Chapter 27. Network Components and Topologies

   

Chapter 27. Network Components and Topologies

Chapter Syllabus

27.1 Network Topologies

27.2 Network Hardware Components

27.3 MAC Addresses

27.4 Access Methods

27.5 Ethernet and IEEE 802.3

27.6 Token Ring and IEEE 802.5

27.7 FDDI

A network is a set of servers and workstations connected to each other through some communication medium. Network components are used for the interconnection purpose. Network interface adapters are installed in computer systems to connect to a cable that serves as the communication medium. Different types of cables are used depending on particular requirements. Cable connectors and terminators are used to connect cables to network interface adapters. A layout of the cables connecting different systems is called a network topology. Different network topologies are used depending on the network requirements such as the length of a network, cost, and speed of data transmission. Other network components are also used depending on the complexity of a network. Some of these components are repeaters, bridges, and routers. All network components fall into one or more layers as defined by the OSI model. Common examples of physical layer network components are network cables, connectors, cable terminators, and repeaters. Examples of data link layer network components are bridges and switches. Routers are used in the network layer of the OSI model.

The transmission media in the physical layer of the OSI network model is accessed by the data link layer using an access method. Different types of access methods are available, such as CSMA/CD and token passing. An access method also depends on the underlying network topology.

This chapter starts with an introduction to network topologies. In the next section, network components are covered, where you will find a brief introduction to the commonly used network devices. Physical or MAC addresses are used at the data link layer level, and you will find an introduction to the structure of MAC addresses. CSMA/CD and token passing access methods are discussed next . In the last part of the chapter, an introduction to Ethernet, token ring, and FDDI is presented.


   
Top


HP Certified
HP Certified: HP-UX System Administration
ISBN: 0130183741
EAN: 2147483647
Year: 2000
Pages: 390
Authors: Rafeeq Rehman

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net