Unit II Network Hardware - 1
Unit II Network Hardware - 1
1|Page
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
2|Page
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
• Only that node is affected which has failed, rest of the nodes can work smoothly.
Disadvantage
• Cost of installation is high.
• Expensive to use.
• If the hub fails then the whole network is stopped because all the nodes depend on the
hub.
• Performance is based on the hub that is it depends on its capacity
Tree Topology
• Tree topology has a group of star networks connected to a linear bus backbone cable.
• It incorporates features of both star and bus topologies.
• Tree topology is also called hierarchical topology.
Advantage
• Ideal if workstations are located in groups.
• Used in Wide Area Network.
• Existing network can be easily expanded
• Point-to-point wiring for individual segments means
easier installation and maintenance
• Well suited for temporary networks
Disadvantage
• Technical expertise required to configure and wire tree topology
• Failure of backbone cable brings down entire network
• Insecure network
• Maintenance difficult for large networks
MESH TOPOLOGY
• In a mesh topology, every node can be connected to all other nodes in a network and
also provide the dedicated links between every nodes with each other.
• In a mesh network topology, each of the network node, computer and other devices,
are interconnected with one another. In fact a true mesh topology is the one where
every node is connected to every other node in the network.
Advantage
• Each connection can carry its own data load.
• It is robust.
• Fault is diagnosed easily.
• Provides security and privacy.
Disadvantage
• Installation and configuration is difficult.
• Cabling cost is more.
• Bulk wiring is required.
HYBRID Topology
• It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star
topology is used, connecting these topologies will result in Hybrid Topology (ring
topology and star topology).
3|Page
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
Advantage
• Reliable as Error detecting and trouble shooting is easy.
• Effective.
• Scalable as size can be increased easily.
• Flexible.
Disadvantage
• Complex in design.
• Costly.
2.2 Network control devices
• To expand a single network without breaking it into new pass or connecting it through
another different network. All networks require devices to provide connectivity and
functionality.
• Purpose of Using Network Devices.
• Allow a greater number of nodes to be connected to the network.
• Extend the distance over which a network can extend.
• Localize traffic on the network.
• Can merge existing networks.
• Isolate network problems so that they can be diagnosed more easily.
Devices and the layers at which they operate
4|Page
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
• NIC is both a physical layer and a data link layer device, i.e. it provides the necessary
hardware circuitry so that the physical layer processes and some data link layer
processes can run on it.
Types of NIC Cards
• Internal NIC
• External NIC
Internal Network Cards
• In internal networks cards, motherboard has a slot for the network card where it can
be inserted.
• It requires network cables to provide network access. Internal network cards are of
two types.
• The first type uses Peripheral Component Interconnect (PCI) connection, while the
second type uses Industry Standard Architecture (ISA).
External Network Cards
• In desktops and laptops that do not have an internal NIC, external NICs are used.
• External network cards are of two types: Wireless and USB based.
• Wireless network card needs to be inserted into the motherboard, however no
network cable is required to connect to the network.
• They are useful while traveling or accessing a wireless signal.
Connectors
• To connect cable between two computers.
• Connectors are of different type such as –
➢ Twisted Pair cable
➢ Co-axial Cable
➢ Fibre optic cable.
• Connectors are type such as-
➢ Jacks
➢ Plugs
➢ Sockets and ports
BNC Connector
• (Bayonet Nut Coupling) A commonly used plug and socket for audio, video and
networking applications that provides a tight connection.
• This connector has a center pin connected to the center cable conductor and a metal
tube connected to the outer cable shield.
• A rotating ring outside the tube locks the cable to any female connector.
• BNCs are used to connect a variety of different coaxial cable types.
• After the plug is inserted, it is turned, causing pins in the socket to be pinched into a
locking groove on the plug.
F-Type
5|Page
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
•
The F connector is a type of RF connector commonly used for cable and universally for
satellite television.
Repeaters
• A repeater or regenerator is an electronic device that operates on only the physical
layer of the OSI MODEL.
• Signal that carry information within a network can travel a fix distance before
attenuation(weakning) enlarges the integrity of data.
• It is installed on a link receives the signal before it becomes too weak, and put the
refresh copy back on the link.
• It allows us extending only the physical length of a network.
6|Page
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
7|Page
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
Passive HUB
• A passive hub simply combines the signal of n/w segment.
• There is no signal processing or regeneration because it does not boost the signal and
in fact absorbs some of the signal.
• A passive hub reduces by half the maximum, cabling distance permitted.
• E.g. If a segment normally allows a reliable transmission distance of 100 meters, the
distance between a passive hub and a device can be only 50m also with a passive HUB
each pc can receive the signal send from all the other pc’s connected to the hub.
Active HUB
• These are like passive hub except that they have electronic component that regenerate
or amplify signal.
• Because of this the distance between devices can be increased.
• The main drawback to some active hub, i.e. they amplify noise as well as signal
depending on whether they function as simple amplifies or an as signal regenerator.
• They are also much more expensive than passive hubs function as repeaters (Create a
duplicate copy of signal).
• They are sometimes called multi- port repeaters.
Intelligent HUB
• In addition to signal regenerations these hubs perform some n/w management and
intelligent path selection.
• A switching HUB chooses only the port of the device where the signal leads to go
rather than sending the signal along all paths.
• Many switching hubs can choose which alternative path with be weakest and send the
signal that way.
• One disadvantage to this is that you can permanently connect all transmission media
segments because each segment will be used only when a signal is send to device using
that segment.
•
Bridges
• A bridge is used to join two network segments together, it allows computers on either
segment to access resources on the other.
• They can also be used to divide large networks into smaller segments.
8|Page
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
• Bridges have all the features of repeaters, but can have more nodes, and since the
network is divided, there is fewer computers competing for resources on each segment
thus improving network performance.
• Bridges can also connect networks that run at different speeds, different topologies, or
different protocols.
• But they cannot, join an Ethernet segment with a Token Ring segment, because these
use different networking standards.
• Bridges operate at both the Physical Layer and the MAC sub layer of the Data Link
layer.
• Bridges read the MAC header of each frame to determine on which side of the bridge
the destination device is located, the bridge then repeats the transmission to the
segment where the device is located.
• Unlike the repeaters which simply passes on all the signals it receives a bridges
selectively determines the appropriate segment to which it should pass a signal.
• It does this by reading the address of the entire signal it receives.
• The bridges read the physical location of the source and destination computers from
the addresses and store it to a table.
Transparent bridges
• Keeps a table of addresses in memory to determination where to send the data.
• Also called learning bridges
• Build a table of MAC addresses as frames arrive.
• Ethernet networks use transparent bridge
• Duties are : Filtering frames, forwarding and blocking
Source routing bridge
• Requires the entire rule to be included in the transmission and don’t rout packets
intelligently.
• IBM token ring n/w uses this type of bridges.
• If a segment on n/w is been used only 60% then consider, using bridges will improve
performance.
• Used in Token Ring networks
• Frame contains not only the source and destination address but also the
• bridge addresses.
Reasons to go for bridges
• To divide the big n/w like university.
• Organization may geographically spread over multiple buildings.
• To split an n/w logical.
• Single LAN is adequate (sufficient but physical distance is too great).
• For reliability bridges can be placed at critical nodes. To prevent a single node go out of
order from bringing down the entire system. (E.g. bus topology)
• For security insert bridges at various places and being careful not to forward sensitive
traffic.
Advantages of using a bridge
• Extend physical network
• Reduce network traffic with minor segmentation
• Reduce collisions
• Connect different architecture
Disadvantages of using bridges
• Slower than repeaters due to filtering
• Do not filter broadcasts
• More expensive than repeaters
Switch
• On the surface, a switch looks much like a hub.
• Despite their similar appearance, switches are far more efficient than hubs and are far
more desirable for today’s network environments.
• Following Figure shows an example of a 32-port Ethernet switch.
• If you refer to it you’ll notice few differences in the appearance of the high-density hub
and this switch.
10 | P a g e
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
• This arrangement is inefficient; however, it requires little intelligence on the part of the
hub, which is why hubs are inexpensive.
• Rather than forwarding data to all the connected ports, a switch forwards data only to
the port on which the destination system is connected.
• It looks at the Media Access Control (MAC) addresses of the devices connected to it to
determine the correct port.
• A MAC address is a unique
number that is stamped into
every NIC.
• By forwarding data only to
the system to which the data is
addressed, the switch
decreases the amount of traffic
on each network link
dramatically.
• In effect, the switch literally channels (or switches, if you prefer) data between the
ports.
Router
• Routers are an increasingly common sight
in any network environment, from a small home
office that uses one to connect to an Internet
service provider (ISP) to a corporate IT
environment where racks of routers manage data
communication with disparate remote sites.
• Routers are network devices that literally
route data around the network. By examining data
as it arrives, the router can determine the
destination address for the data; then, by using
tables of defined routes, the router determines the
best way for the data to continue its journey.
• Unlike bridges and switches, which use the
hardware-configured MAC address to determine
the destination of the data, routers use the
software-configured network address to make
decisions.
• This approach makes routers more functional than bridges or switches, and it also
makes them more complex because they have to work harder to determine the
information.
Working of Router
• The basic requirement for a router is that it must have at least two network interfaces.
• If they are LAN interfaces, the router can manage and route the information between
two LAN segments.
• More commonly, a router is used to provide connectivity across wide area network
(WAN) links.
11 | P a g e
Dayanand Science College, Latur. Department of Computer Science
Computer Network Notes Unit II
• Figure shows a router with two LAN ports (marked AUI 0 and AUI 1) and two WAN
ports (marked Serial 0 and Serial 1).
• This router is capable of routing data between two LAN segments and two WAN
segments.
Gateway
• The term gateway is applied to any device, system, or software application that can
perform the function of translating data from one format to another.
• The key feature of a gateway is that it converts the format of the data, not the data
itself.
• Software gateways can be found everywhere.
• Many companies use an email system such as Microsoft Exchange or Novell
GroupWise.
• These systems transmit mail internally in a certain format. When email needs to be
sent across the Internet to users using a different email system, the email must be
converted to another format, usually to Simple Mail Transfer Protocol (SMTP).
• This conversion process is performed by a software gateway.
Modem
• Modem is a contraction of the terms modulator and demodulator.
• Modems perform a simple function: They translate digital signals from a computer
into analog signals that can travel across conventional phone lines.
• The modem modulates the signal at the sending end and demodulates at the receiving
end.
• Modems are available as internal devices that plug into expansion slots in a system;
external devices that plug into serial or USB ports; PCMCIA cards designed for use in
laptops; and specialized devices designed for use in systems such as handheld
computers.
• In addition, many laptops now come with integrated modems. For large-scale modem
implementations, such as at an ISP, rack-mounted modems are also available
12 | P a g e