Computer Network Lec 8
Computer Network Lec 8
Types of Hub
Active Hub:- These are the hubs that have their power supply and can clean,
boost, and relay the signal along with the network. It serves both as a repeater
as well as a wiring center. These are used to extend the maximum distance
between nodes.
Passive Hub:- These are the hubs that collect wiring from nodes and power
supply from the active hub. These hubs relay signals onto the network without
cleaning and boosting them and can’t be used to extend the distance between
nodes.
Intelligent Hub:- It works like an active hub and includes remote management
capabilities. They also provide flexible data rates to network devices. It also
enables an administrator to monitor the traffic passing through the hub and to
configure each port in the hub.
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are
completely unaware of the bridge’s existence i.e. whether or not a bridge is
added or deleted from the network, reconfiguration of the stations is
unnecessary. These bridges make use of two processes i.e. bridge forwarding
and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is performed by
the source station and the frame specifies which route to follow. The host can
discover the frame by sending a special frame called the discovery frame, which
spreads through the entire network using all possible paths to the destination.
Types of Switch
1. Unmanaged switches: These switches have a simple plug-and-play design and
do not offer advanced configuration options. They are suitable for small
networks or for use as an expansion to a larger network.
2. Managed switches: These switches offer advanced configuration options such
as VLANs, QoS, and link aggregation. They are suitable for larger, more
complex networks and allow for centralized management.
3. Smart switches: These switches have features similar to managed switches but
are typically easier to set up and manage. They are suitable for small- to
medium-sized networks.
4. Layer 2 switches: These switches operate at the Data Link layer of the OSI
model and are responsible for forwarding data between devices on the same
network segment.
5. Layer 3 switches: These switches operate at the Network layer of the OSI
model and can route data between different network segments. They are more
advanced than Layer 2 switches and are often used in larger, more complex
networks.
6. PoE switches: These switches have Power over Ethernet capabilities, which
allows them to supply power to network devices over the same cable that
carries data.
7. Gigabit switches: These switches support Gigabit Ethernet speeds, which are
faster than traditional Ethernet speeds.
8. Rack-mounted switches: These switches are designed to be mounted in a server
rack and are suitable for use in data centers or other large networks.
9. Desktop switches: These switches are designed for use on a desktop or in a
small office environment and are typically smaller in size than rack-mounted
switches.
10.Modular switches: These switches have modular design, which allows for easy
expansion or customization. They are suitable for large networks and data
centers.
5. Routers – A router is a device like a switch that routes data packets based on
their IP addresses. The router is mainly a Network Layer device. Routers normally
connect LANs and WANs and have a dynamically updating routing table based on
which they make decisions on routing the data packets. The router divides the
broadcast domains of hosts connected through it.
Error Detection
Data (Implemented either at the Data link layer or Transport Layer of the OSI
Model) may get scrambled by noise or get corrupted whenever a message is
transmitted. To prevent such errors, error-detection codes are added as extra
data to digital messages. This helps in detecting any errors that may have
occurred during message transmission.
Types of Errors
Single-Bit Error
A single-bit error refers to a type of data transmission error that occurs when
one bit (i.e., a single binary digit) of a transmitted data unit is altered during
transmission, resulting in an incorrect or corrupted data unit.
Single-Bit Error
Multiple-Bit Error
A multiple-bit error is an error type that arises when more than one bit in a data
transmission is affected. Although multiple-bit errors are relatively rare when
compared to single-bit errors, they can still occur, particularly in high-noise or
high-interference digital environments.
Multiple-Bit Error
Burst Error
The persistence methods can be applied to help the station take action when the channel
is busy/idle.
1. Carrier Sense Multiple Access with Collision Detection (CSMA/CD):
In this method, a station monitors the medium after it sends a frame to see if the
transmission was successful. If successful, the transmission is finished, if not, the frame
is sent again.
In the diagram, starts sending the first bit of its frame at t1 and since C sees the channel
idle at t2, starts sending its frame at t2. C detects A’s frame at t3 and aborts transmission.
A detects C’s frame at t4 and aborts its transmission. Transmission time for C’s frame is,
therefore, t3-t2 and for A’s frame is t4-t1
So, the frame transmission time (Tfr) should be at least twice the maximum
propagation time (Tp). This can be deduced when the two stations involved in a
collision are a maximum distance apart.
Byte-Stuffing
MAC Addresses are unique 48-bit hardware numbers of a computer that are
embedded into a network card (known as a Network Interface Card ) during
manufacturing. The MAC Address is also known as the Physical Address of a
network device. In the IEEE 802 standard, the data link layer is divided into two
sublayers:
The MAC address is used by the Media Access Control (MAC) sublayer of
the Data-Link Layer. MAC Address is worldwide unique since millions of
network devices exist and we need to uniquely identify each.
Format of MAC Address
To understand what is MAC address is, it is very important that first you
understand the format of the MAC Address. So a MAC Address is a 12-digit
hexadecimal number (6-bit binary number), which is mostly represented by
Colon-Hexadecimal notation.
The First 6 digits (say 00:40:96) of the MAC Address identify the manufacturer,
called the OUI (Organizational Unique Identifier). IEEE Registration Authority
Committee assigns these MAC prefixes to its registered vendors.