4.0 Repeaters, Bridges, Routers, and Gateways: A Comparative Study: 4.1 Repeaters
4.0 Repeaters, Bridges, Routers, and Gateways: A Comparative Study: 4.1 Repeaters
4.1 Repeaters:
As signals travel along a network cable (or any other medium of transmission), they degrade and
become distorted in a process that is called attenuation. If a cable is long enough, the attenuation
will finally make a signal unrecognizable by the receiver.
A Repeater enables signals to travel longer distances over a network. Repeaters work at the
OSI's Physical layer. A repeater regenerates the received signals and then retransmits the
regenerated (or conditioned) signals on other segments.
To pass data through the repeater in a usable fashion from one segment to the next, the packets
and the Logical Link Control (LLC) protocols must be the same on the each segment. This means
that a repeater will not enable communication, for example, between an 802.3 segment
(Ethernet) and an 802.5 segment (Token Ring). That is, they cannot translate an Ethernet packet
into a Token Ring packet. In other words, repeaters do not translate anything.
4.2 Bridges:
Like a repeater, a bridge can join segments or workgroup LANs. However, a bridge can also
divide a network to isolate traffic or problems. For example, if the volume of traffic from one or two
computers or a single department is flooding the network with data and slowing down entire
operation, a bridge can isolate those computers or that department.
In the following figure, a bridge is used to connect two segment segment 1 and segment 2.
Bridges can be used to:
Bridges work at the Data Link Layer of the OSI model. Because they work at this layer, all
information contained in the higher levels of the OSI model is unavailable to them. Therefore,
they do not distinguish between one protocol and another.
Bridges simply pass all protocols along the network. Because all protocols pass across the
bridges, it is up to the individual computers to determine which protocols they can recognize.
A bridge works on the principle that each network node has its own address. A bridge forwards
the packets based on the address of the particular destination node.
As traffic passes through the bridge, information about the computer addresses is then stored in
the bridge's RAM. The bridge will then use this RAM to build a routing table based on source
addresses.
4.3 Routers:
Routers work at the Network layer of the OSI model meaning that the Routers can switc h and
route packets across multiple networks. They do this by exchanging protocol-specific information
between separate networks. Routers have access to more information in packets than bridges,
and use this information to improve packet deliveries. Routers are usually used in a complex
network situation because they provide better traffic management than bridges and do not pass
broadcast traffic.
Routers can share status and routing information with one another and use this information to
bypass slow or malfunctioning connections.
Routers do not look at the destination node address; they only look at the network address.
Routers will only pass the information if the network address is known. This ability to control the
data passing through the router reduces the amount of traffic between networks and allows
routers to use these links more efficiently than
bridges
4.4 Gateways:
Gateways make communication possible between different architectures and environments. They
repackage and convert data going from one environment to another so that each environment
can understand the other's environment data.
• Communication protocols
• Data formatting structures
• Languages
• Architecture
For example, electronic mail gateways, such as X.400 gateway, receive messages in one format,
and then translate it, and forward in X.400 format used by the receiver, and vice versa.
To process the data, the gateway:
· Decapsulates incoming data through the networks complete protocol stack. Encapsulates the
outgoing data in the complete protocol stack of the other network to allow transmission.
A NIC or Network Interface Card is a circuit board or chip, which allows the computer to
communicate to other computers on a Network. This board when connected to a cable or other
method of transferring data such as infrared can share resources, information and computer
hardware. Local or Wide area networks are generally used for large businesses as well as are
beginning to be found in homes as home users begin to have more then one computer. Utilizing
network cards to connect to a network allow users to share data such as companies being able to
have the capability of having a database that can be accessed all at the same time send and
receive e-mail internally within the company or share hardware devices such as printers.
4.6 Connectors:
Network cards have three main types of connectors. Below is an example of what a network card
may look like.
4.6.1 BNC connector: As illustrated in the above picture the BNC connector is a round connector,
which is used for thin net or 10Base-2 Local Area Network.
4.6.2 DB9 (RJ45 JACK): The DB9 connector not to be confused with the Serial Port or
sometimes referred to as the RJ45 JACK not to be confused with the RJ45 connection is used
with Token Ring networks.
4.6.3 DB15 Connector: The DB15 connector is used for a Thick net or 10Base-5 Local area
network.
4.6.4 RJ45 connector: Today one of the most popular types of connections used with computer
networks. RJ45 looks similar to a phone connector or RJ11 connector however is slightly larger.
LED -The LED's as shown in the above illustration indicates if it detects a network generally by a
green light which may flash as it communicates and then a red light which indicates collisions
which will generally flash or not flash at all.
4.7 Cables
The following is a few examples of some of the more commonly used types of cables found with
networks.
As illustrated in the above picture you can see three of the main types of cable used today. The
first two pictures illustrate Unshielded and Shielded twisted pair cables. Unshielded twisted-pair
cable is generally found in phone cables today and are used more often then shielded twisted
pair today as it has been found that simply twisting the cable provides more efficient means of
protection against interference. In addition shielded twisted-pair cable required the one end of the
cable to be grounded. If both ends were to be grounded however this would cause a grounding
loop causing low voltage and infinite amperage and various other hazards to the network.
The third picture in the above illustration shows a coaxial cable, which are the most commonly
used and known types of cables. This cable can be found for cable TV and when used with
networks utilize the BNC connector.
As illustrated in the above picture you can see three of the main types of cable used today. The
first two pictures illustrate Unshielded and Shielded twisted pair cables. Unshielded twisted-pair
cable is generally found in phone cables today and are used more often then shielded twisted
pair today as it has been found that simply twisting the cable provides more efficient means of
protection against interference. In addition shielded twisted-pair cable required the one end of the
cable to be grounded. If both ends were to be grounded however this would cause a grounding
loop causing low voltage and infinite amperage and various other hazards to the network.
The third picture in the above illustration shows a coaxial cable, which are the most commonly
used and known types of cables. This cable can be found for cable TV and when used with
networks utilize the BNC connector.