Unit 2 and Unit 3
Unit 2 and Unit 3
Hardware devices that are used to connect computers, printers, fax machines
and other electronic devices to a network are called network devices. These
devices transfer data in a fast, secure and correct way over the same or different
networks. Network devices may be inter-network or intra-network. Some devices
are installed on the device, like NIC card or RJ45 connector, whereas some are
part of the network, like router, switch, etc.
Purpose:
- Used to convert data into digital signals.
- NIC allows both wired and wireless communications.
- NIC allows communications between computers connected via local area
network (LAN) as well as communications over large-scale networks
through Internet Protocol (IP).
- NIC is both a physical layer and a data link layer device, i.e. it provides
the necessary hardware circuitry so that the physical layer processes and
some data link layer processes can run on it.
- High communication speed, easy to troubleshoot, not so expensive
- Not secure, Wired connection, Proper configuration needed.
Repeaters
When the incoming signals are attenuated, it copies them bit by bit and
retransmits them at their original strength. It is used for longer-distance data
transmission without compromising data security or quality. Repeaters are
two-port devices.
Features of a Repeater:
- It strengthens the system signals by transmitting signals to the weaker
locations.
- The Repeaters can continuously monitor the signals generated between
the two LANs.
- Repeaters can help with networking flexibility.
- Repeaters do not necessitate any additional processing. The only time
they need to be investigated is when performance suffers.
- Signals can be connected using various types of cables by using repeaters.
Advantages of repeaters:
- The Repeater supports the signal strength.
- These Repeaters are both cheap and easy to use.
- The Repeaters have no impact on the network's performance.
- These Repeaters are capable of retransmitting data and boosting weak
signals.
Disadvantages of repeaters
- The number of collisions increases as the number of repeaters increases.
- Only a limited number of repeaters can be connected to it.
- We can't connect the different network architectures in repeaters.
- The data traffic in the Repeaters cannot be reduced.
Hub
The main purpose of a hub is to connect all present network devices together on
a predefined internal network. Hub is a device consisting of multiple ports that
accept ethernet connections from network devices. Hub is not considered to be
an intelligent one because it doesn't filter any data present or has no intelligence
to assume as to where the data is actually supposed to be sent, and that’s the
reason because the only thing a hub knows is that when a device is actually
connected to one of its ports. So whenever a data packet arrives at one of the
ports, it is copied to all the other ports. So all the devices present on that hub
see that data packet. So again, when a data packet comes into one port, the hub
will just rebroadcast that data to every port that has a device connected to it.
Hub is a multiport Repeater.
So, even if only two computers among the entire group want to communicate,
the other computers will also receive the data, even though it was not actually
intended for them. So whenever this happens, it not only creates security
concerns, but it also creates unnecessary traffic on the network, which wastes
bandwidth.
Pros:
- Ability to connect to the network using various physical devices.
- Cheaper compared to other devices.
- Causes a minimum delay.
- Does not affect the network’s performance.
Cons:
- Does not filter the data, hence wastage of bandwidth.
- Makes the network insecure by sharing data to all devices present in the
network.
- Involves flooding of data.
Types of Hubs:
- Active Hub: Electronics are used in Active Hubs to amplify and clean
signals before transmitting them to additional ports. The primary purpose
of active hubs is to increase the maximum distance between nodes. It
serves as both a wiring centre and a repeater.
- Passive Hub: Hubs that connect solely to Active Hubs are known as
Passive Hubs. Passive Hubs are merely used to link all ports together
electrically, and they are typically not powered. Passive hubs are more
expensive than these hubs. The signal is not amplified nor regenerated by
passive hubs.
Bridge
Working of a Bridge:
A bridge performs in the following aspect:
- A bridge receives all the packets or frame from both LAN (segment) A and
B.
- A bridge builds a table of addresses from which it can identify that the
packets are sent from which LAN (or segment) to which LAN.
- The bridge reads the send and discards all packets from LAN A sent to a
computer on LAN A and that packets from LAN A send to a computer on
LAN B are retransmitted to LAN B.
- The packets from LAN B are considered in the same method.
Types of Bridges:
- Transparent Bridge:
Transparent bridges are invisible to other devices on the network. This bridge
doesn’t reconfigure the network on the addition or deletion of any station. The
prime function of the transparent bridge is to block or forward the data according
to the MAC address.
- Source Routing Bridge:
Source routing bridges were developed and designed by IBM specifically for
token ring networks. The frame’s entire route is embedded with the data frames
by the source station to perform the routing operation so that once the frame is
forwarded it must follow a specific defined path/route.
- Translational Bridge:
Translational bridges convert the received data from one networking system to
another. Or it is used to communicate or transmit data between two different
types of networking systems. Like if we are sending data from a token ring to an
Ethernet cable, the translational cable will be used to connect both the
networking system and transmit data.
Advantages:
- Bridges can be used as a network extension like they can connect two
network topologies together.
- It has a separate collision domain, which results in increased bandwidth.
- It can create a buffer when different MAC protocols are there for different
segments.
- Highly reliable and maintainable. The network can be divided into multiple
LAN segments.
- Simple installation, no requirement of any extra hardware or software
except the bridge itself.
- Protocol transparency is higher as compared to other protocols.
Disadvantages:
- Expensive as compared to hubs and repeaters.
- Slow in speed.
- Poor performance as additional processing is required to view the MAC
address of the device on the network.
- As the traffic received is in bulk or is broadcasted traffic, individual
filtering of data is not possible.
- During the broadcasting of data, the network has high broadcast traffic
and broadcast storms can be formed.
Switch
Unlike our hub, a switch is the intelligent one. A switch can learn the physical
addresses of the devices that are actually connected to it, and then it stores
these physical addresses called MAC addresses in its table. So whenever a data
packet is sent to a switch, it’s only directed to the intended destination port,
unlike a hub where a hub will just rebroadcast the data to every port.
If two computers here want to communicate with each other, the data packet
first arrives at the switch, and then the switch will look at its table of MAC
addresses and matching ports there and deliver the data to the correct port. And
then, the data packet goes to the required computer. So as a result, switch are
far more preferred over hubs because they reduce any unnecessary traffic on the
network. Switches operate at the Data Link layer (layer 2) of the OSI model.
Switches resemble bridges and can be considered as multiport bridge.
Types of Switching:
- Store-and-Forward Switching:
Store-and-forward switching is a method of switching data packets by the
switching device that receives the data frame and then checks for errors before
forwarding the packets. It supports the efficient transmission of non-corrupted
frames. It is generally used in telecommunication networks.
In store-and-forward switching, the switching device waits to receive the entire
frame and then stores the frame in the buffer memory. Then the frame is
checked for errors by using CRC(Cyclic Redundancy Check) if the error is found
then the packet is discarded else it is forwarded to the next device.
- Cut-through Switching:
Cut-through switching is a method of switching data packets by the switching
device that forwards the packets as soon as the destination address is available
without waiting for the rest of the data to arrive. It supports low latency and
high-speed transmission and requires less storage space. It is used in fiber
channel transmission, SCSI traffic transmission, etc.
In cut−through switching, data transmission starts as soon as the destination
address field arrives at the switching device. Then the device performs a lookup
operation to check whether the destination address is valid or not. If the address
is found valid and the link to the destination is available then the switching
device starts to transmit the packets to the destination without waiting for the
rest of the frame to arrive.
Pros:
- Increases the bandwidth in the network.
- Secure.
- Lower the chances of collisions.
- Can exchange the data simultaneously.
- Transfers the data at different speeds.
- Broadcast the data.
Cons:
- Expensive.
- Potential problems may cause during broadcasting traffic.
- Broadcasting may be troublesome.
- Vulnerable to security attacks.
- Proper design should be implemented.
Quite fast as they do not look at Takes time to examine data packets
the Layer 3 portion of the data before sending them to their
packets. destination
Routing is the process of choosing a path for traffic within a network and
between or across networks. Routing is performed in many networks, including
circuit-switched networks like the public switched telephone network (PSTN) and
computer networks like the Internet. It is a process that uses layer 3 (or
network layer) devices to deliver packets by selecting the best path from one
network to another. The routing algorithm design and maintains the routing table
for the path determination process.
Routing Table:
A routing table determines the path for a given packet with the help of an IP
address of a device and necessary information from the table and sends the
packet to the destination network. The routers have the internal memory that is
known as Random Access Memory (RAM). All the information of the routing table
is stored in RAM of routers.
S.NO Static Routing Dynamic Routing
10. Another name for static Another name for dynamic routing
routing is non-adaptive is adaptive routing.
routing.
Gateway
A gateway is a network node that forms a passage between two networks
operating with different transmission protocols. The most common type of
gateways, the network gateway operates at layer 3, i.e. network layer of the OSI
(open systems interconnection) model. However, depending upon the
functionality, a gateway can operate at any of the seven layers of OSI model. It
acts as the entry – exit point for a network since all traffic that flows across the
networks should pass through the gateway. Only the internal traffic between the
nodes of a LAN does not pass through the gateway.
Types of Gateways:
On basis of direction of data flow, gateways are broadly divided into two
categories:
- Unidirectional Gateways − They allow data to flow in only one direction.
Changes made in the source node are replicated in the destination node,
but not vice versa. They can be used as archiving tools.
- Bidirectional Gateways − They allow data to flow in both directions. They
can be used as synchronization tools.
Firewall
A firewall is a network security device, either hardware or software-based, which
monitors all incoming and outgoing traffic and based on a defined set of security
rules it accepts, rejects or drops that specific traffic. Accept : allow the traffic
Reject : block the traffic but reply with an “unreachable error” Drop : block the
traffic with no reply A firewall establishes a barrier between secured internal
networks and outside untrusted network, such as the Internet.
Modem
The word Modem stands for "Modulator Demodulator." The main task of this
device is to convert analog signals into digital signals. Computer process all data
in the form of 0s and 1s, but while browsing the Internet or transmitting data
from a sender to a receiver, digital data need to be converted into analog data.
The medium carries the signal to the receiver. These modems are connected to
the receiver and sender nodes—the modems at the sender end act as
modulators that convert digital signals into analog signals. The modem at the
receiver ends acts as a demodulator that converts analog signals to digital
signals.
Transmission Media
(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need to
be properly aligned with each other. The distance covered by the signal is
directly proportional to the height of the antenna. Frequency Range:1GHz –
300GHz. These are majorly used for mobile phone communication and television
distribution.
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot
penetrate through obstacles. This prevents interference between systems.
Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless mouse,
keyboard, printer, etc.
Connectors
- RJ45: RJ45 connectors are used for Ethernet networking and are typically
found on the end of Ethernet cables. They are designed to fit into Ethernet
ports on computers, routers, switches, and other networking devices.
- UTP Coupler: UTP couplers are used to connect two unshielded twisted
pair (UTP) Ethernet cables together to create a longer cable. They are
designed to be easy to use and allow for quick and easy connections.
- BNC Connector: BNC connectors are used for coaxial cables and are
commonly found on older networking equipment. They are typically used
in video and audio applications and can also be used for networking.
- F-Type Connectors: F-type connectors are commonly used for cable
television (CATV) and satellite television (SATV) applications. They are
designed to be easy to install and provide a secure connection for coaxial
cables.
- USB Connector: USB connectors are used for connecting peripherals to
computers and other devices. They are typically found on devices such as
printers, scanners, and external hard drives.
- MT-RJ Connectors: MT-RJ connectors are used for fiber optic networking
and provide a small, compact connection for fiber optic cables. They are
commonly used in data centers and other high-speed networking
applications.
- Twisted Pair Connector: Twisted pair connectors are used for connecting
twisted pair cables in Ethernet networking. They are designed to provide a
secure connection and prevent interference from other cables and devices.
They are commonly found on networking equipment such as switches and
routers.
- Coaxial Connector: Coaxial connectors are used for connecting coaxial
cables in networking and communication applications. They are commonly
used in cable television (CATV) and satellite television (SATV) applications,
as well as in networking equipment such as routers and switches.
- Fiber Optic Connector: Fiber optic connectors are used for connecting fiber
optic cables in high-speed networking applications. They provide a secure,
low-loss connection for transmitting data over long distances at high
speeds. There are several types of fiber optic connectors, including the
MT-RJ connector mentioned earlier, as well as the SC connector, LC
connector, and ST connector, among others. Each type of connector has its
own unique features and benefits, depending on the specific networking
application.
UPC vs APC
Ultra Physical Contact (UPC) and Angled Physical Contact (APC) are two types of
fiber optic connector end-face finishes that are commonly used in high-speed
networking applications. The key differences between these two types of
connectors are as follows:
1. End-face geometry: The main difference between UPC and APC connectors
is the geometry of the end-face. UPC connectors have a flat, polished
end-face that is perpendicular to the axis of the fiber. APC connectors, on
the other hand, have an angled end-face that is typically angled at 8
degrees.
2. Return loss: Return loss is a measure of the amount of light reflected back
toward the source after it passes through the connector. APC connectors
have a lower return loss than UPC connectors due to the angled end-face,
which reduces the amount of light reflected back toward the source.
3. Insertion loss: Insertion loss is a measure of the amount of light lost as it
passes through the connector. Both UPC and APC connectors have low
insertion loss, but APC connectors may have slightly higher insertion loss
due to the angled end-face.
4. Compatibility: UPC and APC connectors are not interchangeable, meaning
that a UPC connector cannot be plugged into an APC adapter, and vice
versa. It is important to use the correct type of connector for the specific
networking application to ensure optimal performance.
WIFI
We all know about Wi-Fi, in our mobile, laptop everywhere Wi-Fi is supported.
Wi-Fi is a wireless networking technology, by which we can access networks or
connect with other computers or mobile using a wireless medium. In Wi-Fi, data
are transferred over radio frequencies in a circular range.
It’s a Wireless network which works as a Local Area Network to operate without
using the cable and any types of wiring. It is known as WLAN. The
communication standard is IEEE 802.11. Wi-Fi works using Physical Data Link
Layer.
Nowadays in all mobile computing devices such as laptops, mobile phones, also
digital cameras, smart TVs has the support of Wi-Fi. The Wi-Fi connection is
established from the access point or base station to the client connection or any
client-to-client connection within a specific range, the range depends on the
router which provides the radio frequency through Wi-Fi. These frequencies
operate on 2 types of bandwidth at present, 2.4 GHz and 5 GHz.
Wireless routers are commonly found in homes -- they're the hardware devices
that Internet service providers use to connect you to their cable or xDSL Internet
network. A wireless router, also called a Wi-Fi router, combines the networking
functions of a wireless access point and a router.
Advantages of Wi-Fi
- It is a flexible network connection, no wiring complexities. Can be
accessed from anywhere in the Wi-Fi range.
- It does not require regulatory approval for individual users.
- It is salable, can be expanded by using Wi-Fi Extenders.
- It can be set up in an easy and fast way. Just need to configure the SSID
and Password.
- Security in a high in Wi-Fi network, its uses WPA encryption to encrypt
radio signals.
- It is also lower in cost.
- It also can provide Hotspots.
- it supports roaming also.
Disadvantages of Wi-Fi:
- Power consumption is high while using Wi-Fi in any device which has a
battery, such as mobile, laptops, etc.
- Many times there may be some security problems happening even it has
encryption. Such as many times has known devices become unknown to
the router, Wi-Fi can be hacked also.
- Speed is slower than a direct cable connection.
- It has lower radiation like cell phones, so it can harm humans.
- Wi-Fi signals may be affected by climatic conditions like thunderstorms.
- Unauthorized access to Wi-Fi can happen because it does not have a
firewall.
- To use Wi-Fi we need a router, which needs a power source, so at the time
of power cut, we cannot access the internet.
Bluetooth simply follows the principle of transmitting and receiving data using
radio waves. It can be paired with the other device which has also Bluetooth but
it should be within the estimated communication range to connect. When two
devices start to share data, they form a network called piconet which can further
accommodate more than five devices.
Features:
- Bluetooth Transmission capacity 720 kbps.
- Bluetooth is Wireless.
- Bluetooth is a Low-cost short-distance radio communications standard.
- Bluetooth is robust and flexible.
- Bluetooth is cable replacement technology that can be used to connect
almost any device to any other device.
- The basic architecture unit of Bluetooth is a piconet.
Advantage:
- It is a low-cost and easy-to-use device.
- It can also penetrate through walls.
- It creates an Ad-hoc connection immediately without any wires.
- It is used for voice and data transfer.
Disadvantages:
- It can be hacked and hence, less secure.
- It has a slow data transfer rate: of 3 Mbps.
- It has a small range: 10 meters.
- Bluetooth communication does not support routing.
- The issues of handoffs have not been addressed.
Applications:
- It can be used in laptops, and in wireless PCs, printers.
- It can be used in wireless headsets, wireless PANs, and LANs.
- It can connect a digital camera wirelessly to a mobile phone.
- It can transfer data in terms of videos, songs, photographs, or files from
one cell phone to another cell phone or computer.
- It is used in the sectors of Medical health care, sports and fitness, Military.
1. Radio (RF) layer: It specifies the details of the air interface
2. Baseband Link layer: It performs the connection establishment within a
piconet, addressing, packet format, timing and power control.
3. Link Manager protocol layer: It performs the management of the already
established links which includes authentication and encryption processes.
4. Logical Link Control and Adaption (L2CAP) Protocol layer: It allows the
communication between upper and lower layers of the Bluetooth protocol
stack. It packages the data packets received from upper layers into the
form expected by lower layers. It also performs segmentation and
multiplexing.
5. Service Discovery Protocol (SDP) layer: It allows discovering the services
available on another Bluetooth-enabled device.
6. RF comm layer: It provides a serial interface with WAP and OBEX. It also
provides emulation of serial ports over the logical link control and
adaption protocol(L2CAP). The protocol is based on the ETSI standard TS
07.10.
7. OBEX: It is short for Object Exchange. It is a communication protocol to
exchange objects between 2 devices.
8. WAP: It is short for Wireless Access Protocol. It is used for internet access.
9. TCS: It is short for Telephony Control Protocol. The basic function of this
layer is call control (setup & release) and group management for the
gateway serving multiple devices.
10.Application layer: It enables the user to interact with the application.
WiMax
WiMax stands for Worldwide Inter-operability for Microwave Access. This
technology is based on IEEE 802.16. It is used to provide higher data rates with
increased coverage. It is based on MAN (Metropolitan Area Network) technology.
Its range is upto 50 Km. It may provide speed upto 70 Mbps and it can operate
in Non-Line-of-Sight. This technology is fast, convenient and cost effective.
Architecture:
Physical Layer: This layer specifies frequency band, synchronization between
transmitter and receiver data rate and multiplexing scheme.
MAC Layer: This layer provides and interface between convergence layer and
physical layer. The MAC layer is responsible for transmitting data in frames and
controlling access to shared wireless medium. The MAC protocol defines how and
when a subscriber may initiate a transmission on the channel.
Convergence Layer: This layer provides the information of the external network.
It accepts higher layer protocol data unit (PDU) and converts it to lower layer
PDU. It provides functions depending upon the service being used.
Advantages of WiMAX:
- Wide Coverage Area: WiMAX can cover an area of up to 50 kilometers,
making it suitable for providing broadband access in rural and
underserved areas.
- High Data Rates: WiMAX can provide data rates of up to 75 Mbps, which is
higher than many other wireless technologies.
- Scalability: WiMAX can be easily scaled to support a large number of users
and devices.
- Interoperability: WiMAX is based on an international standard, which
allows for interoperability between different vendors’ equipment.
- Cost-effective: WiMAX is a cost-effective solution for providing broadband
access in areas where it is not economically feasible to deploy wired
infrastructure.
-
Disadvantages of WiMAX:
- Limited Mobility: WiMAX is designed for fixed or nomadic (semi-fixed) use,
not for mobile use.
- Interference: WiMAX operates in the same frequency range as other
wireless technologies, which can lead to interference.
- Security Concerns: WiMAX uses a shared spectrum, which can make it
vulnerable to security threats such as eavesdropping and jamming.
- Limited device availability: WiMAX devices are not as widely available as
devices for other wireless technologies, such as WiFi.
- Limited penetration: WiMAX signals may have trouble penetrating through
walls, buildings and other obstacles.
Applications:
- Broadband Internet Access: WiMAX is used to provide high-speed internet
access in rural and underserved areas where traditional wired broadband
is not available.
- Mobile Broadband: WiMAX is used to provide mobile broadband services,
allowing users to access high-speed internet on the go.
- Public Safety: WiMAX is used to provide wireless connectivity for public
safety networks, allowing emergency responders to communicate and
share information in real-time.
- VoIP (Voice over Internet Protocol) : WiMAX is also used to provide a
wireless link for Voice over IP (VoIP) phone services, allowing users to
make phone calls over the internet.
- Video Surveillance: WiMAX is used to provide wireless connectivity for
video surveillance systems, allowing security personnel to monitor and
record video footage remotely.
Zigbee
ZigBee is a Personal Area Network task group with low rate task group 4. It is a
technology of home networking. ZigBee is a technological standard created for
controlling and sensing the network. As we know that ZigBee is the Personal
Area Network of task group 4 so it is based on IEEE 802.15.4 and is created by
Zigbee Alliance.
Advantages of Zigbee:
- Designed for low power consumption.
- Provides network security and application support services operating on
the top of IEEE.
- Easy implementation
- Adequate security features.
- Low cost: Zigbee chips and modules are relatively inexpensive, which
makes it a cost-effective solution for IoT applications.
- Mesh networking: Zigbee uses a mesh network topology, which allows for
devices to communicate with each other without the need for a central
hub or router. This makes it ideal for use in smart home applications
where devices need to communicate with each other and with a central
control hub.
- Reliability: Zigbee protocol is designed to be highly reliable, with robust
mechanisms in place to ensure that data is delivered reliably even in
adverse conditions.
Disadvantages of Zigbee :
- Limited range: Zigbee has a relatively short range compared to other
wireless communications protocols, which can make it less suitable for
certain types of applications or for use in large buildings.
- Limited data rate: Zigbee is designed for low-data-rate applications, which
can make it less suitable for applications that require high-speed data
transfer.
- Interoperability: Zigbee is not as widely adopted as other IoT protocols,
which can make it difficult to find devices that are compatible with each
other.
- Security: Zigbee’s security features are not as robust as other IoT
protocols, making it more vulnerable to hacking and other security
threats.
Zigbee Applications:
- Home Automation
- Medical Data Collection
- Industrial Control System
- Meter reading system
- Light control system
- Home Networking