDGES

35

Subdivide a network into smaller logical pieces. Switches operate at the Data Link layer (layer 2) of the OSI

model. Can interpret address information. Switches resemble bridges and can be considered as a high

speed multiport bridge. Replacing repeaters & hubs in UTP Switches maintain a switching table. Dedicated bandwidth to each port, making data transmission

more efficient. Each port can use full 10/100/1000 Mbps. 36

SWITCHES

As a multiport device, it can better use limited bandwidth and prove more cost-effective than bridge.

Switches divide a network into several isolated channels. Packets sending from 1 channel will not go to another if

not specified. Each channel has its own capacity and need not be shared

with other channels. Switch is combination

of hub and bridge.

37

SWITCHES

Switch is combination of hub and bridge. Workstations that connect to hub are on shared segment. Workstations that connect to switch are on switched

segment.

38

SWITCHES

39

SWITCHES

40

SWITCHES

Full duplex switch allows for simultaneous transmission and reception of data to and from workstation.

Full duplex connection helps to eliminate collisions. To support full duplex connection to switch, two sets

of wires are necessary - one for receive operation and one for transmit operation.

41

SWITCHES

TYPES OF SWITCHES – CUT THROUGH SWITCH

Read only address information in MAC layer head before beginning processing.

After reading destination address, switch consults an address look up table to determine which port on switch this frame should be forwarded to.

Once address look up is completed, point-to-point connection is created and frame is immediately forwarded.

42

Preamble Des. Add Sour. Add Length Data FCS

7 Bytes

2/6 Bytes

2/6 Bytes

2 Bytes

46 - 1500 Bytes 4 Bytes

1 Byte

TYPES OF SWITCHES- STORE AND FORWARD

Store and Forward switches – read entire frame into shared memory area in switch.

Contents of transmitted Frame Check Sequence (FCS) field is read and compared to locally recalculated frame check sequence.

If results match, switch consults address look up table, builds appropriate point-to-point connection, and forwards frame.

43

TYPES OF SWITCHES- ERROR FREE CUT THROUGH

SWITCHES Error free cut through switches – read both addresses

and frame check sequences for every frame. Frames are forwarded immediately to destination nodes

in an identical fashion to cut through switches. Should bad frames be forwarded, error free cut through

switch is able to reconfigure those individual ports producing bad frames to use store and forward switching.

As errors diminish to preset thresholds, port is set back to cut through switching for higher performance throughput.

44

USING SWITCHES TO CREATE VLANS

Virtual local area networks (VLANs)Network within a network that is logically defined by

grouping its devices’ switch ports in the same broadcast domain.

Switches can logically group together some ports to form a virtual local area network (VLAN)

45

46

Switches can be configured to communicate only within the devices in the group

HubHub

Hub

SW1

SW2

SW3

VLAN1 VLAN2

USING SWITCHES TO CREATE VLANS

HIGHER-LAYER SWITCHES

Switch capable of interpreting Layer 3 data is called a Layer 3 switch

Switch capable of interpreting Layer 4 data is called a Layer 4 switch

These higher-layer switches may also be called routing switches or application switches

47

Advantages of switchesIncrease available network bandwidthReduced workload, computers only receive packets

intended for them specificallyIncrease network performanceSmaller collision domains

SWITCHES

48

Disadvantages of switchesMore expensive than hubs and bridgesDifficult to trace network connectivity problems

through a switchDoes not filter broadcast traffic

SWITCHES

49

SWITCHES

50

ROUTERS

Multiport connectivity device Can integrate LANs and WANs running at different

transmission speeds and using a variety of protocols Routers operate at the Network layer (Layer 3) of the OSI

Model. Connect networks with multiple paths between network

segments (subnets) Make decisions based on the network address. Connect different layer 2 technologies (ethernet, Token

Ring, FDDI, etc.) Have become the backbone for the Internet, running the

IP protocol. 51

ROUTERS

Its purpose is to:examine incoming messages (layer 3 data), choose the best path for them through the network, and switch them to the proper outgoing port.

They don’t allow bad data or broadcast storm to be passed on the network.

They can connect networks using the same protocol but different network architecture.

52

ROUTERS Calculates the optimal path to a particular network

Reroute packets if a path is not available Routing tables stored in the router list all known addresses

and possible paths. Consist of hardware and software

Hardware Network server, separate computer, special black box Physical interface for various networks

Software Operating system and Routing protocol

53

ROUTER FEATURES AND FUNCTIONS

Filter out broadcast transmission to alleviate network congestion

Support simultaneous local and remote activity Provide high network fault tolerance through redundant

components. Monitor network traffic and report statistics to a MIB Diagnose internal or other connectivity problems and trigger

alarms. Routers often incorporate firewall functions. A router accepts an outgoing packet, removes any LAN

headers and trailers, and encapsulates the necessary WAN headers and trailers

Because a router has to make wide area network routing decisions, the router has to dig down into the network layer of the packet to retrieve the network destination address

54

Static routingTechnique in which a network administrator programs a

router to use a specified paths between nodes Dynamic routing

Automatically calculates best path between nodes and accumulates this information in a routing table

HopTerm used in networking to describe each trip data take

from one connectivity device to another

55

ROUTER FEATURES AND FUNCTIONS

56

Static Routers Dynamic Routers

Manual configurationof routes

Manual configuration of the firstroute. Automatic discovery of newroutes

Always use the sameroute

Can select the best route

More secure Need manual configuration toimprove security

ROUTER FEATURES AND FUNCTIONS

57

ROUTER FEATURES AND FUNCTIONS

ROUTING PROTOCOLS

To determine the best path, routers communicate with each other through routing protocols

In addition to its ability to find the best path, a routing protocol can be characterized according to its convergence time and bandwidth overheadConvergence time

The time it takes for a router to recognize a best path in the event of a change or outage

Bandwidth overheadBurden placed on an underlying network to support the

routing protocol58

ROUTING PROTOCOLS

The four most common routing protocols:RIP (Routing Information Protocol) for IP and IPXOSPF (Open Shortest Path First) for IPEIGRP (Enhanced Interior Gateway Routing Protocol)

for IP, IPX, and AppleTalkBGP (Border Gateway Protocol) for IP

59

BROUTERS AND ROUTING SWITCHES

Bridge routerAlso called a brouterIndustry term used to describe routers that take on

some characteristics of bridges Routing switch

Router hybrid that combines a router and a switch.Another name to switch layer 3.

60

PHYSICAL VERSUS LOGICAL ADDRESSES

MAC addressesData Link layer applicationUsed by switches, bridges, and routersUsed for directly connected devices

Logical addressesNetwork and transport protocols dictate the format of

the logical network layer addressTCP/IP, IPX/SPXIP addresses are assigned manually or by software

61

ADVANTAGES AND DISADVANTAGES OF

ROUTERS

Advantages of routers Can connect networks of different architecture

Token Ring to Ethernet Choose best path through or to a network Create smaller collision domains Create smaller broadcast domains

Disadvantages of routers Only work with routable protocols More expensive than hubs, bridges, and switches Routing table updates consume bandwidth Increase latency due to a greater degree of packet

filtering and/or analyzing62

ROUTERS

63

BROUTERS

Hybrid device Functions as a router for routable

protocols Functions as a bridge for non-routable

protocols Operates at Data Link and Network layers

64

GATEWAYS

Combination of networking hardware and software that connects two dissimilar kinds of networks

Translate between different protocol suites Operates on all 7 layers of the OSI model Most negative on network performance

Latency Popular types of gateways include:

E-mail gatewaysIBM host gatewaysInternet gatewaysLAN gateways

65

top related