CNEE 110, Chapter 6, Networking Hardware CHAPTER SUMMARY
Terms
undefined, object
copy deck
- Bridges resemble repeaters in that they have a single input and a single output port, but they can interpret the data they retransmit. Bridging occurs at the Data Link layer of the OSI Model. Bridges read the destination (MAC) address information and dec
- Chapter Summary
-
A MIB (management information base) is a collection of data used by management
programs (which may be part of the network operating system or a third-party pro-gram)to analyze network performance and problems. - Chapter Summary
-
A router is a multiport device that can connect dissimilar LANs and WANs running
at different transmission speeds and using a variety of protocols. Routers operate at the Network layer (Layer 3) or higher of the OSI Model. historically, routers have - Chapter Summary
- A switch running in cut-through mode will read a frameÂ’s header and decide where to forward the data before it receives the entire packet.
- Chapter Summary
- A typical router has an internal processor, its own memory and power supply, input and output jacks for different types of network connectors (depending on the net-work type), and, usually, a management console interface.
- Chapter Summary
-
An IRQ is the means by which a device can request attention from the CPU. IRQ
numbers range from 0 to 15.The BIOS will attempt to assign free IRQ numbers
to new devices. Typically, it will assign IRQ numbers 9,10, or 11, to network adapters. If - Chapter Summary
- As nodes transmit data through the bridge, the bridge establishes a filtering database of known MAC addresses and their locations on the network.The bridge uses its filtering database to determine whether a packet should be forwarded or filtered.
- Chapter Summary
-
At its most primitive, a hub is a multiport repeater. A simple hub may contain mul-tiple ports that can connect a group of computers in a peer-to-peer fashion, accept-ing and repeating signals from each node. A slightly more sophisticated hub may
co - Chapter Summary
- Devices other than PCs, such as networked printers, use specialized network adapters. Printer network adapters also come in a variety of styles suited to different applications. By far, the most popular printer network adapter is Hewlett-PackardÂ’s JetDi
- Chapter Summary
- Dynamic routing automatically calculates the best path between two nodes and accumulates this information in a routing table. If congestion or failures affect the network, a router using dynamic routing can detect the problems and reroute data through a
- Chapter Summary
- Finding the best route for data to take across the network is an important router function.The best path will depend on the number of hops between nodes, the current network activity, the unavailable links, the network transmission speed, and the topolog
- Chapter Summary
- Firmware combines hardware and software. The hardware component of firmware is an electrically erasable programmable read-only memory (EEPROM) chip that stores data established at the factory. This data can be changed by configuration software.
- Chapter Summary
-
For a desktop or tower PC, an expansion card network adapter is used. It must
match the systemÂ’s bus. A bus is the type of circuit used by the system board to transmit data to components. Network adapters may fit ISA, EISA, MCA, or PCI buses. New c - Chapter Summary
-
Gateways are combinations of networking hardware and software that connect two
dissimilar kinds of networks. Specifically, they may connect two systems that use different formatting, communications protocols, or architecture. To accomplish this
- Chapter Summary
- Hubs that merely repeat signals are called passive hubs.
- Chapter Summary
- In addition to improving bandwidth usage, switches can create virtual local area networks (VLANs) by logically grouping several ports into a broadcast domain.The ports do not have to reside on the same switch or even on the same network segment.
- Chapter Summary
-
In addition to network adapters that interface with network cabling, network
adapters can be designed for wireless transmission. A wireless network adapter uses an antenna to exchange signals with the network.This type of connectivity suits environm - Chapter Summary
- In store and forward mode, switches read the entire data frame into their memory and check it for accuracy before transmitting it. Although this method is more time-consuming than the cut-through method, it allows store and forward switches to transmit d
- Chapter Summary
- Intelligent hubs are also called managed hubs, because they can be managed from anywhere on the network. A standalone, stackable, or modular hub may include processing capabilities and, therefore, be considered intelligent.
- Chapter Summary
-
Manufacturers are producing switches that can operate at Layer 3 (Network layer)and Layer 4 (Transport layer) of the OSI Model, making them act more like
routers. The ability to interpret higher-layer data enables switches to perform advanced filter - Chapter Summary
-
Many IRQ numbers are preassigned to system devices. For example, a keyboard
uses IRQ 1, COM1 and COM3 use IRQ 4, a floppy disk drive uses IRQ 6, LPT1
uses IRQ 7, the clock uses IRQ 8, and the math coprocessor uses IRQ 13. - Chapter Summary
-
Network adapters may also be externally attached, through the PCMCIA, USB, or
parallel port. - Chapter Summary
-
Network interface cards (NICs) come in a variety of types depending on logical
topology (Ethernet versus Token Ring), network transmission speed (for example,
10 Mbps versus 100 Mbps), connector interfaces (for example, BNC versus RJ-45), type - Chapter Summary
- On servers, you may need to install multiple network adapters. For the hardware installation, you can repeat the same installation process used for the first network adapter, choosing a different slot. The trick to using multiple network adapters lies in
- Chapter Summary
- Repeaters are the connectivity devices that perform the regeneration of a digital signal. They belong to the Physical layer of the OSI Model; therefore, they do not have any means to interpret the data they are retransmitting.
- Chapter Summary
-
Some older NICs require hardware adjustments to indicate different variables, such as IRQ or I/O address settings.They may use jumpers, small plastic pieces containing a metal bridge that closes a circuit between two pins on the expansion card, or DIP
- Chapter Summary
- Static routing is a technique in which a network administrator programs a router to use specific paths between nodes.
- Chapter Summary
- Switches are generally secure because they isolate one deviceÂ’s traffic from other devicesÂ’ traffic. Because switches provide separate channels for (potentially) every device, they allow applications that transfer a large amount of traffic and that are
- Chapter Summary
- Switches subdivide a network into smaller logical pieces. They operate at the Data Link layer (Layer 2) of the OSI Model and can interpret MAC address information. In this respect, switches resemble bridges.
- Chapter Summary
-
The networking industry has adopted the term “brouter” to describe routers that
take on some of the characteristics of bridges. Crossing a router with a bridge
allows you to forward data using nonroutable protocols, such as NetBEUI, and to co - Chapter Summary
-
To change a network adapterÂ’s firmware, you will need a bootable floppy disk
(DOS version 6.0 or higher) containing the configuration or the DOS install utility that shipped with the network adapter. To run the utility, you must start the com-puter - Chapter Summary
- To install a NIC, you must physically attach it to the bus (or port), install the NIC device drivers, and configure its settings.
- Chapter Summary
- Typically, gateways are used for one of four purposes: as an e-mail gateway, as an IBM host gateway, as an Internet gateway, or as a LAN gateway.
- Chapter Summary
-
Unlike bridges and traditional switches, routers are protocol-dependent.They must be designed or configured to recognize a certain protocol before they can forward
data transmitted using that protocol. - Chapter Summary