This document provides information about network topologies and media access methods. It begins by defining a network topology as the physical layout of computers on a network. The four primary network topologies are then described as star, bus, ring, and mesh. Communication methods for bus, ring, and star topologies are explained. Hybrid topologies that combine elements of different primary topologies are also introduced. The document concludes by discussing two common media access methods: CSMA/CD and CSMA/CA.
This document provides information on network topologies. It begins by defining key terms like computer networks and networking. It then covers different types of network topologies including physical topologies like bus, star, ring, mesh and hybrid and logical topologies like broadcast and token passing. For each topology, it discusses the basic structure, how communication works, advantages and disadvantages. The document also covers other network concepts like the difference between LAN, MAN, WAN, protocols, and factors to consider when choosing a topology.
This document discusses network monitoring tools and techniques. It defines network monitoring as the process of collecting network activity statistics to inform management decisions. Regular monitoring is needed to troubleshoot problems, identify slow or failing components, and notify administrators of outages. Common diagnostic tools discussed include Ping, Traceroute, Ipconfig and Netstat which can test connectivity and determine device availability. The document also outlines some network monitoring platforms and utilities that can perform specialized tasks like protocol analysis, connectivity testing and log analysis.
what is network protocols?
n networking, a protocol is a set of rules for formatting and processing data. Network protocols are like a common language for computers. The computers within a network may use vastly different software and hardware; however, the use of protocols enables them to communicate with each other regardless.
The document discusses configuring and administering servers. It defines network operating systems and their characteristics. A network OS is software that runs on a server and enables it to manage networking functions. It also defines servers and their roles in providing services and resources to users. The document outlines learning outcomes related to confirming server specifications, verifying compatibility and interoperability, and configuring and testing servers.
This document provides information on determining the best network topology. It describes the key types of network topologies including bus, star, ring, mesh, hybrid and tree. For each topology, it outlines the basic design, how communication works, advantages and disadvantages. The document is intended to help identify the appropriate topology based on factors like equipment, growth needs, management approach and more.
This document discusses different types of transmission media used in computer networks, including guided and unguided media. It focuses on the three primary types of cables used to build local area networks (LANs): coaxial cable, twisted-pair cable, and fiber optic cable. For each cable type, the document describes the cable construction, common varieties used in networking, maximum data transmission speeds, and typical applications. Twisted-pair cable is highlighted as the most common medium in modern LANs.
Identifying and resolving network problemsGera Paulos
The document discusses the results of a study on the effects of exercise on memory and thinking abilities in older adults. The study found that regular exercise can help reduce the decline in thinking abilities that often occurs with age. Specifically, older adults who exercised regularly performed better on memory and thinking tests compared to those who did not exercise regularly.
This document provides information on network topologies. It begins by defining key terms like computer networks and networking. It then covers different types of network topologies including physical topologies like bus, star, ring, mesh and hybrid and logical topologies like broadcast and token passing. For each topology, it discusses the basic structure, how communication works, advantages and disadvantages. The document also covers other network concepts like the difference between LAN, MAN, WAN, protocols, and factors to consider when choosing a topology.
This document discusses network monitoring tools and techniques. It defines network monitoring as the process of collecting network activity statistics to inform management decisions. Regular monitoring is needed to troubleshoot problems, identify slow or failing components, and notify administrators of outages. Common diagnostic tools discussed include Ping, Traceroute, Ipconfig and Netstat which can test connectivity and determine device availability. The document also outlines some network monitoring platforms and utilities that can perform specialized tasks like protocol analysis, connectivity testing and log analysis.
what is network protocols?
n networking, a protocol is a set of rules for formatting and processing data. Network protocols are like a common language for computers. The computers within a network may use vastly different software and hardware; however, the use of protocols enables them to communicate with each other regardless.
The document discusses configuring and administering servers. It defines network operating systems and their characteristics. A network OS is software that runs on a server and enables it to manage networking functions. It also defines servers and their roles in providing services and resources to users. The document outlines learning outcomes related to confirming server specifications, verifying compatibility and interoperability, and configuring and testing servers.
This document provides information on determining the best network topology. It describes the key types of network topologies including bus, star, ring, mesh, hybrid and tree. For each topology, it outlines the basic design, how communication works, advantages and disadvantages. The document is intended to help identify the appropriate topology based on factors like equipment, growth needs, management approach and more.
This document discusses different types of transmission media used in computer networks, including guided and unguided media. It focuses on the three primary types of cables used to build local area networks (LANs): coaxial cable, twisted-pair cable, and fiber optic cable. For each cable type, the document describes the cable construction, common varieties used in networking, maximum data transmission speeds, and typical applications. Twisted-pair cable is highlighted as the most common medium in modern LANs.
Identifying and resolving network problemsGera Paulos
The document discusses the results of a study on the effects of exercise on memory and thinking abilities in older adults. The study found that regular exercise can help reduce the decline in thinking abilities that often occurs with age. Specifically, older adults who exercised regularly performed better on memory and thinking tests compared to those who did not exercise regularly.
Provide first level remote help desk supportGera Paulos
The document provides guidance on how to provide detailed client support for a technical problem by outlining 7 key steps:
1. Determine the nature of the problem and describe what is lacking to solve it.
2. Research and determine a possible solution, listing any required hardware, software, or training.
3. Discuss the suggested solution with others and seek approval to implement it.
4. Implement the approved solution.
5. Create documentation about the new system for the client.
6. Provide face-to-face instruction to the client based on the documentation.
7. Create a feedback form and seek client feedback on the instruction to identify areas for improvement.
This document provides an overview of computer networks. It discusses network diagrams, classifications of networks by range including LAN, WAN, PAN and MAN. Common network topologies such as bus, star, ring and mesh are described. The OSI and TCP/IP models are explained. Common network devices, switching technologies, and transmission media are defined. Signal types including analog and digital are also summarized.
This document provides information about planning and designing internet infrastructure. It defines internet infrastructure as the collection of hardware and software that enables internet operations, including transmission lines, routing equipment, DNS, email servers, databases, and other critical components. The key components of internet infrastructure are data centers, networks, computer equipment, storage services, and server applications. Common transmission media for internet infrastructure are coaxial cable, twisted pair cable, and fiber optic cable.
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
This document provides an overview of basic local area network (LAN) concepts including definitions, hardware, media, and sample implementations. It defines a LAN as a group of computers and devices sharing resources within a small geographic area. Common LAN hardware includes hubs, switches, bridges, and routers which connect devices and segment traffic at different OSI model layers. Wired media include twisted pair, coaxial, and fiber optic cables while common wireless technologies are Wi-Fi and WiMax. Sample configurations show home and business LAN setups connecting devices via these components.
This document provides an introduction to computer networks. It discusses the basics of LANs, MANs and WANs. It describes common network topologies like bus, star, ring and mesh. It also discusses the various components that make up a network including physical media, networking devices, computers, networking software and applications. The document is intended to provide a high-level overview of computer networks.
The document discusses various network connectivity devices including network interface cards (NICs), repeaters, hubs, bridges, and switches. It provides details on the functions and operations of each device. NICs receive and transmit data to and from the network, converting electrical signals to data packets. Repeaters and hubs extend network reach but do not filter or prioritize traffic. Bridges split a network into segments and filter traffic by MAC address. Switches learn MAC addresses to selectively transmit frames to destination ports, improving network efficiency over hubs.
This document provides an introduction to computer networks. It defines what a network is and discusses the purpose of sharing resources between connected computers. It describes different network topologies including bus, star, ring and mesh and explains common network hardware like switches, routers, hubs and network interface cards. The document also distinguishes between local, wide and metropolitan area networks.
installing and optimizing operating system software Jaleto Sunkemo
This document provides information about installing and optimizing operating system software. It discusses determining the functions of operating systems, comparing different operating systems, and installing and configuring the Windows operating system. Key topics covered include the components and features of operating systems, popular operating systems like Windows and MacOS, and how operating systems manage system resources and security.
The document provides information about configuring and administering a server. It discusses server specifications, compatibility, configuration and testing. It defines what a server and network operating system are. The document outlines different server types including file, print, application, mail, terminal and remote access servers. It also covers client support, communication, users and groups, Windows server editions, UNIX/Linux servers, network computer groups, and items that need to be configured on a server like services, authentication, and authorization.
The document discusses different types of computer network topologies. It defines network topology as the physical configuration of cables, computers, and other devices on a network. The key network topologies covered are bus, ring, star, and mesh. Advantages and disadvantages of each topology are summarized.
This document discusses different network topologies. It describes mesh, star, bus, ring and tree topologies. For each topology it provides details on how the nodes are connected and examples of advantages and disadvantages. The key aspects are that topology refers to the arrangement of nodes and connections in a network, and choosing the right topology is important for network design and performance.
Network devices such as repeaters, bridges, switches and routers are used to connect and expand networks. Repeaters regenerate signals to expand small networks, while bridges and switches can understand node addresses to segment networks. Routers interconnect different networks and determine optimal routes using network layer addresses and routing protocols. Remote access devices like modems and ADSL modems allow computers to connect to networks over telephone lines by modulating digital signals into analog for transmission.
The document discusses different types of computer network architectures and topologies. It describes peer-to-peer networks and client/server networks, and notes advantages and disadvantages of each. The document also covers different network topologies like bus, star, ring, and mesh, and the pros and cons of each. Finally, it discusses the differences between workgroup and domain network models.
The document discusses various concepts related to computer networks including:
1. A computer network connects multiple computers allowing them to share resources and information. It consists of nodes like computers, printers, and other devices connected by communication channels.
2. Key network components include routers, switches, hubs, bridges and gateways which help connect and direct traffic between nodes and segments.
3. Networks can be classified based on transmission medium (wired vs wireless), size (LAN, MAN, WAN), management method (peer-to-peer, client-server), and topology.
how to configure the wireless local area network? the general steps of configure the WLAN and its needed equipment are computer, Ethernet cable and network devices...
The document provides an overview of basic networking hardware and concepts. It defines a local area network (LAN) and discusses common LAN topologies like bus, star, and ring. It also describes common networking hardware such as hubs, switches, bridges, routers, and network interface cards. The document outlines different network media including copper, fiber optic, and wireless technologies. It provides examples of how home and business networks can be implemented using these concepts and technologies.
This document discusses the TCP/IP and UDP protocols. It begins with an introduction comparing the TCP/IP model to the OSI model. The TCP/IP model has four layers compared to seven in the OSI model. It then describes the two main host-to-host layer protocols in TCP/IP - TCP and UDP. TCP is connection-oriented and provides reliable, ordered delivery. It uses segments with a header containing fields like sequence numbers. UDP is connectionless and provides fast but unreliable delivery. It uses simpler segments with fewer header fields. The document concludes by explaining the end-to-end delivery process for packets using these protocols as they are transmitted between hosts via routers.
A computer network connects multiple devices using cables or wireless connections. There are several types of networks including LAN, WAN, MAN, and others. Networks can be configured in different topologies such as bus, star, or ring. Common transmission media for wired networks include twisted pair cables, coaxial cable, and fiber optic cables. Computer networks provide benefits like sharing resources and connectivity but also have disadvantages such as cost and potential single point of failures.
This document discusses various network topologies including physical and logical topologies. It defines topology as the arrangement of elements in a network including physical and logical connections between nodes. Several physical topologies are described including ring, bus, star, tree and mesh along with diagrams and their advantages and disadvantages. Logical topologies control how information passes between nodes and the two main types are broadcast and token passing.
The document discusses various networking topologies including physical and logical topologies. It describes ring, bus, star, tree and mesh physical topologies. For each topology it provides a diagram and overview of advantages and disadvantages. Logical topologies discussed are broadcast and token passing. The document serves as an introduction to networking topologies.
Provide first level remote help desk supportGera Paulos
The document provides guidance on how to provide detailed client support for a technical problem by outlining 7 key steps:
1. Determine the nature of the problem and describe what is lacking to solve it.
2. Research and determine a possible solution, listing any required hardware, software, or training.
3. Discuss the suggested solution with others and seek approval to implement it.
4. Implement the approved solution.
5. Create documentation about the new system for the client.
6. Provide face-to-face instruction to the client based on the documentation.
7. Create a feedback form and seek client feedback on the instruction to identify areas for improvement.
This document provides an overview of computer networks. It discusses network diagrams, classifications of networks by range including LAN, WAN, PAN and MAN. Common network topologies such as bus, star, ring and mesh are described. The OSI and TCP/IP models are explained. Common network devices, switching technologies, and transmission media are defined. Signal types including analog and digital are also summarized.
This document provides information about planning and designing internet infrastructure. It defines internet infrastructure as the collection of hardware and software that enables internet operations, including transmission lines, routing equipment, DNS, email servers, databases, and other critical components. The key components of internet infrastructure are data centers, networks, computer equipment, storage services, and server applications. Common transmission media for internet infrastructure are coaxial cable, twisted pair cable, and fiber optic cable.
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
This document provides an overview of basic local area network (LAN) concepts including definitions, hardware, media, and sample implementations. It defines a LAN as a group of computers and devices sharing resources within a small geographic area. Common LAN hardware includes hubs, switches, bridges, and routers which connect devices and segment traffic at different OSI model layers. Wired media include twisted pair, coaxial, and fiber optic cables while common wireless technologies are Wi-Fi and WiMax. Sample configurations show home and business LAN setups connecting devices via these components.
This document provides an introduction to computer networks. It discusses the basics of LANs, MANs and WANs. It describes common network topologies like bus, star, ring and mesh. It also discusses the various components that make up a network including physical media, networking devices, computers, networking software and applications. The document is intended to provide a high-level overview of computer networks.
The document discusses various network connectivity devices including network interface cards (NICs), repeaters, hubs, bridges, and switches. It provides details on the functions and operations of each device. NICs receive and transmit data to and from the network, converting electrical signals to data packets. Repeaters and hubs extend network reach but do not filter or prioritize traffic. Bridges split a network into segments and filter traffic by MAC address. Switches learn MAC addresses to selectively transmit frames to destination ports, improving network efficiency over hubs.
This document provides an introduction to computer networks. It defines what a network is and discusses the purpose of sharing resources between connected computers. It describes different network topologies including bus, star, ring and mesh and explains common network hardware like switches, routers, hubs and network interface cards. The document also distinguishes between local, wide and metropolitan area networks.
installing and optimizing operating system software Jaleto Sunkemo
This document provides information about installing and optimizing operating system software. It discusses determining the functions of operating systems, comparing different operating systems, and installing and configuring the Windows operating system. Key topics covered include the components and features of operating systems, popular operating systems like Windows and MacOS, and how operating systems manage system resources and security.
The document provides information about configuring and administering a server. It discusses server specifications, compatibility, configuration and testing. It defines what a server and network operating system are. The document outlines different server types including file, print, application, mail, terminal and remote access servers. It also covers client support, communication, users and groups, Windows server editions, UNIX/Linux servers, network computer groups, and items that need to be configured on a server like services, authentication, and authorization.
The document discusses different types of computer network topologies. It defines network topology as the physical configuration of cables, computers, and other devices on a network. The key network topologies covered are bus, ring, star, and mesh. Advantages and disadvantages of each topology are summarized.
This document discusses different network topologies. It describes mesh, star, bus, ring and tree topologies. For each topology it provides details on how the nodes are connected and examples of advantages and disadvantages. The key aspects are that topology refers to the arrangement of nodes and connections in a network, and choosing the right topology is important for network design and performance.
Network devices such as repeaters, bridges, switches and routers are used to connect and expand networks. Repeaters regenerate signals to expand small networks, while bridges and switches can understand node addresses to segment networks. Routers interconnect different networks and determine optimal routes using network layer addresses and routing protocols. Remote access devices like modems and ADSL modems allow computers to connect to networks over telephone lines by modulating digital signals into analog for transmission.
The document discusses different types of computer network architectures and topologies. It describes peer-to-peer networks and client/server networks, and notes advantages and disadvantages of each. The document also covers different network topologies like bus, star, ring, and mesh, and the pros and cons of each. Finally, it discusses the differences between workgroup and domain network models.
The document discusses various concepts related to computer networks including:
1. A computer network connects multiple computers allowing them to share resources and information. It consists of nodes like computers, printers, and other devices connected by communication channels.
2. Key network components include routers, switches, hubs, bridges and gateways which help connect and direct traffic between nodes and segments.
3. Networks can be classified based on transmission medium (wired vs wireless), size (LAN, MAN, WAN), management method (peer-to-peer, client-server), and topology.
how to configure the wireless local area network? the general steps of configure the WLAN and its needed equipment are computer, Ethernet cable and network devices...
The document provides an overview of basic networking hardware and concepts. It defines a local area network (LAN) and discusses common LAN topologies like bus, star, and ring. It also describes common networking hardware such as hubs, switches, bridges, routers, and network interface cards. The document outlines different network media including copper, fiber optic, and wireless technologies. It provides examples of how home and business networks can be implemented using these concepts and technologies.
This document discusses the TCP/IP and UDP protocols. It begins with an introduction comparing the TCP/IP model to the OSI model. The TCP/IP model has four layers compared to seven in the OSI model. It then describes the two main host-to-host layer protocols in TCP/IP - TCP and UDP. TCP is connection-oriented and provides reliable, ordered delivery. It uses segments with a header containing fields like sequence numbers. UDP is connectionless and provides fast but unreliable delivery. It uses simpler segments with fewer header fields. The document concludes by explaining the end-to-end delivery process for packets using these protocols as they are transmitted between hosts via routers.
A computer network connects multiple devices using cables or wireless connections. There are several types of networks including LAN, WAN, MAN, and others. Networks can be configured in different topologies such as bus, star, or ring. Common transmission media for wired networks include twisted pair cables, coaxial cable, and fiber optic cables. Computer networks provide benefits like sharing resources and connectivity but also have disadvantages such as cost and potential single point of failures.
This document discusses various network topologies including physical and logical topologies. It defines topology as the arrangement of elements in a network including physical and logical connections between nodes. Several physical topologies are described including ring, bus, star, tree and mesh along with diagrams and their advantages and disadvantages. Logical topologies control how information passes between nodes and the two main types are broadcast and token passing.
The document discusses various networking topologies including physical and logical topologies. It describes ring, bus, star, tree and mesh physical topologies. For each topology it provides a diagram and overview of advantages and disadvantages. Logical topologies discussed are broadcast and token passing. The document serves as an introduction to networking topologies.
This document discusses different network topologies including bus, star, ring, and mesh. It describes the key characteristics of each topology such as their physical layout, how data is transmitted, advantages and disadvantages. Hybrid topologies that combine two or more standard topologies are also discussed. The document emphasizes understanding network topologies is essential for designing efficient computer networks and choosing the best option for different network requirements.
network topologies bus star hybrid mesh ring tree
detail of all topology
advantages of ring topology
advantages of bus topology
advantages of mesh topology
advantages of star topology
advantages of hybrid topology
advantages of tree topology
The best PPT for knowing about the deeply information of topology networks..
That PPT was win the "BPS 2012" Award.
so,strong your exceptions and try it down...................
Network Topologies in computer networkingnazmulabdal
This document discusses various network topologies including bus, ring, star, tree, mesh, and hybrid topologies. For each topology, it provides a brief description and then lists advantages and disadvantages. Some key points covered include:
- A bus topology connects all nodes to a single backbone cable and broadcasts messages to all nodes. It has simpler configuration but signal interference can occur.
- A ring topology connects nodes in an endless loop with unidirectional data flow. It is more reliable than bus but a single node failure disrupts the whole network.
- A star topology connects all nodes to a central hub/switch. Troubleshooting is efficient but the hub is a single point of failure.
This document discusses different types of computer network topologies, including bus, ring, star, mesh, tree, and hybrid topologies. It defines topology as the arrangement of nodes and connections in a network. The document then provides details on each topology type, describing their characteristics and providing examples. It also lists some advantages and disadvantages of each topology.
This document discusses various network topologies including physical and logical topologies. It describes the key characteristics of bus, star, ring, point-to-point and mesh topologies. It also covers token ring networks and how data travels on different physical topologies like bus, star and ring. Logical topologies like bus and ring are described along with baseband and broadband signaling.
This document discusses different network topologies including bus, star, ring, mesh, tree, and hybrid topologies. It provides details on how each topology connects devices, how data is transferred, advantages and disadvantages of each. Bus topology uses a central backbone cable to connect all devices but if it fails the whole network fails. Star topology uses a central hub to connect devices in a point-to-point fashion, avoiding single point of failure issues but the hub remains a bottleneck. Ring topology connects devices in a continuous ring path allowing data to travel in one direction, but a single break disconnects the whole network. Hybrid topologies combine two or more standard topologies to utilize their advantages while reducing weaknesses.
Network topology refers to the layout and connections of devices in a computer network. There are several common topologies including bus, star, ring, mesh, point-to-point, and hybrid. Bus topology connects all devices to a single cable, while star topology connects devices to a central hub. Ring topology forms a closed loop where data travels in one direction. Mesh networks have multiple connections between devices for redundancy. Hybrid topologies combine two or more standard topologies.
The document discusses different network topologies including physical and logical topologies. It describes the key characteristics of bus, ring, tree, star, and mesh physical topologies. For each topology, it outlines the basic structure, common standards and protocols used, as well as advantages and disadvantages.
This document discusses different types of network topologies, including physical and logical topologies. It describes bus, ring, star, mesh, tree, and hybrid topologies. For each topology, it covers features, advantages, and disadvantages. Bus topology has all devices connected to a single cable. Ring topology forms a ring with each device connected to two others. Star topology connects all devices to a central hub. Mesh topology uses point-to-point connections between all devices. Tree topology connects devices in a hierarchical structure below a root node. Hybrid topologies combine two or more topologies.
The layout pattern of the interconnections between computers in a network is called network topology. ... Network topology is illustrated by showing these nodes and their connections using cables. There are a number of different types of network topologies, including point-to-point, bus, star, ring, mesh, tree and hybrid.
This document discusses different types of network topologies, including logical and physical topologies. It describes the following topologies in detail: star, bus, ring, mesh, and tree. For each topology, it outlines the basic structure and layout, how data is passed, and advantages and disadvantages. The goal is for learners to understand different network topology types and be able to explain them.
Network topology refers to the arrangement of elements like nodes, links and peripherals that form a communication network. The key types of network topologies include bus, star, ring, mesh and hybrid. Bus topology uses a single cable to connect all nodes but if it fails the whole network fails. Star topology connects all nodes to a central hub providing easier troubleshooting but a single hub failure disables the network. Ring topology connects each node in a circular fashion allowing orderly flow but a single node failure takes the whole network down. Mesh networks provide robust connectivity through redundant links but have higher implementation costs. Hybrid topologies combine two or more topologies to gain advantages while reducing disadvantages.
Network topology refers to the arrangement of elements in a communication network. The document discusses several common network topologies including bus, star, ring, mesh, tree, and hybrid topologies. For each topology, it provides details on how the nodes are arranged and connected, as well as advantages and disadvantages of each type.
This document discusses different network topologies, including physical and logical topologies. It describes point-to-point, bus, ring, star, tree, mesh, and hybrid topologies. Each topology is defined along with its advantages and disadvantages. For example, the star topology connects all computers to a central hub, making it easy to set up and modify but if the hub fails the whole network fails. The mesh topology connects each device directly to every other device, providing redundancy but requiring many cables. A hybrid topology combines two or more standard topologies to achieve flexibility and scalability but with increased complexity.
Network topologies refer to the geometric arrangement of devices on a computer network. There are several standard network topologies including bus, star, ring, and hybrid. Each topology has advantages and disadvantages depending on factors like scalability, fault tolerance, cost, and speed. A hybrid topology combines two or more standard topologies to leverage their strengths and mitigate weaknesses.
IT infrastructure and network technologies for Semi FinalMark John Lado, MIT
This document discusses different network topologies and transmission modes in computer networks. It begins by defining network topology as the schematic arrangement of nodes connected by lines of connection. The main network topologies discussed are bus, ring, star, mesh, tree, and hybrid topologies. For each topology, their features, advantages, and disadvantages are provided. The document also discusses the three transmission modes - simplex, half duplex, and full duplex - and provides examples of each.
A wireless LAN allows computers and devices to connect to a local area network without wires. It works by using radio waves to transmit and receive data between devices within a small area. The document discusses the technologies used to implement wireless LANs and their advantages and disadvantages, but also includes an off-topic question about stealing a neighbor's stock tips that is unrelated to the main topic.
Kediro fast food production is a business located in Batu town that produces and sells juices. It is owned solely by Kediro figa. The business plans to produce 20-30 juices per day using fruits like avocado, mango, and papaya in a juice processor. The marketing plan involves setting affordable prices, advertising using posters and social media, and targeting customers in Batu town like travelers. The financial plan estimates costs for equipment, raw materials, staff, and expenses to determine a total initial capital requirement of 207,200 birr.
This business plan is for a partnership that will operate in the manufacturing industry. It will produce products for target markets. The plan outlines the business idea, owner profiles, marketing, production, organizational structure, financial projections, and break-even analysis. Key details include choosing a partnership structure, describing the product and target customers, outlining the production process, listing capital requirements and projected profits, and calculating the break-even point.
Anthropology is the study of humanity that dates back to ancient Greece. It began to take shape as a distinct discipline in the 19th century as Europeans explored other parts of the world and kept detailed records of other cultures. Early anthropologists studied concepts like evolution, race, and culture. They sought to understand human physical and cultural diversity. Today, anthropology has four main fields - physical anthropology, archaeology, anthropological linguistics, and cultural anthropology. Researchers integrate scientific techniques with humanistic approaches to gain holistic understanding of human diversity and cultural practices around the world.
The document discusses different types of waste or "muda" in lean manufacturing. It defines the seven main types of muda as over-production, processing, transport, waiting time, inventory, motion, and defects. It also explains the Japanese terms "mura" as unevenness or variability that can lead to muda, and "muri" as overburden or unreasonableness. The goal of lean is to identify, measure, and eliminate all forms of waste from production processes.
This document discusses updating and documenting operational procedures for level II trainees. It covers assessing technical documentation, updating procedures, and updating documentation. Standard operating procedures (SOPs) are important for managers, engineers, planners, and safety officers to carry out routine tasks consistently and maintain quality. SOPs should be used every day, for audits/reviews, training new staff, and annual training. Documenting procedures ensures employee safety, improved communication, maintaining organizational knowledge, and saving time. The document provides steps for writing procedures, including generating a process list, knowing objectives, choosing a format, identifying audiences, collaborating with employees, writing, distributing, and keeping documents up-to-date.
A spreadsheet is a program that displays data in a table format called a worksheet. It can be used to create budgets, financial statements, manage inventory, and create charts. A worksheet is made up of columns, rows, and cells, which are the intersections of the rows and columns. Cells can contain labels, values, or formulas. Formulas in spreadsheets use functions and operation symbols like addition and multiplication to perform calculations on cell references. Spreadsheets allow users to organize and analyze data easily through features like sorting, filtering, and creating charts.
Computer Keyboard and Proper Finger Positioning
What is keyboard?
A keyboard is a peripheral device that enables a user to input text into a computer or any other electronic machinery. A keyboard is an input device and is the most basic way for the user to communicate with a computer..
This document provides an introduction and overview of spreadsheets and the Microsoft Excel program. It defines what a spreadsheet is, gives common examples of spreadsheet uses, and describes the basic components and functionality of the Excel user interface, including rows, columns, cells, ribbons, tabs, and other interface elements. The document is intended to familiarize users with the basic concepts and structure of spreadsheets and Excel.
What is quality? quality is a The ongoing process of building and sustaining relationships by assessing, anticipating, and fulfilling stated and implied needs.
The document discusses working in a team environment. It covers identifying team roles and objectives, stages of team development including forming, storming, norming, performing, and adjourning. Effective team characteristics include clear goals, trust, support, communication and democratic processes. Coaching aims to improve performance by focusing on the present. The purpose of coaching can be to increase skills, compliance, safety, productivity or prepare for new responsibilities. Benefits of teamwork include improved organizational and individual performance as well as staff morale.
is highly competitive, and driven by considerations of technology, innovation, quality, cost effectiveness, timeliness and excellence in service delivery, Government organisations cannot afford to lag behind
This document provides information on organizational diagnosis and benchmarking to improve business performance. It discusses:
1. Organizational diagnosis involves assessing an organization's current performance, identifying gaps between current and desired performance, and determining how to achieve goals. Data collection methods include interviews, surveys, and analyzing primary and secondary sources.
2. Benchmarking involves measuring a company's performance against the best in its industry to identify improvement opportunities. There are four main types and conducting benchmarking involves four steps: planning, data collection, analysis, and adapting best practices.
3. SWOT analysis, value chain analysis, and developing short- and long-term business plans are also discussed as tools to understand an organization and strategize
Verbal, nonverbal, written, and visual communication methods are discussed. Verbal communication involves spoken words while nonverbal uses body language and symbols. Written communication transmits messages through letters and emails. Visual communication conveys information through images, videos, and presentations. There are four types of communication: intrapersonal, interpersonal, small group, and public. Effective communication considers the source, message, channel, and receiver. The communicator must understand the audience to choose the appropriate method and content.
The document discusses policies for client support, including defining what a policy is, the skills and knowledge needed to assist with policy development requests from clients, common client support issues and requests, the roles of help desk operators, and an eight step policy development cycle involving issue identification, analysis, consultation, instrument development, coordination, decision making, implementation, and evaluation. It provides information on developing and modifying policies to meet the needs of clients requesting changes or improvements to support policies and procedures.
The document provides information on proper keyboard finger positioning and typing techniques. It discusses the functions of common keyboard keys like Escape, Control, Shift, and Spacebar. It explains that the home row keys are where hands rest and identifies the left and right hand fingers. The document encourages taking your time when learning, scanning ahead, and practicing online to build speed and reduce mistakes over time.
This document provides information about setting up and managing a help desk to provide first level remote support. It discusses key terms related to client support and help desks. It explains the different roles and responsibilities within a help desk support system. These include first, second, and third level support technicians who handle issues escalated from previous tiers. The document also outlines important hard skills like technical expertise and soft skills like communication that help desk technicians require to effectively support clients remotely.
Manage and maintain small and meduim businessJaleto Sunkemo
The document discusses various aspects of work identification, allocation, and performance evaluation in organizations. It provides definitions of key terms like job description, job analysis, and performance measures. It also outlines the steps in developing an effective performance evaluation system, including creating evaluation forms, identifying performance metrics, setting feedback guidelines, and establishing disciplinary procedures. The overall purpose is to help employers properly assess employee contributions and ensure accountability through a structured evaluation process.
Measuring and Understanding the Route Origin Validation (ROV) in RPKIAPNIC
Shane Hermoso, APNIC's Training Delivery Manager (Southeast Asia and East Asia), presented on 'Measuring and Understanding the Route Origin Validation (ROV) in RPKI' during VNNIC Internet Conference 2024 held in Hanoi, Viet Nam from 4 to 7 July 2024.
Cyber Crime with basics and knowledge to cyber sphereRISHIKCHAUDHARY2
In this ppt you will get to know about the cyber security basics as well as the paradigms that are important in the cyber world.
Also this can be helpful for study purpose in college and schools.
You will also get two case studies which can be helpful for better understand.
Top UI/UX Design Trends for 2024: What Business Owners Need to KnowOnepixll
Discover the top UI/UX design trends for 2024 that every business owner needs to know. This infographic covers five key trends: Dark Mode Dominance, Neumorphism and Soft UI, Voice User Interface (VUI) Integration, Personalization and AI-Driven Design, and Accessibility-First Design. By staying ahead of these trends, you can create engaging, user-friendly digital products that cater to evolving user needs and preferences. Enhance your digital presence and ensure your designs are modern, accessible, and effective.
Decentralized Justice in Gaming and EsportsFederico Ast
Discover how Kleros is transforming the landscape of dispute resolution in the gaming and eSports industry through the power of decentralized justice.
This presentation, delivered by Federico Ast, CEO of Kleros, explores the innovative application of blockchain technology, crowdsourcing, and incentivized mechanisms to create fair and efficient arbitration processes.
Key Highlights:
- Introduction to Decentralized Justice: Learn about the foundational principles of Kleros and how it combines blockchain with crowdsourcing to develop a novel justice system.
- Challenges in Traditional Arbitration: Understand the limitations of conventional arbitration methods, such as high costs and long resolution times, particularly for small claims in the gaming sector.
- How Kleros Works: A step-by-step guide on the functioning of Kleros, from the initiation of a smart contract to the final decision by a jury of peers.
- Case Studies in eSports: Explore real-world scenarios where Kleros has been applied to resolve disputes in eSports, including issues like cheating, governance, player behavior, and contractual disagreements.
- Practical Implementation: Detailed walkthroughs of how disputes are handled in eSports tournaments, emphasizing speed, cost-efficiency, and fairness.
- Enhanced Transparency: The role of blockchain in providing an immutable and transparent record of proceedings, ensuring trust in the resolution process.
- Future Prospects: The potential expansion of decentralized justice mechanisms across various sectors within the gaming industry.
For more information, visit kleros.io or follow Federico Ast and Kleros on social media:
• Twitter: @federicoast
• Twitter: @kleros_io
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger InternetAPNIC
Paul Wilson, Director General of APNIC, presented on 'Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet' during the APAC IPv6 Council held in Hanoi, Viet Nam on 7 June 2024.
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...Bert Blevins
In the ever-evolving landscape of cybersecurity, safeguarding sensitive data and critical systems has become paramount. As cyber threats grow in sophistication, organizations are constantly seeking innovative methods to fortify their defenses. Multi-Factor Authentication (MFA) stands out as a potent tool within the security arsenal, particularly when integrated with Privileged Access Management (PAM).
Privileged access management encompasses the methods, protocols, and tools employed to regulate and monitor access to privileged accounts within an organization. These accounts wield elevated privileges, enabling users to execute vital operations such as system configuration, access to sensitive data, and management of network infrastructure. However, if these privileges fall into the wrong hands, they pose a significant security risk. MFA adds an additional layer of protection by requiring users to provide multiple forms of verification before gaining access to a system or application. Key components of MFA in PAM include biometric verification, passwords, security tokens, and one-time passcodes. Deploying MFA within a PAM environment necessitates meticulous planning and consideration of various factors to ensure robust security.
1. UNIT OF COMPETENCE
DETERMINE BEST-FIT
TOPOLOGY
Learning Outcomes
Identify key information source
Determine user needs
Develop best topology
2. Determine Best-Fit Topology
Unit Descriptor
This unit defines the competence required to
determine the most appropriate way of
networking computers to meet user needs and
business requirements.
3. LO1: Identify key information
source
3
Introduction to Network Topologies
The term topology, or more specifically, network topology,
refers to the arrangement or physical layout of computers,
cables, and other components on the network.
“Topology” is the standard term that most network
professionals use when they refer to the network’s basic
design
Types of Network Topology:
Physical Topology: is A network topology that describes the
physical layout of the wire and devices as well as the paths used
by data transmissions
Logical Topology: are describe how information or data are
transmitted or moved through the physical topology across the
network.
6. Bus Topology
6
What is Bus Topology?
It is often referred to as a “linear bus” because the
computers are connected in a straight line. This is the
simplest and most common method of networking
computers.
In a bus topology, all computers are connected to a shared
communication line, called a trunk or a backbone.
The computers are connected to the backbone using
T-connectors.
Both ends of the backbone use terminators in order to
prevent reflection of signals or bounced signal.
If the terminator is missing or is deliberately removed, the
data transmissions are disrupted.
There is no central device or any special configuration.
A bus topology is normally implemented with coaxial cable.
7. Bus Topology
7
Communication on the Bus
In a bus topology, signals are broadcast to all stations. Each
computer checks the address on the signal (data frame) as it passes
along the bus. If the signal’s address matches that of the computer,
the computer processes the signal. If the address doesn’t match, the
computer takes no action and the signal travels on down the bus.
Only one computer can ‘talk’ on a network at a time. A media
access method (protocol) called CSMA/CD is used to handle the
collisions that occur when two signals are placed on the wire at the
same time.
The bus topology is passive topology. In other words, the computers
on the bus simply ‘listen’ for a signal; they are not responsible for
moving the signal along.
8. Bus Topology
8
Network Expansion in bus topology
As the physical size of the site grows, the network will need to grow
as well. Cable in the bus topology can be extended by one of the
two following methods
A component called a barrel connector can connect two pieces of
cable together to make a longer piece of cable. However,
connectors weaken the signal and should be used carefully.
One continuous cable is preferable to connecting several smaller
ones with connectors. Using too many connectors can prevent the
signal from being correctly received.
9. Bus Topology
9
Network Expansion in bus topology…
A device called a repeater can be used to connect two
cables.
A repeater actually boost the signal before it sends the
signal on its way.
The following figure shows a repeater boosting a weakened
signal. A repeater is better than a connector or a longer
piece of cable because it allows a signal to travel farther
and still be correctly received.
10. Bus Topology
10
Advantages of Bus Topology
Use of cable is economical.
Media is inexpensive and easy to work with.
System is simple and reliable.
Bus is easy to extend.
Doesn't require a hub
Disadvantages of Bus Topology
Network can slow down in heavy traffic.
Problems are difficult to isolate.
Cable break can affect many users.
Increasing the number of computer will slow down the
performance of the network
Less fault tolerant
12. Star Topology
12
What is Star Topology?
In the star topology, cable segments from each computer
are connected to a centralized component called a
hub.
The HUB offers a common connection for all stations on
the network. Each station has its own direct cable
connection to the hub. In most cases, this means more
cable is required than for a bus topology. However, this
makes adding or moving computers a relatively easy
task; simply plug them into a cable outlet on the wall.
13. Star Topology
13
Continued…
If a cable is cut, it only affects the computer that
was attached to it. This eliminates the single point
of failure problem associated with the bus
topology. (Unless, of course, the hub itself goes
down.)
Star topologies are normally implemented using
twisted pair cable, specifically unshielded twisted
pair (UTP). The star topology is probably the most
common form of network topology currently in
use.
14. Network Topology
14
Advantages of a Star Topology
Easy to install and wire.
No disruptions to the network when connecting or
removing devices.
Easy to detect faults and to remove parts.
Disadvantages of a Star Topology
Requires more cable length than a Bus topology.
If the hub, switch, or concentrator fails, nodes
attached are disabled.
More expensive than linear bus topologies because
of the cost of the hubs, etc.
16. Ring Topology
16
What is Ring Topology ?
The ring topology connects computers on a single
circle of cable.
Data travels in the ring in a circular fashion from one
computer to another, forming a logical ring.
Unlike the bus topology, there are no terminated ends;
the signal travels around the circle in a clockwise (or
anticlockwise) direction.
The signals travel around the loop in one direction and
pass through each computer, which can act as a
repeater to boost the signal and send it on to the next
computer. This made ring topology to be called active
topology.
17. Ring Topology
17
Continued…
Note that while this topology functions logically as
ring, it is physically wired as a star.
The central connector is not called a hub but a
Multistation Access Unit or MAU.
Rings are normally implemented using twisted pair
or fiber-optic cable.
18. Ring Topology
18
Communication on the Ring Topology
Under the ring concept, a signal is transferred
sequentially via a "token" from one station to the next.
When a station wants to transmit, it "grabs" the token,
attaches data and an address to it, and then sends it
around the ring. The token travels along the ring until it
reaches the destination address.
The receiving computer acknowledges receipt with a
return message to the sender. The sender then releases
the token for use by another computer.
Each station on the ring has equal access but only one
station can talk at a time.
19. Ring Topology
19
Advantages of Ring Topology
This type of network topology is very
organized. Each node gets to send the data
when it receives an empty token. This helps
to reduces chances of collision. Also in ring
topology all the traffic flows in only
one direction at very high speed.
Growth of system has minimal impact on
performance
All stations have equal access.
Additional components do not affect the
20. Ring Topology
20
Disadvantages of Ring Topology
Each packet of data must pass through all the
computers between source and destination. This makes
it slower than Star topology.
If one workstation or port goes down, the entire network
gets affected.
Network is highly dependent on the wire which connects
different components.
MAU’s and network cards are expensive as compared to
Ethernet cards and hubs.
22. Mesh Topology
22
What is Mesh Topology?
A mesh topology network offers superior redundancy and
reliability.
In a mesh topology, each computer is connected to every
other computer by separate cabling.
This configuration provides redundant paths throughout the
network so that if one cable fails, another will take over the
traffic.
While ease of troubleshooting and increased reliability are
definite pluses, these networks are expensive to install
because they use a lot of cabling.
You can calculate the number of cables used
in mesh topology using the following formula:
No of Cable= n (n-1)/2, where n is no of
computer used in mesh topology.
23. Mesh Topology
23
Advantages of Mesh topology
Data can be transmitted from different devices
simultaneously.
This topology can withstand high traffic.
Even if one of the components fails there is always
an alternative present. So data transfer doesn’t get
affected.
Expansion and modification in topology can be done
without disrupting other nodes.
24. Mesh Topology
24
Disadvantages of Mesh topology
There are high chances of redundancy in many of
the network connections.
Overall cost of this network is way too high as
compared to other network topologies.
Set-up and maintenance of this topology is very
difficult. Even administration of the network is very
complex.
25. Hybrid Topology
25
Hybrid Topology
It is combination of any two or
more network topologies.
These instances can occur
where two basic network
topologies, when connected
together, can still retain the
basic network character, and
therefore not be a hybrid
network.
Star-Bus
Star-Ring
26. Hybrid Topology
26
Star Bus
The star bus is a combination
of the bus and star topologies.
In a star-bus topology, several
star topology networks are
linked together with linear bus
trunks.
If one computer goes down, it
will not affect the rest of the
network. The other computers
can continue to communicate.
If a hub goes down, all
computers on that hub are
unable to communicate. If a
hub is linked to other hubs,
those connections will be
27. Hybrid Topology
27
Star Ring
The star ring (sometimes
called a star-wired ring)
appears similar to the star
bus. Both the star ring
and the star bus are
centered in a hub that
contains the actual ring or
bus.
Linear-bus trunks connect
the hubs in a star bus,
while the hubs in a star
ring are connected in a
star pattern by the main
hub.
28. Choosing network topology
A network's topology affects its capabilities.
The choice of one topology over another will
have an impact on the:
Type of equipment the network needs.
Capabilities of the equipment.
Growth of the network.
Way the network is managed.
29. Summary on Network
Topologies
The physical layout of computers on a network is called a
topology.
There are four primary topologies: star, bus, ring, and mesh.
Topologies can be physical (actual wiring) or logical (the way
they work).
In a bus topology, the computers are connected in a linear
fashion on a single cable.
Bus topologies require a terminator on each end of the cable.
In a star topology, the computers are connected to a
centralized hub.
Mesh topologies connect all computers in a network to one
another with separate cables.
In a token-ring topology, the computers are connected
physically in a star shape, but logically in a ring or circle. The
data is passed from one computer to another around the circle.
Hubs are used to centralize the data traffic and localize failures.
If one cable breaks, it will not shut down the entire network.
30. Summary on Network
Topologies
30
Topolog
y
Advantages Disadvantages
Bus Use of cable is economical.
Media is inexpensive and easy to work
with.
System is simple and reliable.
Bus is easy to extend.
Network can slow down in
heavy traffic. Problems are
difficult to isolate.
Cable break can affect
many users.
Ring System provides equal access for all
computers. Performance is even despite
many users.
Failure of one computer
can impact the rest of the
network. Problems are hard
to isolate.
Network reconfiguration
disrupts operation.
Star Modifying system and adding new
computers is easy. Centralized
monitoring and management are
possible.
Failure of one computer does not affect
the rest of the network.
If the centralized point
fails, the network fails.
31. Self check Questions on network topology
31
1) Physical or logical arrangement of network is
a) Topology b) Routing c) Networking d) None
2) In this topology there is a central controller or
hub
a) Star b) Mesh c) Ring d) Bus
3) This topology requires multipoint connection
a) Star b) Mesh c) Ring d) Bus
4) Data communication system spanning states,
countries, or the whole world is
a) LAN b) WAN c) MAN d) None
5. Calculate the number of cables used for 11
computers in mesh topology ?
A. 110 B. 55 C. 50 D. 11
32. Self check Questions on network topology
32
Exercise 1.1: Case Study Problem
A small, independent, business/home/life insurance company
consisting of an owner, a business manager, an administrator,
and four agents decides to implement a network. The company
occupies half of a small building in an office park. Their volume
of business had been stable for the past three years, but
recently it has been increasing. To handle the increased
business volume, two new agents will be hired.
The Following Figure illustrates the current arrangement.
Figure 1 Case study model
33. Self check Questions on network
topology
Continued…
Everyone in the company has a computer, but the business manager has
the only printer. These computers are not connected by any form of
networking. When agents need to print a document, they must first copy the
file to a flash disk, then carry it to the business manager's computer, where
they are finally able to print it. Similarly, when staff members want to share
data, the only means available is to copy the data on one computer to a
flash disk and insert the disk in another computer.
Recently, problems have arisen. The business manager is spending too
much time printing other people's documents; and it is frequently unclear
which copy of a given document is the current and authoritative version.
Your task is to design a network for this company. To clarify the task of
choosing a solution, you ask some questions. Circle the most appropriate
answers to the following questions:
Which type of network would you suggest for this company?
Peer-to-peer
Server-based
Which network topology would be most appropriate in this situation?
Bus Ring Star Mesh Star bus Star ring
34. LO1: Identify key information
source
Overview of Media Access Methods
A media access method refers to the manner in which a
computer gains and controls access to the network’s
physical medium (e.g., cable).
Common media access methods include the following:
CSMA/CD
CSMA/CA
Token Passing
Demand priority
One of the primary concerns with media access is how to
prevent packets from colliding when two or more
computers try to transmit simultaneously.
If two stations are transmitting at the same time, it is
possible that the signals may overlap, resulting in garbled
data. Such overlapping is referred to as a "collision."
35. CSMA/CD
CSMA/CD stands for Carrier-Sense Multiple Access with
Collision Detection. It is a media access method which
means it defines how the network places data on the cable
and how it takes it off.
CSMA/CD specifies how bus topologies such as Ethernet
handle transmission collisions. A collision occurs when two
or more computers transmit signals at the same time.
"Carrier Sense" means that each computer on the LAN continually
listens to the cable for the presence of a signal prior to transmitting.
"Multiple Access" means that there are many computers attempting
to transmit and compete for the opportunity to send data (i.e., they are
in contention).
"Collision Detection" means that when a collision is detected, the
stations will stop transmitting and wait a random length of time before
retransmitting.
Because CSMA/CD works to control or manage collisions
rather than prevent them, network performance can be
36. CSMA/CA
CSMA/CA stands for Carrier-Sense Multiple Access
with Collision Avoidance and is a media access
method very similar to CSMA/CD.
The difference is that the CD (collision detection) is
changed to CA (collision avoidance).
Instead of detecting and reacting to collisions,
CSMA/CA tries to avoid them by having each
computer signal its intention to transmit before
actually transmitting. In effect, the transmitting
computer gives a 'heads up' prior to transmitting.
Although CSMA/CA can prevent collisions, it comes
with a cost in the form of the additional overhead
incurred by having each workstation broadcast it's
intention prior to transmitting. Thus, CSMA/CA is
slower than CSMA/CD.
37. TOKEN PASSING
Token passing is a media access method
by which collisions are prevented.
Collisions are eliminated under token
passing because only a computer that
possesses a free token (a small data frame)
is allowed to transmit.
The token passing method also allows
different priorities to be assigned to different
stations on the ring. Transmissions from a
stations with higher priority take precedence
over stations with lower priority.
Token passing is used on Token Ring
networks
38. Demand Priority
Demand priority is a media-access method works with
a star topology.
In this method, a node that wishes to transmit indicates
this wish to the hub and also requests high- or regular-
priority service for its transmission. After it obtains
permission, the node begins transmitting to the hub.
The hub is responsible for passing the transmission on
to the destination node; that is, the hub is responsible
for providing access to the network.
By letting the hub manage access, the architecture is
able to guarantee required bandwidths and requested
service priority to particular applications or nodes.
Demand priority is a media-access method used in a
100 megabit per second (Mbit/s) 100 Ethernet
implementation
39. 1. Which Media Access Method works with Star
Topology?
A. CSMA/CD B. Token Passing C.
Demand Priority D. A and B
2. One of the primary concerns with media
access is
A.
What is the primery concerns with media
access method?
40. LAN Architectures
Network architecture refers to the manner in
which the hardware and software is structured.
The architecture includes the cable access
method (transmission), topology, and lower level
protocols.
The most common types of LAN architectures
are
Ethernet(Fast Ethernet, Gigabit Ethernet) and
Token Ring
41. Ethernet (Fast Ethernet, Gigabit
Ethernet)
Ethernet is a popular, relatively inexpensive, easy-to-install LAN
architecture with the following characteristics:
Uses the CSMA/CD media access control.
Data transmission normally occurs at 100 Mbps (10Mbps in the early forms
and 10Gbps in the most recent forms).
Typically implemented in a star topology (early versions used bus topology
as well).
Ethernet LANs are normally distinguished by the type of cable they use
Twisted Pair (Thinnet or Thicknet were also used in the past).
An Ethernet LAN is often described in terms of three parameters:
transmission rate, transmission type, and segment distance or cable
type.
"100baseT" means:
100 - transmission rate or through put of 100Mbps
base - transmission type is baseband rather than broadband network (i.e., the
signal is placed directly on the cable, one signal at a time)
T – the cable type (e.g. Twisted pair)
Few types of Ethernet: 10Base2, 10Base5, 10BaseT and 10BaseF,
Few types of Fast Ethernet 100BaseT, 100BaseF, Few types of Gigabit
Ethernet 1000BaseT, 1000BaseF etc..
42. Token Ring
Token ring is a relatively expensive LAN
architecture that is strongly influenced by IBM. It is
very stable and can be expanded without a
significant degradation in network performance.
Token ring uses the token passing media access
control. Data transmission normally occurs at 4 or
16 Mbps depending on the cable.
Token ring is normally implemented in a logical
ring/physical star topology with a MAU (Multistation
Access Unit) as the hub. The maximum number of
stations on one ring is 260 for shielded twisted pair
and 72 for unshielded twisted pair (UTP). There can
be up to 33 MAUs per ring.
Token Ring LANs normally use shielded twisted pair
(STP) but may also use unshielded twisted pair
(UTP) or fiber-optic cable. The maximum distance to
the MAU from the workstation depends on the cable
and varies from 45 meters for UTP to 100 meters for
STP.
44. Internetworking Devices
Why Interconnect?
To separate / connect one corporate
division with another.
To connect two LANs with different
protocols.
To connect a LAN to the Internet.
To provide a security wall between two
different types of users.
To connect WLAN to LAN
45. Repeater
Repeaters amplify a weak signal so that the signal stays
as strong as the original one.
Used when a network’s cabling extends beyond its
capability.
46. Hub
A hub interconnects two or more workstations
into a local area network.
The Cloud
47. Hub
When a workstation transmits to a hub, the hub
immediately resends the data frame to all
connecting links. This will increase network
traffic.
To overcome this drawback of hubs, Switches
were introduced.
Hubs expand one Ethernet connection into many.
For example, a four-port hub connects up to four
machines
Simply a multi-port repeater.
48. Types of Hub
Passive Hub
Passive hubs used in a LAN environment; special form of repeater
that allow multiple devices to be wired into a central location and
share the same media; do not regenerate (repeat) the signal
Active Hub
An Ethernet hub, active hub, network hub, repeater hub, multiport
repeater or hub is a device for connecting multiple Ethernet
devices together and making them act as a single network
segment. ...
A central connecting device in a network that regenerates signals
on the output side to keep the signal strong. Also called a
"multiport repeater.
And it is more intelligent than passive Hub
49. HUB
Hubs inexpensive devices. However, hubs can
considerably increase network traffic because
they broad cost data to the device connected
on all the ports resulting in increase network
traffic.
To overcome this drawback of hubs, Switches
were introduced.
CP2073 Networking
49