0% found this document useful (0 votes)
2K views60 pages

Network Connections: Networking Hardware

This document discusses network connectivity hardware. It defines network interface cards (NICs) and their functions, including connecting devices to network media and applying data signals to wires. It describes different types of NICs like Ethernet and token ring cards. The document also covers installing and configuring NIC hardware and software, and interpreting LED indicators on NICs and hubs.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views60 pages

Network Connections: Networking Hardware

This document discusses network connectivity hardware. It defines network interface cards (NICs) and their functions, including connecting devices to network media and applying data signals to wires. It describes different types of NICs like Ethernet and token ring cards. The document also covers installing and configuring NIC hardware and software, and interpreting LED indicators on NICs and hubs.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 60

Network Connections

Networking Hardware

Confidential
Objectives

 Identify the functions of LAN connectivity hardware


 Install and configure a NIC (network interface card)
 Identify problems associated with connectivity hardware

Confidential
2
Objectives (continued)

 Describe the factors involved in choosing a NIC, hub, switch, or


router
 Discuss the functions of repeaters, hubs, bridges, switches, routers,
and gateways, and the OSI Model layers at which they operate
 Describe the use and types of routing protocols

Confidential
3
NICs (Network Interface Cards)

 Connectivity devices that enable workstations, servers, printers, or


other nodes to receive and transmit data over network media
 Usually contain data transceiver
 Belong to Physical and Data Link layers
 Apply data signals to wire
 Assemble and disassemble data frames
 Interpret physical addressing information
 Determine which node has right to transmit data at any given instant

Confidential
4
Network Interface Card (NIC)

 Hardware device used to connect different computers on Network


 Serves as a link for sending and receiving data on a network
 MAC address is address assigned by IEEE to identify network card

NIC Types

Ethernet Card Token Ring Card

Confidential
5
Ethernet Card

 Used in devices which are connected using Ethernet technology


 Two types of Ethernet network card – Wired and wireless
 The choice depends on type of network used

Confidential
6
Types of NICs

 NICs come in variety of types depending on:


 Access method
 Network transmission speed
 Connector interfaces
 Type of compatible motherboard or device
 Manufacturer

Confidential
7
Types of Ethernet Card - I

 10Base-5 (Thicknet) NIC

 10Base-2

Confidential
8
Types of Ethernet card - II

 10BaseT

 Fiber –optic

Confidential
9
Token Ring Card

 Used to connect to a token ring network


 Assigned a MAC address by IEEE
 Maximum of two token ring
cards can be installed at any
node
 Consists of 9 pin DIN
type connector which connects
card to network cable

Confidential
10
Physical Connections

 Physical Connections
 NIC either connected on a PCI or PCI-X slot
 NIC cards can be connected to an USB port or can have a PC card
connection
 Depends on one of the cable connectors:
 BNC connector
 ST-fiber optic connector
 RJ-45 connector

Confidential
11
Lights on NIC and hub

 Different LEDs on NIC:


 Link LED
 ACT LED
 Speed LED
 Collision LED

 LEDs on Hub:
 Power LED
 Port LED

Confidential
12
MAC Address

 Also known as hardware or physical address


 Used to identify nodes at lower levels of the OSI model
 ID assigned by IEEE
 Hardware address hard-coded into NIC
 Nodes on network identified by MAC address
 Is a 12 digit hexadecimal number (48 bit address)

Confidential
13
MAC vs IP address

MAC address IP address

Functions at data link layer Functions at network layer

It is a physical address It is a logical address

It is fixed It changes with the relocation of device


from one network to another

It is a 48 bit address It is a 32 bit address

Confidential
14
Internal Bus Standards

 Bus: circuit used by motherboard to transmit data to computer’s


components
 Including memory, processor, hard disk, and NIC
 Capacity defined principally by:
 Width of data path (number of bits that can be transmitted in parallel)
 Clock speed
 Expansion slots allow devices to connect to computer’s expanded
bus
 Devices found on circuit board called an expansion card

Confidential
15
Internal Bus Standards (continued)

 Peripheral Component Interconnect (PCI): 32- or 64-bit bus with 33-


or 66-MHz clock speed
 Maximum data transfer rate is 264 MBps
 Industry Standard Architecture (ISA): original PC bus type
 PCI Express specifies 64-bit bus with 133-MHz clock speed
 Capable of up to 500 MBps per data path
 Efficient data transfer, support for quality of service distinctions, error
reporting and handling, and compatibility with current PCI software

Confidential
16
Internal Bus Standards (continued)

Figure : A motherboard with multiple expansion slots

Confidential
17
Peripheral Bus Standards

 Personal Computer Memory Card International Association


(PCMCIA) adapter: connect external devices to most laptop
computers
 PC Card: First PCMCIA adapter
 Specified 16-bit interface running at 8 MHz

 CardBus: 32-bit interface running at 33 MHz


 ExpressCard: 26-pin interface, offering data transfer rates of 250 MBps
in each direction

Confidential
18
Peripheral Bus Standards (continued)

Figure : A CardBus NIC

Confidential
19
Peripheral Bus Standards (continued)

 USB: standard interface used to connect multiple types of


peripherals
 USB 1.1 and USB 2.0

 FireWire: modified by IEEE as IEEE 1394


 Can be used to connect many types of peripherals
 Can connect computers on a small network
 4-pin and 6-pin connectors

 Compact Flash: most likely found connecting devices too small to


handle PCMCIA slots

Confidential
20
Peripheral Bus Standards (continued)

Figure : A USB NIC

Confidential
21
On-board NICs

 Some peripheral devices connect directly to motherboard using on-


board ports
 e.g., a mouse

 Many new computers use on-board NICs


 Integrated into motherboard

Confidential
22
Wireless NICs

Figure : Wireless NICs

Confidential
23
Installing NICs

 First install hardware, then software


 May have to configure firmware
 Set of data or instructions saved to a ROM [electrically erasable programmable read-only memory
(EEPROM)]
 Always read manufacturer’s documentation and follow proper safety procedures
 Multiple NICs may be installed
 Jumper: plastic piece with metal receptacle
 Dual inline package (DIP) switch indicates parameter setting
 Different factors while choosing NIC:
 Bus type (Expansion slot)
 Speed
 Connection type (cabling)
 Hardware Requirements:
 Pentium I/233MHz
 32 MB RAM
 2 GB of available hard disk

Confidential
24
Direct Cable Connection

 One device acts as a host and other acts as a guest


 Can also use infrared connection, if both nodes have required hardware
 All the latest versions of windows provide a software which allows a user to
have a direct serial-to-serial, parallel-to-parallel, or infrared-to-infrared
connection with the other PC.
 To establish a connection using serial ports, a cable known as null modem
is use

Confidential
25
Installing and Configuring NIC Hardware

Figure : A properly inserted NIC

Confidential
26
Installing and Configuring NIC Hardware (continued)

Figure : Installing a PCMCIA-standard NIC

Confidential
27
Installing and Configuring NIC Software

 Device driver: software enabling attached device to communicate


with computer’s OS
 Must ensure that correct device driver installed and configured properly
for the NIC

 To install from Windows XP interface, need Windows XP software


and NIC’s device drivers
 Can usually download NIC software from manufacturer’s Web site

 Installing NIC drivers on UNIX or Linux depends somewhat on OS


version

Confidential
28
Installing and Configuring NIC Software (continued)

Figure : Fedora Core Linux Network Configuration window


Confidential
29
Interpreting LED Indicators

 NICs may have one or more of following lights:


 ACT: if blinking, indicates that NIC is either transmitting or receiving
data
 If solid, heavy network traffic volume

 LNK: if lit, NIC is functional


 In some models, if blinking, NIC detects network but cannot communicate
with it

 TX: if blinking, NIC is functional and transmitting frames


 RX: if blinking, NIC is functional and receiving frames

Confidential
30
IRQ (Interrupt Request)

 Message to computer instructing it to stop what it is doing and pay


attention to something else
 Interrupt: circuit board wire over which device issues voltage to
signal IRQ
 IRQ number: means by which bus understands which device to
acknowledge
 Range from 0 to 15

Confidential
31
IRQ (continued)

 Symptoms possibly indicating two devices attempting to use same


IRQ:
 Computer locks up either upon starting or when OS is loading
 Computer runs much more slowly than usual
 Devices such as USB or parallel ports stop working
 Video or sound card problems
 Computer fails to connect to network
 Intermittent data errors during transmission

Confidential
32
IRQ (continued)

 If IRQ conflicts occur, must reassign device’s IRQ


 Through OS
 Through adapter’s EEPROM configuration utility or computer’s CMOS
configuration utility

 Complementary metal oxide semiconductor (CMOS): microchip that


stores settings pertaining to computer’s devices
 Basic input/output system (BIOS): instructions enabling computer to
initially recognize hardware

Confidential
33
Memory Range

 Indicates area of memory that NIC and CPU use for exchanging
(buffering) data
 Hexadecimal notation

 Some memory ranges reserved for specific devices


 NICs typically use memory range in high memory area
 A0000–FFFFF
 Some manufacturers prefer certain ranges

Confidential
34
Base I/O Port

 Specifies area of memory that will act as channel for moving data
between NIC and CPU
 Hexadecimal notation
 Device’s base I/O port cannot be used by any other device

 Most NICs use two memory ranges for this channel


 Base I/O port settings identify beginning of each range

Confidential
35
Firmware Settings

 Modify NIC’s transmission characteristics


 When changing firmware settings, actually writing to NIC’s
EEPROM chip
 Need bootable disk containing configuration or install utility shipped with
NIC

 NIC configuration utilities:


 View IRQ, I/O port, base memory, node address
 Perform diagnostics
 To perform entire group of diagnostic tests on utility disk, must have
loopback plug

Confidential
36
Choosing the Right NIC

Table : NIC characteristics

Confidential
37
Choosing the Right NIC (continued)

Table (continued): NIC characteristics

Confidential
38
Repeaters and Hubs

 Repeaters: simplest type of connectivity devices that regenerate a


digital signal
 Operate in Physical layer
 Cannot improve or correct bad or erroneous signal

 Regenerate signal over entire segment


 One input port and one output port
 Suited only to bus topology networks

Confidential
39
Repeaters and Hubs (continued)

 Hub: repeater with more than one output port


 Multiple data ports
 Operate at Physical layer
 Uplink port: allows connection to another hub or other connectivity
device
 On Ethernet networks, can serve as central connection point of star or
star-based hybrid topology
 On Token Ring networks, hubs are called Multistation Access Units
(MAUs)

Confidential
40
Repeaters and Hubs (continued)

 Hubs (continued):
 Connected devices share same amount of bandwidth and same
collision domain
 Logically or physically distinct Ethernet network segment on which all
participating devices must detect and accommodate data collisions
 Types of hubs:
 Passive
 Intelligent
 Standalone
 Stackable

Confidential
41
Bridges

 Connect two network segments


 Analyze incoming frames
 Make decisions about where to direct them based on each frame’s MAC
address

 Operate at Data Link layer


 Protocol independent
 Can move data more rapidly than traditional routers

 Extend Ethernet network without extending collision domain or segment


 Can be programmed to filter out certain types of frames

Confidential
42
Switches

 Subdivide network into smaller logical pieces (segments)


 Can operate at levels 2, 3, or 4 of OSI model
 Multiport bridges
 Most have internal processor, OS, memory, and several ports

 Each port on switch acts like bridge


 Each connected device effectively receives own dedicated channel

Confidential
43
Installing a Switch

Figure : Connecting a workstation to a switch

Confidential
44
Installing a Switch (continued)

Figure : A switch on a small network

Confidential
45
Cut-Through Mode

 Switch running in cut-through mode reads frame’s header and


decides where to forward the data before receiving the entire packet
 Cannot read FCS before transmission
 Cannot detect corrupt packets

 Can detect runts


 Erroneously shortened packets

 Biggest advantage is speed

Confidential
46
Store and Forward Mode

 Switch reads entire data frame into memory and checks for
accuracy before transmitting
 Transmits data more accurately
 Slower than cut-through mode
 Can transfer data between segments running different transmission
speeds

Confidential
47
Using Switches to Create VLANs

 Virtual LANs (VLANs) logically separate networks within networks


 Use switches to group a number of ports into a broadcast domain
 Combination of ports making up a Layer 2 segment
 In TCP/IP, referred to as a subnet

 VLANs created by properly configuring switch’s software


 VLAN configuration requires careful planning

Confidential
48
Higher-Layer Switches

 Layer 3 switches (routing switch) and Layer 4 switches


 Ability to interpret higher-layer data enables switches to perform
advanced filtering, statistics keeping, and security functions

Confidential
49
Routers

 Multiport connectivity devices that direct data between nodes on a


network
 Can integrate LANs and WANs
 Running at different transmission speeds
 Using variety of protocols
 Reads incoming packet’s logical addressing information
 Determines where to deliver packet
 Determines shortest path to that network
 Operate at Network layer
 Protocol-dependent

Confidential
50
Router Features and Functions

 Typical router has internal processor, OS, memory, various input


and output jacks, and management console interface
 Modular router: multiple slots to hold different interface cards or
other devices
 All routers can:
 Connect dissimilar networks
 Interpret Layer 3 addressing and other information
 Determine the best path for data to follow
 Reroute traffic

Confidential
51
Router Features and Functions (continued)

 Other router functions:


 Filter out broadcast transmissions
 Prevent certain types of traffic from getting to a network
 Support simultaneous local and remote connectivity
 Provide high network fault tolerance through redundant components
 Monitor network traffic and report statistics
 Diagnose internal or other connectivity problems

Confidential
52
Router Features and Functions (continued)

 Interior router directs data between nodes on autonomous LANs


 Exterior router directs data between nodes external to given
autonomous LAN
 Border routers connect autonomous LAN with a WAN
 Static routing: network administrator programs router to use specific
paths between nodes
 Dynamic routing automatically calculates best path between two
nodes
 Accumulates information in routing table

Confidential
53
Router Features and Functions (continued)

Figure : The placement of routers on a LAN


Confidential
54
Routing Protocols: RIP, OSPF, EIGRP and BGP

 Best path: most efficient route between nodes


 Routers communicate via routing protocols
 Characterized according to convergence time
 Time taken to recognize best path

 Routing Information Protocol (RIP) for IP and IPX


 Open Shortest Path First (OSPF) for IP
 Enhanced Interior Gateway Routing Protocol (EIGRP) for IP, IPX, and
AppleTalk
 Border Gateway Protocol (BGP) for IP

Confidential
55
Brouters

 Bridge routers
 Routers that take on some characteristics of bridges
 Can forward nonroutable protocols
 Connect multiple network types through one device

Confidential
56
Gateways

 Connect two systems using different formatting, communications


protocols, or architecture
 Repackage information to be read by another system
 Operates at multiple OSI Model layers

 E-mail gateway
 Internet gateway
 LAN gateway
 Voice/data gateway
 Firewall

Confidential
57
Summary

 Network adapters come in a variety of types depending on access


method, network transmission speed, connector interfaces, type of
compatible motherboard, and manufacturer
 Desktops or tower PCs may use an expansion card NIC, which
must match the system’s bus
 NICs are designed to be used with either wire-bound or wireless
connections
 Firmware combines hardware and software
 Repeaters are the connectivity devices that perform the
regeneration of a digital signal

Confidential
58
Summary (continued)

 A hub contains multiple data ports into which the patch cables for
network nodes are connected
 Bridges resemble repeaters in that they have a single input and a
single output port, but they can interpret the data they retransmit
 As nodes transmit data through a bridge, the bridge establishes a
filtering database
 Switches subdivide a network into smaller, logical pieces

Confidential
59
Summary (continued)

 A router is a multiport device that can connect dissimilar LANs and


WANs running at different transmission speeds, using a variety of
protocols
 Routers are protocol-dependent
 Routing protocols provide rules for communication between routers
and help them determine the best path between two nodes
 Gateways are combinations of networking hardware and software
that connect two dissimilar kinds of networks

Confidential
60

You might also like