SlideShare uma empresa Scribd logo
1 de 23
1Lesson 2—Networking BASICS
Networking BASICS
Network Media
Unit 1
Lesson 2
Lesson 2—Networking BASICS2
Types of Networks
• There are two types of
networks by which
information is transmitted:
– circuit switched networks
– packet switched networks
Lesson 2—Networking BASICS3
Circuit Switched Network
• There is a dedicated and direct physical
connection between sender and receiver.
• No other transmissions can take place while
the connection is active.
• Once the transmission is ended, other
connections can be made with other devices.
• It is ideal for voice communications because
there are no interruptions from other devices
or delays.
Lesson 2—Networking BASICS4
Packet Switched Network
• This network requires data transmission be broken
into smaller units called packets.
• Each packet is sent independently through the
network.
• It is used for data transmission because data is not
as time-sensitive as voice communication.
• It allows multiple devices to share one line or
frequency.
• It facilitates error correction.
Lesson 2—Networking BASICS5
Signaling Techniques
• There are two ways that a
signal is sent across a
network medium:
– baseband signaling
– broadband signaling
Lesson 2—Networking BASICS6
Baseband Signaling
• Sends one data signal across the network
media
• Entire capacity of the media is used for the
one data signal
• Signals are transmitted in a digital format
• Many devices can send and receive across
the medium, but only one at a time
Lesson 2—Networking BASICS7
Baseband Signaling
Lesson 2—Networking BASICS8
Broadband Signaling
• Divides the cable into several different
channels
• Signals are transmitted at different
frequencies in an analog mode
• Allows many different signals to be sent
simultaneously on a single cable
• Signal sent in only one direction
• Used for computer network data
transmissions
Lesson 2—Networking BASICS9
Broadband Signaling
Lesson 2—Networking BASICS10
Factors Affecting Transmissions
• The flow of a signal down the
network media can become
distorted.
• Common types of distortions are
attenuation and interference.
Lesson 2—Networking BASICS11
Attenuation
• Loss of signal power
• Measured by the decrease
in decibels (db) over a
specific distance
Lesson 2—Networking BASICS12
Interference
• Interference is caused when a strong external signal
interferes with a signal.
• Radio frequency interference (RFI) - interference
caused by broadcast signals from a radio or
television transmitter.
• Electromagnetic interference (EMI) - motor or
source of intense electrical activity creates an
electromagnetic signal that interferes with a data
signal.
• Near end crosstalk (NEXT) and Far end crosstalk
(FEXT) - interference from another data signal being
transmitted on adjacent wire.
Lesson 2—Networking BASICS13
Transmission Media
•Copper cables
•Fiber optic cables
•Wireless
Lesson 2—Networking BASICS14
Copper Cables
• Thin coaxial
• Shielded twisted pair (STP)
• Unshielded twisted pair
(UTP)
• UTP rated by Category 1 - 6
Lesson 2—Networking BASICS15
Copper Cables
Lesson 2—Networking BASICS16
Copper Cables
Lesson 2—Networking BASICS17
Fiber Optic
• This cable uses a thin cylinder of glass to
send light impulses.
• The cable consists of a strand of glass (core)
surrounded by a glass tube (cladding).
• Single mode - one light source flashes a light
down the cable.
• Multimode - supports many simultaneous
light transmissions.
Lesson 2—Networking BASICS18
Fiber Optic
Lesson 2—Networking BASICS19
Wireless
• Transmission is sent and received through
invisible waves
• Less expensive than copper or fiber optic
lines.
• Allows the user to move freely around the
office or campus and still remain connected
to the network
• Fastest-growing segment of network media
today
Lesson 2—Networking BASICS20
Wireless Transmissions
• Infrared transmits data using infrared (IR)
light.
• IR shares many of the same properties as
visible light .
• Radio frequency signals can be transmitted
over radio waves similar to local radio station
transmissions.
• The signal comes in at a lower power level
and does not reach as far.
Lesson 2—Networking BASICS21
Network Interface Card
• The NIC serves as the connection between
the personal computer and the network
media.
• It connects to the computer on its base by
plugging into an expansion slot of the
computer.
• Another connection is accessible from the
outside of the computer and has connections
for the cables to plug into the network.
Lesson 2—Networking BASICS22
Network Interface Card
• Changes from parallel to
serial transmission
• Creates packets
• Determines when to send
• Transmits packet
Lesson 2—Networking BASICS23
Network Interface Card

Mais conteúdo relacionado

Mais procurados

dsl (digital subscriber line)
dsl (digital subscriber line)dsl (digital subscriber line)
dsl (digital subscriber line)waheed iqbal
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their workingrockingprashik
 
Mobility Management
Mobility ManagementMobility Management
Mobility ManagementHira Shaukat
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Router vs switch
Router vs switchRouter vs switch
Router vs switchIT Tech
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopSANJUU7
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial junaidahmedsaba
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 

Mais procurados (20)

dsl (digital subscriber line)
dsl (digital subscriber line)dsl (digital subscriber line)
dsl (digital subscriber line)
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their working
 
Dsl
DslDsl
Dsl
 
broadband technology
broadband technologybroadband technology
broadband technology
 
Mobility Management
Mobility ManagementMobility Management
Mobility Management
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Router vs switch
Router vs switchRouter vs switch
Router vs switch
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Dsl
DslDsl
Dsl
 
Guided Media
Guided MediaGuided Media
Guided Media
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Chapter 3: Data & Signals
Chapter 3: Data & SignalsChapter 3: Data & Signals
Chapter 3: Data & Signals
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Network devices ppt
Network devices   pptNetwork devices   ppt
Network devices ppt
 

Destaque (20)

Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
 
Unguided media in Networks
Unguided media in NetworksUnguided media in Networks
Unguided media in Networks
 
Guided media and Unguided media
Guided media and Unguided mediaGuided media and Unguided media
Guided media and Unguided media
 
Ring topologoy
Ring  topologoyRing  topologoy
Ring topologoy
 
TREE TOPOLOGY
TREE TOPOLOGY TREE TOPOLOGY
TREE TOPOLOGY
 
Ring topology
Ring topologyRing topology
Ring topology
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
Ch06
Ch06Ch06
Ch06
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
 
Ramadan 2008
Ramadan 2008Ramadan 2008
Ramadan 2008
 
Ch23 system administration
Ch23 system administration Ch23 system administration
Ch23 system administration
 
Ch18 system administration
Ch18 system administration Ch18 system administration
Ch18 system administration
 
Beat Anger
Beat AngerBeat Anger
Beat Anger
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Ch14 system administration
Ch14 system administration Ch14 system administration
Ch14 system administration
 
Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
 
Ch20 system administration
Ch20 system administration Ch20 system administration
Ch20 system administration
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 
Ch03
Ch03Ch03
Ch03
 
Ch04 system administration
Ch04 system administration Ch04 system administration
Ch04 system administration
 

Semelhante a Chapter03 a - network media

01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
Network and its concepts
Network and its conceptsNetwork and its concepts
Network and its conceptsHimanshu Sajwan
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
5 Intro to Networking.ppt
5 Intro to Networking.ppt5 Intro to Networking.ppt
5 Intro to Networking.pptOliverCSilvano
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 
HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentationurmishabm
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptTestUser621581
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & MediaSoumyakatkam
 
Bca i-fundamental of computer-u-4-data communication and network
Bca  i-fundamental of  computer-u-4-data communication and networkBca  i-fundamental of  computer-u-4-data communication and network
Bca i-fundamental of computer-u-4-data communication and networkRai University
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerAbdelkhalik Mosa
 
Mca i-fundamental of computer-u-4-data communication and network
Mca  i-fundamental of  computer-u-4-data communication and networkMca  i-fundamental of  computer-u-4-data communication and network
Mca i-fundamental of computer-u-4-data communication and networkRai University
 
Bsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksBsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksRai University
 
Bsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksBsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksRai University
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005SOLOMONCHINAEMEUCHEA
 
Bba i-introduction to computer-u-4-data communication and network
Bba  i-introduction to computer-u-4-data communication and networkBba  i-introduction to computer-u-4-data communication and network
Bba i-introduction to computer-u-4-data communication and networkRai University
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 
Data communication and network
Data communication and networkData communication and network
Data communication and networkHardik Patel
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingZaeem Hassan
 

Semelhante a Chapter03 a - network media (20)

01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Network and its concepts
Network and its conceptsNetwork and its concepts
Network and its concepts
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
5 Intro to Networking.ppt
5 Intro to Networking.ppt5 Intro to Networking.ppt
5 Intro to Networking.ppt
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentation
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).ppt
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & Media
 
Bca i-fundamental of computer-u-4-data communication and network
Bca  i-fundamental of  computer-u-4-data communication and networkBca  i-fundamental of  computer-u-4-data communication and network
Bca i-fundamental of computer-u-4-data communication and network
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
Mca i-fundamental of computer-u-4-data communication and network
Mca  i-fundamental of  computer-u-4-data communication and networkMca  i-fundamental of  computer-u-4-data communication and network
Mca i-fundamental of computer-u-4-data communication and network
 
Bsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksBsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networks
 
Bsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networksBsc cs 1 fit u-4 data communication and networks
Bsc cs 1 fit u-4 data communication and networks
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Bba i-introduction to computer-u-4-data communication and network
Bba  i-introduction to computer-u-4-data communication and networkBba  i-introduction to computer-u-4-data communication and network
Bba i-introduction to computer-u-4-data communication and network
 
osi
osi osi
osi
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Data communication and network
Data communication and networkData communication and network
Data communication and network
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 

Mais de Raja Waseem Akhtar

Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its toolsRaja Waseem Akhtar
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networksRaja Waseem Akhtar
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking securityRaja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problemsRaja Waseem Akhtar
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networkingRaja Waseem Akhtar
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linuxRaja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networkingRaja Waseem Akhtar
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivityRaja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methodsRaja Waseem Akhtar
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardwareRaja Waseem Akhtar
 

Mais de Raja Waseem Akhtar (20)

The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
 
God is Great
God is GreatGod is Great
God is Great
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
 
Jerusalm at night.pps
Jerusalm at night.ppsJerusalm at night.pps
Jerusalm at night.pps
 
From the sky
From the skyFrom the sky
From the sky
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Chapter03 a - network media

  • 1. 1Lesson 2—Networking BASICS Networking BASICS Network Media Unit 1 Lesson 2
  • 2. Lesson 2—Networking BASICS2 Types of Networks • There are two types of networks by which information is transmitted: – circuit switched networks – packet switched networks
  • 3. Lesson 2—Networking BASICS3 Circuit Switched Network • There is a dedicated and direct physical connection between sender and receiver. • No other transmissions can take place while the connection is active. • Once the transmission is ended, other connections can be made with other devices. • It is ideal for voice communications because there are no interruptions from other devices or delays.
  • 4. Lesson 2—Networking BASICS4 Packet Switched Network • This network requires data transmission be broken into smaller units called packets. • Each packet is sent independently through the network. • It is used for data transmission because data is not as time-sensitive as voice communication. • It allows multiple devices to share one line or frequency. • It facilitates error correction.
  • 5. Lesson 2—Networking BASICS5 Signaling Techniques • There are two ways that a signal is sent across a network medium: – baseband signaling – broadband signaling
  • 6. Lesson 2—Networking BASICS6 Baseband Signaling • Sends one data signal across the network media • Entire capacity of the media is used for the one data signal • Signals are transmitted in a digital format • Many devices can send and receive across the medium, but only one at a time
  • 8. Lesson 2—Networking BASICS8 Broadband Signaling • Divides the cable into several different channels • Signals are transmitted at different frequencies in an analog mode • Allows many different signals to be sent simultaneously on a single cable • Signal sent in only one direction • Used for computer network data transmissions
  • 10. Lesson 2—Networking BASICS10 Factors Affecting Transmissions • The flow of a signal down the network media can become distorted. • Common types of distortions are attenuation and interference.
  • 11. Lesson 2—Networking BASICS11 Attenuation • Loss of signal power • Measured by the decrease in decibels (db) over a specific distance
  • 12. Lesson 2—Networking BASICS12 Interference • Interference is caused when a strong external signal interferes with a signal. • Radio frequency interference (RFI) - interference caused by broadcast signals from a radio or television transmitter. • Electromagnetic interference (EMI) - motor or source of intense electrical activity creates an electromagnetic signal that interferes with a data signal. • Near end crosstalk (NEXT) and Far end crosstalk (FEXT) - interference from another data signal being transmitted on adjacent wire.
  • 13. Lesson 2—Networking BASICS13 Transmission Media •Copper cables •Fiber optic cables •Wireless
  • 14. Lesson 2—Networking BASICS14 Copper Cables • Thin coaxial • Shielded twisted pair (STP) • Unshielded twisted pair (UTP) • UTP rated by Category 1 - 6
  • 17. Lesson 2—Networking BASICS17 Fiber Optic • This cable uses a thin cylinder of glass to send light impulses. • The cable consists of a strand of glass (core) surrounded by a glass tube (cladding). • Single mode - one light source flashes a light down the cable. • Multimode - supports many simultaneous light transmissions.
  • 19. Lesson 2—Networking BASICS19 Wireless • Transmission is sent and received through invisible waves • Less expensive than copper or fiber optic lines. • Allows the user to move freely around the office or campus and still remain connected to the network • Fastest-growing segment of network media today
  • 20. Lesson 2—Networking BASICS20 Wireless Transmissions • Infrared transmits data using infrared (IR) light. • IR shares many of the same properties as visible light . • Radio frequency signals can be transmitted over radio waves similar to local radio station transmissions. • The signal comes in at a lower power level and does not reach as far.
  • 21. Lesson 2—Networking BASICS21 Network Interface Card • The NIC serves as the connection between the personal computer and the network media. • It connects to the computer on its base by plugging into an expansion slot of the computer. • Another connection is accessible from the outside of the computer and has connections for the cables to plug into the network.
  • 22. Lesson 2—Networking BASICS22 Network Interface Card • Changes from parallel to serial transmission • Creates packets • Determines when to send • Transmits packet