SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
A quick revision on the OSI model.
Network devices.
Networks topologies.
 It is a way of sub-dividing
 a communications                    OSI model
 system into smaller parts        Application layer
 called layers.
                                  Presentation layer
 A layer is a collection of
 conceptually similar               Session layer
 functions that provide            Transport layer
 services to the layer above it    Network layer
 and receives services from
 the layer below it.               Data link layer
                                    Physical layer
 Helps users understand the big picture of networking.
 Helps users understand how hardware and software
  elements function together.
 Makes troubleshooting easier by separating networks
  into manageable pieces.
 Defines terms that networking professionals can use
  to compare basic functional relationships on different
  networks.
Repeater.
Hub.
Bridge.
Router.
A   repeater connects two segments of your network
  cable.
 It retimes and regenerates the signals to proper
  amplitudes and sends them to the other segments.
 Repeaters require a small amount of time to
  regenerate the signal.
 Repeaters work only at the physical layer of the OSI
  network model.
    Is a device for connecting multiple devices together
    and making them act as a single network segment.

 Any   packet entering any port is regenerated and
    broadcast out on all other ports.

 Hubs    are classified as Layer 1 (physical layer) devices
    in the OSI model.
A   bridge reads the outermost section of data on the
  data packet, to tell where the message is going.
 It reduces the traffic on other network segments,
  since it does not send all packets.
 Bridging occurs at the data link layer of the OSI
  model, which means the bridge cannot read IP
  addresses, but only the outermost Hardware Address
  of the packet.
A  bridge and switch are very much alike; a switch
 being a bridge with numerous ports. Switch or Layer
 2 switch is often used interchangeably with bridge.

 Switchesmay operate at one or more OSI layers,
 including physical, data link, network, or transport
 layer.
A  router is used to route data packets between two
  networks.

 It reads the information in each packet to tell where
  it is going.

 Routing occurs at the network layer of the OSI
  model. Which means that Routers can read IP
  addresses .
 Routers do not send broadcast packets or
 corrupted packets. If the routing table does not
 indicate the proper address of a packet, the packet
 is discarded.
Bus    topology.
Star   topology.
Ring   topology.
Mesh    topology.
 Bus
    networks use a common backbone to
 connect all devices.
 Easy  to install.         Ifthere is a problem
 Add and remove             with the cable, the entire
  devices is simple.         network breaks down.
 Cost effective; only a    Sending data takes long
  single cable is used.      time.
 Easy identification of    Limited cable length and
  cable faults.              number of stations.
 Many   home networks use the star topology. A star
  network features a central connection point called a
  "hub" that may be a router or a switch.
 Compared to the bus topology, a star network
  generally requires more cable, but a failure in any
  star network cables will only take down one
  computer's network access and not the entire LAN.
 Better  performance.         High  dependence of the
 Isolation of devices.         system on the central hub.
 Easy to install and wire.    Network size is limited by

 No disruptions to the
                                the number of connections
  network when connecting       that can be made to the
  or removing devices.          hub.
 In a ring network, every device has exactly
  two neighbors for communication purposes.
 All messages travel through a ring in the
  same direction (either "clockwise" or
  "counterclockwise").
 Very  orderly network where       Add/Remove  devices.
  every device has access to the    Limited number of
  token and the opportunity to       devices.
  transmit.
                                    High cost.
 Performs better than a bus
  topology under heavy              Time.
  network load.
 Easy to install.
 Mesh   topologies involve the concept of routes.

 Unlike each of the previous topologies, messages sent
 on a mesh network can take any of several possible
 paths from source to destination.

 Some WANs, most notably the Internet, employ mesh
 routing.
A mesh network in which          Partial mesh networks also exist
every device connects to every   in which some devices connect
other is called a full mesh.     only indirectly to others
 Low   rate of failure.    Add/Remove     devices.


 Low time consuming        Limited   number of
 in sending data.           devices.


 More   secured.
Thank
 You

Más contenido relacionado

La actualidad más candente

Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Networking Topologies in Computers
Networking Topologies in ComputersNetworking Topologies in Computers
Networking Topologies in ComputersAnkur Pandey
 
Networking Basics
Networking BasicsNetworking Basics
Networking BasicsR G Mani
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking SrikantaSahu10
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesMSA Technosoft
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.AnshulAnand21
 
What is network architecture
What is network architecture What is network architecture
What is network architecture Sorcia D'Arceuil
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocolsanishgoel
 

La actualidad más candente (20)

Network architecture
Network architectureNetwork architecture
Network architecture
 
Network And Topology
Network And TopologyNetwork And Topology
Network And Topology
 
Networking Topologies in Computers
Networking Topologies in ComputersNetworking Topologies in Computers
Networking Topologies in Computers
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Lecture2
Lecture2Lecture2
Lecture2
 
Lecture1
Lecture1Lecture1
Lecture1
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
An Introduction to Networking
An Introduction to Networking An Introduction to Networking
An Introduction to Networking
 
Class work 1
Class work 1Class work 1
Class work 1
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
 
Class work4
Class work4Class work4
Class work4
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
networking devices
networking devicesnetworking devices
networking devices
 
Osi model
Osi modelOsi model
Osi model
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocols
 

Destacado (20)

Internetworking
InternetworkingInternetworking
Internetworking
 
Internet protocol v6
Internet protocol v6Internet protocol v6
Internet protocol v6
 
Internetworking fundamentals(networking)
Internetworking fundamentals(networking)Internetworking fundamentals(networking)
Internetworking fundamentals(networking)
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)
 
IPv6
IPv6IPv6
IPv6
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Ipv6
Ipv6Ipv6
Ipv6
 
Ip v4 & ip v6
Ip v4 & ip v6Ip v4 & ip v6
Ip v4 & ip v6
 
IPV6 ppt
IPV6 pptIPV6 ppt
IPV6 ppt
 
Network design
Network designNetwork design
Network design
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Ipv6
Ipv6Ipv6
Ipv6
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
IPv6
IPv6IPv6
IPv6
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 

Similar a Networks 2

Types Of Networks
Types Of NetworksTypes Of Networks
Types Of Networksjia234
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationGajan Hai
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingMayank Jain
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500prabh_in
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx14941
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 

Similar a Networks 2 (20)

Types Of Networks
Types Of NetworksTypes Of Networks
Types Of Networks
 
basic networking
basic networkingbasic networking
basic networking
 
Arvind Singh
Arvind SinghArvind Singh
Arvind Singh
 
networking
networkingnetworking
networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Networking
NetworkingNetworking
Networking
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Networking devices
Networking  devices Networking  devices
Networking devices
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
basiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptxbasiccomponentsofacomputernetwork-210820131631.pptx
basiccomponentsofacomputernetwork-210820131631.pptx
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Network -Lecture Notes
Network -Lecture NotesNetwork -Lecture Notes
Network -Lecture Notes
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 

Más de Course Hero

Online Marketing (Social Media)
Online Marketing (Social Media)Online Marketing (Social Media)
Online Marketing (Social Media)Course Hero
 
Interviewing Skills
Interviewing  Skills Interviewing  Skills
Interviewing Skills Course Hero
 
Social Media & Online Marketing
Social Media & Online Marketing Social Media & Online Marketing
Social Media & Online Marketing Course Hero
 
Voice over Internet Protocol
Voice over Internet ProtocolVoice over Internet Protocol
Voice over Internet ProtocolCourse Hero
 
"GPS" Global Positioning System [PDF]
"GPS" Global Positioning System  [PDF]"GPS" Global Positioning System  [PDF]
"GPS" Global Positioning System [PDF]Course Hero
 
Childhood dreams
Childhood dreamsChildhood dreams
Childhood dreamsCourse Hero
 
How to deal with negative criticism
How to deal with negative criticismHow to deal with negative criticism
How to deal with negative criticismCourse Hero
 

Más de Course Hero (10)

Online Marketing (Social Media)
Online Marketing (Social Media)Online Marketing (Social Media)
Online Marketing (Social Media)
 
Interviewing Skills
Interviewing  Skills Interviewing  Skills
Interviewing Skills
 
Social Media & Online Marketing
Social Media & Online Marketing Social Media & Online Marketing
Social Media & Online Marketing
 
Voice over Internet Protocol
Voice over Internet ProtocolVoice over Internet Protocol
Voice over Internet Protocol
 
Inspiring story
Inspiring storyInspiring story
Inspiring story
 
Networks
Networks Networks
Networks
 
"GPS" Global Positioning System [PDF]
"GPS" Global Positioning System  [PDF]"GPS" Global Positioning System  [PDF]
"GPS" Global Positioning System [PDF]
 
Childhood dreams
Childhood dreamsChildhood dreams
Childhood dreams
 
How to deal with negative criticism
How to deal with negative criticismHow to deal with negative criticism
How to deal with negative criticism
 
Driverless cars
Driverless carsDriverless cars
Driverless cars
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Networks 2

  • 1.
  • 2. A quick revision on the OSI model. Network devices. Networks topologies.
  • 3.  It is a way of sub-dividing a communications OSI model system into smaller parts Application layer called layers. Presentation layer  A layer is a collection of conceptually similar Session layer functions that provide Transport layer services to the layer above it Network layer and receives services from the layer below it. Data link layer Physical layer
  • 4.  Helps users understand the big picture of networking.  Helps users understand how hardware and software elements function together.  Makes troubleshooting easier by separating networks into manageable pieces.  Defines terms that networking professionals can use to compare basic functional relationships on different networks.
  • 6. A repeater connects two segments of your network cable.  It retimes and regenerates the signals to proper amplitudes and sends them to the other segments.  Repeaters require a small amount of time to regenerate the signal.  Repeaters work only at the physical layer of the OSI network model.
  • 7. Is a device for connecting multiple devices together and making them act as a single network segment.  Any packet entering any port is regenerated and broadcast out on all other ports.  Hubs are classified as Layer 1 (physical layer) devices in the OSI model.
  • 8. A bridge reads the outermost section of data on the data packet, to tell where the message is going.  It reduces the traffic on other network segments, since it does not send all packets.  Bridging occurs at the data link layer of the OSI model, which means the bridge cannot read IP addresses, but only the outermost Hardware Address of the packet.
  • 9. A bridge and switch are very much alike; a switch being a bridge with numerous ports. Switch or Layer 2 switch is often used interchangeably with bridge.  Switchesmay operate at one or more OSI layers, including physical, data link, network, or transport layer.
  • 10. A router is used to route data packets between two networks.  It reads the information in each packet to tell where it is going.  Routing occurs at the network layer of the OSI model. Which means that Routers can read IP addresses .
  • 11.  Routers do not send broadcast packets or corrupted packets. If the routing table does not indicate the proper address of a packet, the packet is discarded.
  • 12. Bus topology. Star topology. Ring topology. Mesh topology.
  • 13.  Bus networks use a common backbone to connect all devices.
  • 14.  Easy to install.  Ifthere is a problem  Add and remove with the cable, the entire devices is simple. network breaks down.  Cost effective; only a  Sending data takes long single cable is used. time.  Easy identification of  Limited cable length and cable faults. number of stations.
  • 15.  Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a router or a switch.  Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cables will only take down one computer's network access and not the entire LAN.
  • 16.  Better performance.  High dependence of the  Isolation of devices. system on the central hub.  Easy to install and wire.  Network size is limited by  No disruptions to the the number of connections network when connecting that can be made to the or removing devices. hub.
  • 17.  In a ring network, every device has exactly two neighbors for communication purposes.  All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise").
  • 18.  Very orderly network where  Add/Remove devices. every device has access to the  Limited number of token and the opportunity to devices. transmit.  High cost.  Performs better than a bus topology under heavy  Time. network load.  Easy to install.
  • 19.  Mesh topologies involve the concept of routes.  Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination.  Some WANs, most notably the Internet, employ mesh routing.
  • 20. A mesh network in which Partial mesh networks also exist every device connects to every in which some devices connect other is called a full mesh. only indirectly to others
  • 21.  Low rate of failure.  Add/Remove devices.  Low time consuming  Limited number of in sending data. devices.  More secured.
  • 22.