0% found this document useful (0 votes)
9 views

Lecture_6

cool

Uploaded by

k3ro.morris
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Lecture_6

cool

Uploaded by

k3ro.morris
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Computer Networks

Lecture (6) Network Devices

Dr. Islam Mohammed Ibrahim

E_mail: [email protected]
Internet Control Message Protocol (ICMP)

 ICMP: It is a management protocol is used to send error and control


messages.

Destination Unreachable
 If a router can’t send an IP datagram to any destination device, it uses ICMP to
send a message back to the sender.

 payload rate :The measure of how much data is actually transmitted


during a given period of time.
Internet Control Message Protocol (ICMP)

 Ping: Packet Internet Groper It uses ICMP echo request and replies
messages to check the physical and logical connectivity of machines over
the network.

 Buffer Full: If a router’s memory buffer is full, it will use ICMP to send out this
message until congestion is decreased.

 IGMP: Internet group management protocol enable a group of networked


devices to share the same IP address and receive the same messages
Internet Protocol (IP)

 IP is a set of rules that defines how computers communicate over a


network.
 IP software performs the routing function.
 IP is unreliable and connectionless datagram protocol.

There are two versions of IP:


 IP version 4 (IPv4)
 IP version 6 (IPv6)
The Network Access Layer

 Ethernet
Fast Ethernet
Token Ring
FDDI
Ethernet

 It is a computer network technology that is widely used by networks like


LAN, MAN, and WAN.
 It is a fast and reliable network solution.
 Ethernet connects computers together with cables so that the computers
can share information.
 Ethernet that can handle a large number of users and less expensive
Fast Ethernet

 It can transfer data at a rate of 100 Mbps.


 It uses a twisted pair and fiber optic cable for communication

There are three types of Fast Ethernet


 100BASE-TX
 100BASE-FX
 100BASE-T4
Token Ring

 All hosts are connected in a ring topology.


 If a host doesn’t have anything to transmit, it passes the token along.
 If it does have something to transmit, it catches the token and attaches
the data and sends it back to ring.
 It transmits a larger frame than Ethernet.
Fiber Distributed Data Interface (FDDI)

 It is based on the token ring protocol

 It transmits data on optical fibers.

 It supports the transmission rate up to 200 Mbps.


Fiber Distributed Data Interface (FDDI)

It uses two rings:

 The first ring is used to carry data at 100 Mbps.

 The second ring is used for backup and recovery in case the first ring fail.

 It also increases the data transmission rate up to 200 Mbps.


Domain Name Service (DNS)

 is an application that maps host names into their corresponding IP


address.
 Mapping hostnames into their corresponding IP address is known as
name resolution
 it is very difficult for users to remember the IP address so, DNS
provides a specific name for every IP address.

 Example If you want to open Google, You directly type www.google.com instead of
given Google’s IP address.
Secure Shell (SSH)

 It is a cryptographic network protocol.

 It performs operations like logging into the system, and moving files
from one system to another

 It uses a secure key for transmitting data securely. Only the sender
and receiver know this key.
 SSH uses TCP port number 22
Reverse Address Resolution Protocol (RARP)

 RARP packet format is the same as the ARP packet.


 Its request consists of a MAC header, an IP header, and the ARP
request message.
 RARP requests are broadcast, and RARP replies are unicast
Networking Devices
Network Adapters
Network Interface Card (NIC)
is used to connect the computer to the network. It has a unique id and it has a
connector to connect the cable to it. The cable acts as an interface between the
computer and the router or modem.
Modem
Modems is also known as modulator/demodulator is a network device
that is used to convert digital signal into analog signal and vice
versa and transmits these signal to a modem at the receiving location.
Dial-up Connection
Hub/Repeater
A hub is a multi-port repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which
connects different stations. Hubs cannot filter data, so data packets are sent
to all connected devices.
Network Devices

Hub
Bridge

Bridge

A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of the source
and destination.
Switch
A switch is a multiport bridge with a buffer and a design that can boost its
efficiency(a large number of ports imply less traffic) and performance. A switch is a
data link layer device.
Switch

Switch
Wireless Access Point
 is a device that allows wireless devices, like smartphones and laptops, to connect
to a wired network.
 It creates a Wi-Fi network that lets wireless devices communicate with the internet.
Access points are used to extend the range of a network
Router

10.0.0.1 11.0.0.1 11.0.0.2 12.0.0.1

A router is a device like a switch that routes data


packets based on their IP addresses. The router is
mainly a Network Layer device

10.0.0.50 12.0.0.60
Firewall
A firewall is a network security device that controls the flow of data between your
computer or network and the internet.

It acts as a barrier, blocking unauthorized access while allowing trusted data to pass
through. Firewalls protect your network from hackers, viruses, and other
online threats by filtering traffic based on security rules.
Thank
You!

You might also like