SlideShare una empresa de Scribd logo
1 de 52
BSIS IV
NETWORK
COMPUTER NETWORK
• Network consists of two or more entities, or objects, sharing resources and information.
• A computer network consists of two or more computing devices that are connected in order to
share the components of your network (its resources) and the information you store there.
• A computer network can be as simple as two or more computers communicating.
• A computer network is a collection of computers and devices connected together via
communication devices and transmission media. For examples it may connect computers,
printers and scanners.
COMMUNICATION
• Communication describes a process in which two or more computer or
devices transfer data, instructions and information.
THE IMPORTANCE / ADVANTAGE OF COMPUTER
NETWORKS
• Sharing of devices such as printer and scanner
• Sharing of program / software
• Sharing of files
• Sharing of data
• Sharing of information
• Sharing of single high-speed internet connection
• Can access server centered database
• Better communication using internet services such as email, mailing list and Internet Relay
Chat (IRC)
is an application layer protocol that facilitates
communication in the form of text . Example is the
Computerhope.com
• Computers on a network are sometimes called
nodes. Computers and devices that allocate
resources for a network are called servers.
Types of
Computer
Network
LAN MAN WAN
Network
Architecture
Client / Server Peer to Peer
Network
Topologies
Star Ring Bus
Network
Communication
Technology
Intranet Extranet Internet
SUMMARY – NETWORK CLASSIFICATION
SUMMARY – NETWORK CLASSIFICATION
WIDE AREA
NETWORK
(WAN)
SUMMARY – NETWORK CLASSIFICATION
METROPOLITAN
AREA NETWORK
(MAN)
DIFFERENTIATE BETWEEN THE TYPES OF COMPUTER
NETWORK
Different LAN MAN WAN
Cost Low Optic High Higher
Network Size Small Larger Largest
Speed Fastest Slower Slowest
Transmission Media Twisted-pair Twisted-pair
Fiber-optic cables
Fiber-optic
Radio wave
Satellite
Number of Computers Smallest Large Largest
NETWORK ARCHITECTURE
• Network Architecture is the overall design of a computer network that
describes how a computer network is configured and what strategies are
being used.
• It is mainly focuses on the function of the networks.
• It is also known as network model or network design.
• Two main network architecture.
Client/Server Network
Peer to Peer Network
Network
Architecture
THE DIFFERENCES BETWEEN CLIENT/SERVER AND PEER-
TO-PEER
NETWORK TOPOLOGY
• Topology - The geometric arrangement of a computer system.
• STAR
• BUS
• TOKEN - RING
STAR NETWORK
• Star networks are one of the most common computer network topologies. In
its simplest form, a star network consists of one central switch, hub or
computer, which acts as a conduit to transmit messages. This consists of a
central node, to which all other nodes are connected; this central node
provides a common connection point for all nodes through a hub.
• In star topology, every node (computer workstation or any other peripheral) is
connected to a central node called a hub or switch. The switch is the server
and the peripherals are the clients.
ADVANTAGES
• Star networks are very reliable because if one computer or its connection
breaks it doesn’t affect the other computers and their connections.
DISADVANTAGES
• An expensive network layout to install because of the amount of
cables needed.
• If the server crashes or stops working then no computers will be able
to access the network.
BUS NETWORK
• is a network topology in which nodes are directly connected to a common
linear (or branched) half-duplex link called a bus.
• Duplex
A duplex communication system is a point-to-point system composed of two
connected parties or devices that can communicate with one another in both
directions. "Duplex" comes from "duo" that means "two", and "plex" that means
"weave" or "fold"; thus, a duplex system has two clearly defined paths, with each path
carrying information in only one direction: A to B over one path, and B to A over the
other. There are two types of duplex communication systems: full-duplex and half-
duplex.
• In a full duplex system, both parties can communicate with each other
simultaneously. An example of a full-duplex device is a telephone; the parties
at both ends of a call can speak and be heard by the other party
simultaneously.
• A host on a bus network is called a station or workstation. In a bus network,
every station receives all network traffic, and the traffic generated by each
station has equal transmission priority. A bus network forms a single network
segment and collision domain. In order for nodes to transmit on the same bus
simultaneously, they use a media access control technology such as carrier
sense multiple access (CSMA) or a bus master.
• Listen to the line. Send if line is free.
• If collision occurs – pick a random waiting time and try again at that
time.
• If any link or segment of the bus is severed, all network transmission ceases
due to signal bounce caused by the lack of a terminating resistor.
RESISTOR
BUS NETWORK
ADVANTAGES
• Easy to connect a computer or peripheral to a linear bus
• Requires less cable length than a star topology resulting in
lower costs
• It works well for small networks.
• Easy to Extend
DISADVANTAGES
• Entire network shuts down if there is a break in the main cable.
• Terminators are required at both ends of the backbone cable.
• Difficult to identify the problem if the entire network shuts down.
• Not meant to be used as a stand-alone solution in a large building.
• It is slow when more devices are added into the network.
• If a main cable is damaged then network will fail or be split into two networks.
• It is difficult to detect trouble at an individual station.
RING NETWORK
• A ring network is a network topology in which each node connects to exactly
two other nodes, forming a single continuous pathway for signals through
each node - a ring. Data travel from node to node, with each node along the
way handling every packet.
ADVANTAGES
• Very orderly network where every device has access to the token and the
opportunity to transmit
• Performs better than a bus topology under heavy network load
• Does not require a central node to manage the connectivity between the
computers
• Due to the point to point line configuration of devices with a device on either
side (each device is connected to its immediate neighbor), it is quite easy to
install and reconfigure since adding or removing a device requires moving just
two connections.
• Point to point line configuration makes it easy to identify and isolate faults.
• Reconfiguration for line faults of bidirectional rings can be very fast, as
switching happens at a high level, and thus the traffic does not require
individual rerouting
DISADVANTAGES
• One malfunctioning workstation can create problems for the entire
network. This can be solved by using a dual ring or a switch that
closes off the break.
• Moving, adding and changing the devices can affect the network
• Communication delay is directly proportional to number of nodes in
the network
• Bandwidth is shared on all links between devices
• Hubs, switches, and routers are all devices that let you connect one or more
computers to other computers, networked devices, or even other networks.
Each has two or more connectors called ports into which you plug in the
cables to make the connection
HUB
• A hub is typically the least expensive, least intelligent, and least
complicated of the three. Its job is very simple – anything that
comes in one port is sent out to the others.
• That’s it.
• If a message1 comes in for computer “A”, that message is sent out
all the other ports, regardless of which one computer “A” is on:
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS (DEVICE)
• Network Interface Card (NIC)
• Repeater
• Hub
• Bridge
• Routers
• Switch
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS (DEVICE)
Network Interface Card (NIC)
• NIC provides the physical interface between computer and cabling.
• It prepares data, sends data, and controls the flow of data. It can also receive
and translate data into bytes for the CPU to understand.
• The following factors should be taken into consideration when choosing a
NIC:
1. - Preparing data
2. - Sending and controlling data
3. - Configuration
4. - Drivers
5. - Compatibility
6. - Performance
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - REPEATERS
• Repeaters are very simple devices. They allow a cabling
system to extend beyond its maximum allowed length by
amplifying the network voltages so they travel farther.
• Repeaters are nothing more than amplifiers and, as such,
are very inexpensive.
• Repeaters can only be used to regenerate signals between
similar network segments.
HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS -
REPEATERS
• For example, we can extend an Ethernet 10Base2 network to 400
meters with a repeater. But can’t connect an Ethernet and Token
Ring network together with one.
• The main disadvantage to repeaters is that they just amplify
signals. These signals not only include the network signals, but any
noise on the wire as well.
• Eventually, if you use enough repeaters, you could possibly drown
out the signal with the amplified noise. For this reason, repeaters
are used only as a temporary fix.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - REPEATERS
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - HUBS
• Hubs are devices used to link several computers together.
• They repeat any signal that comes in on one port and copy it to the
other ports (a process that is also called broadcasting).
• There are two types of hubs: active and passive.
• Passive hubs simply connect all ports together electrically and are
usually not powered.
• Active hubs use electronics to amplify and clean up the signal
before it is broadcast to the other ports.
• In the category of active hubs, there is also a class called
“intelligent” hubs, which are hubs that can be remotely managed on
the network.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - HUBS
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - BRIDGES
• They join similar topologies and are used to divide network
segments.
• For example, with 200 people on one Ethernet segment, the
performance will be mediocre, because of the design of Ethernet
and the number of workstations that are fighting to transmit. If you
divide the segment into two segments of 100 workstations each,
the traffic will be much lower on either side and performance will
increase.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - BRIDGES
• If it is aware of the destination address, it is able to forward
packets; otherwise a bridge will forward the packets to all
segments. They are more intelligent than repeaters but are
unable to move data across multiple networks
simultaneously.
• Unlike repeaters, bridges can filter out noise.
• The main disadvantage to bridges is that they can’t
connect dissimilar network types or perform intelligent path
selection. For that function, you would need a router.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - BRIDGES
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - ROUTERS
• Routers are highly intelligent devices that connect multiple
network types and determine the best path for sending
data.
• The advantage of using a router over a bridge is that
routers can determine the best path that data can take to
get to its destination.
• Like bridges, they can segment large networks and can
filter out noise.
HARDWARE, SOFTWARE AND NETWORKS
PERIPHERALS - ROUTERS
• However, they are slower than bridges because they are
more intelligent devices; as such, they analyze every
packet, causing packet-forwarding delays. Because of this
intelligence, they are also more expensive.
• Routers are normally used to connect one LAN to another.
• Typically, when a WAN is set up, there will be at least two
routers used.
Network use and configuration

Más contenido relacionado

La actualidad más candente

Network Components
Network ComponentsNetwork Components
Network ComponentsIfrad Mahbub
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devicesRaveena kumari
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devicesAnnajab
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network ComponentsJyoti Akhter
 
Computer network
Computer networkComputer network
Computer networkRahul Das
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologiesmc aa
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)Dhani Ahmad
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th editionEnsign Handoko
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devicesOnline
 
Network Components
Network ComponentsNetwork Components
Network Componentszaisahil
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Computer network
Computer networkComputer network
Computer networkSimran Kaur
 
Networking Components
Networking ComponentsNetworking Components
Networking ComponentsAkNirojan
 

La actualidad más candente (20)

Network Components
Network ComponentsNetwork Components
Network Components
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Network topologies & network devices
Network topologies & network devicesNetwork topologies & network devices
Network topologies & network devices
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Computer network
Computer networkComputer network
Computer network
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th edition
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
Network Components
Network ComponentsNetwork Components
Network Components
 
NETWORKING PPT
NETWORKING PPTNETWORKING PPT
NETWORKING PPT
 
Network Device
Network DeviceNetwork Device
Network Device
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Computer network
Computer networkComputer network
Computer network
 
HUB Device
HUB Device HUB Device
HUB Device
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Network devices
Network devicesNetwork devices
Network devices
 
Computer networkingdevices
Computer networkingdevicesComputer networkingdevices
Computer networkingdevices
 

Similar a Network use and configuration

networking.ppt
networking.pptnetworking.ppt
networking.pptsuchita74
 
Computer networks
Computer networksComputer networks
Computer networkssamina khan
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxEmmanuelNYAMENAAYE
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationJyoti Tewari
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02DeShawn A. Larkin
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005SOLOMONCHINAEMEUCHEA
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxAASTHAJAJOO
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
Computer networking
Computer networkingComputer networking
Computer networkingAbdul Rehman
 
NETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptxNETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptxYasaraDevindi
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfSujanTimalsina5
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxADITYAKUMAR554673
 

Similar a Network use and configuration (20)

networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Computer network
Computer networkComputer network
Computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
computer-network.pptx
computer-network.pptxcomputer-network.pptx
computer-network.pptx
 
B5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptxB5_WEEK 1_COMPUTER NETWORK.pptx
B5_WEEK 1_COMPUTER NETWORK.pptx
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02Computer networkppt-110208141655-phpapp02
Computer networkppt-110208141655-phpapp02
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Computer network
Computer networkComputer network
Computer network
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Computer networking
Computer networkingComputer networking
Computer networking
 
NETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptxNETWORK TESCHNOLOGY.pptx
NETWORK TESCHNOLOGY.pptx
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Networking basics
Networking basicsNetworking basics
Networking basics
 

Más de Mark John Lado, MIT

Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Mark John Lado, MIT
 
Optimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignOptimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignMark John Lado, MIT
 
Embedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfEmbedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfMark John Lado, MIT
 
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Mark John Lado, MIT
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...Mark John Lado, MIT
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
 
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
 
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...Mark John Lado, MIT
 
Dart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoDart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoMark John Lado, MIT
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Mark John Lado, MIT
 
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...Mark John Lado, MIT
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security PoliciesMark John Lado, MIT
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOMark John Lado, MIT
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoMark John Lado, MIT
 

Más de Mark John Lado, MIT (20)

Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
 
Optimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology DesignOptimizing Embedded System Device Communication with Network Topology Design
Optimizing Embedded System Device Communication with Network Topology Design
 
Embedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdfEmbedded Systems IO Peripherals Wireless Communication.pdf
Embedded Systems IO Peripherals Wireless Communication.pdf
 
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado4 Module - Operating Systems Configuration and Use by Mark John Lado
4 Module - Operating Systems Configuration and Use by Mark John Lado
 
3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado1 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado
 
2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado2 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado
 
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
 
Dart Programming Language by Mark John Lado
Dart Programming Language by Mark John LadoDart Programming Language by Mark John Lado
Dart Programming Language by Mark John Lado
 
What is CRUD in TPS?
What is CRUD in TPS?What is CRUD in TPS?
What is CRUD in TPS?
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADO
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 

Último

JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Último (20)

JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Network use and configuration

  • 2. COMPUTER NETWORK • Network consists of two or more entities, or objects, sharing resources and information. • A computer network consists of two or more computing devices that are connected in order to share the components of your network (its resources) and the information you store there. • A computer network can be as simple as two or more computers communicating. • A computer network is a collection of computers and devices connected together via communication devices and transmission media. For examples it may connect computers, printers and scanners.
  • 3.
  • 4. COMMUNICATION • Communication describes a process in which two or more computer or devices transfer data, instructions and information.
  • 5.
  • 6. THE IMPORTANCE / ADVANTAGE OF COMPUTER NETWORKS • Sharing of devices such as printer and scanner • Sharing of program / software • Sharing of files • Sharing of data • Sharing of information • Sharing of single high-speed internet connection • Can access server centered database • Better communication using internet services such as email, mailing list and Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text . Example is the Computerhope.com
  • 7. • Computers on a network are sometimes called nodes. Computers and devices that allocate resources for a network are called servers.
  • 8. Types of Computer Network LAN MAN WAN Network Architecture Client / Server Peer to Peer Network Topologies Star Ring Bus Network Communication Technology Intranet Extranet Internet
  • 9.
  • 10.
  • 11.
  • 12. SUMMARY – NETWORK CLASSIFICATION
  • 13. SUMMARY – NETWORK CLASSIFICATION WIDE AREA NETWORK (WAN)
  • 14. SUMMARY – NETWORK CLASSIFICATION METROPOLITAN AREA NETWORK (MAN)
  • 15. DIFFERENTIATE BETWEEN THE TYPES OF COMPUTER NETWORK Different LAN MAN WAN Cost Low Optic High Higher Network Size Small Larger Largest Speed Fastest Slower Slowest Transmission Media Twisted-pair Twisted-pair Fiber-optic cables Fiber-optic Radio wave Satellite Number of Computers Smallest Large Largest
  • 16. NETWORK ARCHITECTURE • Network Architecture is the overall design of a computer network that describes how a computer network is configured and what strategies are being used. • It is mainly focuses on the function of the networks. • It is also known as network model or network design. • Two main network architecture. Client/Server Network Peer to Peer Network Network Architecture
  • 17.
  • 18.
  • 19. THE DIFFERENCES BETWEEN CLIENT/SERVER AND PEER- TO-PEER
  • 20. NETWORK TOPOLOGY • Topology - The geometric arrangement of a computer system. • STAR • BUS • TOKEN - RING
  • 21. STAR NETWORK • Star networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages. This consists of a central node, to which all other nodes are connected; this central node provides a common connection point for all nodes through a hub. • In star topology, every node (computer workstation or any other peripheral) is connected to a central node called a hub or switch. The switch is the server and the peripherals are the clients.
  • 22.
  • 23. ADVANTAGES • Star networks are very reliable because if one computer or its connection breaks it doesn’t affect the other computers and their connections. DISADVANTAGES • An expensive network layout to install because of the amount of cables needed. • If the server crashes or stops working then no computers will be able to access the network.
  • 24. BUS NETWORK • is a network topology in which nodes are directly connected to a common linear (or branched) half-duplex link called a bus. • Duplex A duplex communication system is a point-to-point system composed of two connected parties or devices that can communicate with one another in both directions. "Duplex" comes from "duo" that means "two", and "plex" that means "weave" or "fold"; thus, a duplex system has two clearly defined paths, with each path carrying information in only one direction: A to B over one path, and B to A over the other. There are two types of duplex communication systems: full-duplex and half- duplex.
  • 25. • In a full duplex system, both parties can communicate with each other simultaneously. An example of a full-duplex device is a telephone; the parties at both ends of a call can speak and be heard by the other party simultaneously.
  • 26.
  • 27.
  • 28. • A host on a bus network is called a station or workstation. In a bus network, every station receives all network traffic, and the traffic generated by each station has equal transmission priority. A bus network forms a single network segment and collision domain. In order for nodes to transmit on the same bus simultaneously, they use a media access control technology such as carrier sense multiple access (CSMA) or a bus master. • Listen to the line. Send if line is free. • If collision occurs – pick a random waiting time and try again at that time. • If any link or segment of the bus is severed, all network transmission ceases due to signal bounce caused by the lack of a terminating resistor.
  • 31. ADVANTAGES • Easy to connect a computer or peripheral to a linear bus • Requires less cable length than a star topology resulting in lower costs • It works well for small networks. • Easy to Extend
  • 32. DISADVANTAGES • Entire network shuts down if there is a break in the main cable. • Terminators are required at both ends of the backbone cable. • Difficult to identify the problem if the entire network shuts down. • Not meant to be used as a stand-alone solution in a large building. • It is slow when more devices are added into the network. • If a main cable is damaged then network will fail or be split into two networks. • It is difficult to detect trouble at an individual station.
  • 33. RING NETWORK • A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way handling every packet.
  • 34. ADVANTAGES • Very orderly network where every device has access to the token and the opportunity to transmit • Performs better than a bus topology under heavy network load • Does not require a central node to manage the connectivity between the computers • Due to the point to point line configuration of devices with a device on either side (each device is connected to its immediate neighbor), it is quite easy to install and reconfigure since adding or removing a device requires moving just two connections. • Point to point line configuration makes it easy to identify and isolate faults. • Reconfiguration for line faults of bidirectional rings can be very fast, as switching happens at a high level, and thus the traffic does not require individual rerouting
  • 35. DISADVANTAGES • One malfunctioning workstation can create problems for the entire network. This can be solved by using a dual ring or a switch that closes off the break. • Moving, adding and changing the devices can affect the network • Communication delay is directly proportional to number of nodes in the network • Bandwidth is shared on all links between devices
  • 36. • Hubs, switches, and routers are all devices that let you connect one or more computers to other computers, networked devices, or even other networks. Each has two or more connectors called ports into which you plug in the cables to make the connection
  • 37. HUB • A hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple – anything that comes in one port is sent out to the others. • That’s it. • If a message1 comes in for computer “A”, that message is sent out all the other ports, regardless of which one computer “A” is on:
  • 38.
  • 39.
  • 40. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (DEVICE) • Network Interface Card (NIC) • Repeater • Hub • Bridge • Routers • Switch
  • 41. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS (DEVICE) Network Interface Card (NIC) • NIC provides the physical interface between computer and cabling. • It prepares data, sends data, and controls the flow of data. It can also receive and translate data into bytes for the CPU to understand. • The following factors should be taken into consideration when choosing a NIC: 1. - Preparing data 2. - Sending and controlling data 3. - Configuration 4. - Drivers 5. - Compatibility 6. - Performance
  • 42. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - REPEATERS • Repeaters are very simple devices. They allow a cabling system to extend beyond its maximum allowed length by amplifying the network voltages so they travel farther. • Repeaters are nothing more than amplifiers and, as such, are very inexpensive. • Repeaters can only be used to regenerate signals between similar network segments.
  • 43. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - REPEATERS • For example, we can extend an Ethernet 10Base2 network to 400 meters with a repeater. But can’t connect an Ethernet and Token Ring network together with one. • The main disadvantage to repeaters is that they just amplify signals. These signals not only include the network signals, but any noise on the wire as well. • Eventually, if you use enough repeaters, you could possibly drown out the signal with the amplified noise. For this reason, repeaters are used only as a temporary fix.
  • 44. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - REPEATERS
  • 45. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - HUBS • Hubs are devices used to link several computers together. • They repeat any signal that comes in on one port and copy it to the other ports (a process that is also called broadcasting). • There are two types of hubs: active and passive. • Passive hubs simply connect all ports together electrically and are usually not powered. • Active hubs use electronics to amplify and clean up the signal before it is broadcast to the other ports. • In the category of active hubs, there is also a class called “intelligent” hubs, which are hubs that can be remotely managed on the network.
  • 46. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - HUBS
  • 47. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - BRIDGES • They join similar topologies and are used to divide network segments. • For example, with 200 people on one Ethernet segment, the performance will be mediocre, because of the design of Ethernet and the number of workstations that are fighting to transmit. If you divide the segment into two segments of 100 workstations each, the traffic will be much lower on either side and performance will increase.
  • 48. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - BRIDGES • If it is aware of the destination address, it is able to forward packets; otherwise a bridge will forward the packets to all segments. They are more intelligent than repeaters but are unable to move data across multiple networks simultaneously. • Unlike repeaters, bridges can filter out noise. • The main disadvantage to bridges is that they can’t connect dissimilar network types or perform intelligent path selection. For that function, you would need a router.
  • 49. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - BRIDGES
  • 50. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - ROUTERS • Routers are highly intelligent devices that connect multiple network types and determine the best path for sending data. • The advantage of using a router over a bridge is that routers can determine the best path that data can take to get to its destination. • Like bridges, they can segment large networks and can filter out noise.
  • 51. HARDWARE, SOFTWARE AND NETWORKS PERIPHERALS - ROUTERS • However, they are slower than bridges because they are more intelligent devices; as such, they analyze every packet, causing packet-forwarding delays. Because of this intelligence, they are also more expensive. • Routers are normally used to connect one LAN to another. • Typically, when a WAN is set up, there will be at least two routers used.