Nss 123 Into Networking Device
Nss 123 Into Networking Device
NIC
Hub
Switch
Router
Bridge
Gateway
Modem
Repeater
NIC converts the data packets between two different data transmission technologies. A PC
uses parallel data transmission technology to transmit the data between its internal parts
while the media that provides connectivity between different PCs uses serial data
transmission technology.
A NIC converts parallel data stream into the serial data stream and the serial data stream into
the parallel data stream.
1
Typically all modern PCs have the integrated NICs in the motherboards. If additional NICs
are required, they are also available as add-on devices separately.
For desktop or server system, they are available in the adapter form which can be plugged
into the available slots of the motherboard. For laptop or other small size devices, they are
available in the PCMCIA (Personal Computer Memory Card International Association) card
form which can be inserted into the PCMCIA slot.
TYPES OF NICS
There are two types of NICs.
MEDIA SPECIFIC: - LAN card are used according to the media type. Different types of
the NICs are used to connect the different types of media. To connect a specific media type,
we must have to use a NIC which is particularly made for that type of media.
NETWORK DESIGN SPECIFIC: - A specific network design needs a specific LAN card.
For example FDDI, Token Ring and Ethernet have their own distinctive type of NIC cards.
They cannot use other types of NIC cards.
2
2. HUB
A hub is basically a multiport repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different
stations. Hubs cannot filter data, so data packets are sent to all connected devices. In other
words, collision domain of all hosts connected through Hub remains one. Also, they do not
have intelligence to find out best path for data packets which leads to inefficiencies and
wastage. Hubs operate at the Physical layer of the Open Systems Interconnection (OSI)
model
HUB
TYPES OF HUB
ACTIVE HUB: - These are the hubs which have their own power supply and can clean,
boost and relay the signal along with the network. It serves both as a repeater as well as
wiring centre. These are used to extend the maximum distance between nodes.
PASSIVE HUB: - These are the hubs which collect wiring from nodes and power supply
from active hub. These hubs relay signals onto the network without cleaning and boosting
them and can’t be used to extend the distance between nodes.
3
FEATURES OF HUB
Here are important features of Hub:
APPLICATION OF HUBS
The important applications of networking hub are given below:
ADVANTAGES OF HUB
4
DISADVANTAGES OF HUB
3. SWITCH
A switch is a multiport bridge with a buffer and a design that can boost its efficiency (a
large number of ports imply less traffic) and performance. A switch is a data link layer or the
Network layer of the OSI model. The switch can perform error checking before forwarding
data, which makes it very efficient as it does not forward packets that have errors and
forward good packets selectively to correct port only. In other words, switch divides
collision domain of hosts, but broadcast domain remains same.
SWITCH
TYPE OF SWITCH
5
UNMANAGEABLE SWITCHES: On an Unmanageable switch, configuration can't be
made. It is not possible to assign IP address as there is no console port.
FEATURES OF SWITCH
APPLICATIONS OF SWITCHES
A switch helps you to manage the flow of data across the network.
Medium to large-sized LANs containing a number of linked managed switches.
Switches are widely used in SOHO(Small Office/Home Office) applications. SOHO
mostly uses a single switch to access the various broadband services.
It is used in a computer network to connect the devices together physically.
A switch can transfer data to any of the other devices, either using half-duplex mode
or full-duplex mode.
ADVANTAGES OF SWITCH
6
DIFFERENCE BETWEEN SWITCH AND HUB
Hub Switch
A hub operates on the physical layer. A switch operates on the data link layer.
Hubs perform frame flooding that can be It performs broadcast, then the unicast and
unicast, multicast, or broadcast. multicast as needed.
Just a singular domain of collision is present in Varied ports have separate collision domains.
a hub.
A hub operates as a Layer 1 devices per the Network switches help you to operate at Layer
OSI model. 2 of the OSI model.
To connect a network of personal computers Allow connecting multiple devices and ports.
should be joined through a central hub.
Collisions occur mostly in setups using hubs. No collisions occur in a full-duplex switch.
A network hub can't store MAC addresses. Switches use CAM (Content Accessible
Memory) that can be accessed by ASIC
(Application Specific Integrated Chips).
7
Does not use software Has software for administration
4. REPEATER
A repeater operates at the physical layer. Its job is to regenerate the signal over the same
network before the signal becomes too weak or corrupted so as to extend the length to which
the signal can be transmitted over the same network. An important point to be noted about
repeaters is that they do not amplify the signal. When the signal becomes weak, they copy
the signal bit by bit and regenerate it at the original strength. It is a 2 port device.
5. BRIDGE
A bridge is a repeater; with add on the functionality of filtering content by reading the MAC
addresses of source and destination. It is also used for interconnecting two LANs working on
the same protocol. It has a single input and single output port, thus making it a 2 port device.
Bridge is used to divide a large network into smaller segments. Basic functions of the Bridge
are the following: -
8
A Bridge can connect two different types of media or network architecture, but it cannot
connect two different types of network layer protocol such as TCP/IP or IPX. Bridge
requires the same network layer protocol in all segments.
LOCAL BRIDGE: - This Bridge connects two LAN segments directly. In Ethernet
Implementation, it is known as the Transparent Bridge. In Token Ring network, it is called
the Source-Routed Bridg
REMOTE BRIDGE: - This Bridge connects with another Bridge over the WAN link.
WIRELESS BRIDGE: - This Bridge connects with another Bridge without using wires. It
uses radio signals for the connectivity.
9
In OSI Layers /TCP-IP networking models, the functionalities of the Bridges are defined in
the physical layer and data link layer.
Just like Hubs, Bridge no longer used in the computer network. Bridges have been replaced
by the Switches.
6. ROUTERS
A router is a device like a switch that routes data packets based on their IP addresses. Router
is mainly a Network Layer device. Routers normally connect LANs and WANs together and
have a dynamically updating routing table based on which decisions on routing the data
packets. Router divide broadcast domains of hosts connected through it.
10
DRAWBACKS OR DISADVANTAGES OF ROUTERS
11
POINTS OF ROUTERS SWITCHES
DIFFERENCE
Mode of transmission of It Transmits data in the form of It Transmits data in the form of
data packets. frames.
Address used for the It makes use of IP address for It makes use of MAC address
purpose of data the purpose of data for the purpose of data
transmission. transmission. transmission.
Layer of OSI Model It makes use of layer 3 of OSI It makes use of layer 2 of OSI
model. Layer 3 is the network model. Layer 2 is the Data Link
layer. Layer.
Broadcast domain Routers break the broadcast Switches allow the broadcast
domain and it does not domain and contain per port
propagate broadcast domain. collision domain.
Used for It is used for both WAN/LAN It is only used for the LAN
networks. networks.
12
Mode of Transmission By default, Router is in full Switches are used in half as well
duplex mode. However, we can as full duplex mode. However,
change them manually into we can also make them in auto-
half-duplex. negotiation.
7. GATEWAY
A gateway, as the name suggests, is a passage to connect two networks together that may
work upon different networking models. Gateways normally work at the Transport and
Session layers of the OSI model, Gateways provide translation between networking
technologies such as Open System Interconnection (OSI) and Transmission Control
Protocol/Internet Protocol (TCP/IP). Because of this, gateways connect two or more
autonomous networks, each with its own routing algorithms, protocols, topology, domain
name service, and network administration procedures and policies. They basically work as
the messenger agents that take data from one system, interpret it, and transfer it to another
system. Gateways are also called protocol converters and are generally more complex than
switch or router.
13
EXAMPLES OF THE GATEWAY
GSNW GATEWAY: - Allows Windows clients to access resources from the NetWare
server.
PAD GATEWAY: - Provides connectivity between LAN network and X.25 network.
8. MODEM
14
WHAT IS OSI MODEL?
The International Standards Organization (ISO) developed the Open Systems Interconnect
(OSI) model in 1981. It consists of seven functional layers that provide the basis for
communication among computers over networks, as described in the table below. You can
easily remember them using the mnemonic phrase ―All people seem to need data
processing.‖ Understanding this model will help you build a strong network, troubleshoot
problems, develop effective applications and evaluate third-party products.
Layer 7: Provides services such as e-mail, HTTP, FTP, TFTP, DNS, SMTP,
Application file transfers and file servers SFTP, SNMP, RLogin, BootP,
MIME
15
LAYER FUNCTION PROTOCOLS OR
STANDARDS
Layer 2: Data Provides error checking and Ethernet, Token Ring, 802.11
link transfer of message frames
A layer should only be created where the definite levels of abstraction are needed.
The function of each layer should be selected as per the internationally standardized
protocols.
The number of layers should be large so that separate functions should not be put in
the same layer. At the same time, it should be small enough so that architecture doesn't
become very complicated.
In the OSI model, each layer relies on the next lower layer to perform primitive
functions. Every level should able to provide services to the next higher layer.
Changes made in one layer should not need changes in other lavers.
16
HISTORY OF OSI MODEL
In the late 1970s, the ISO conducted a program to develop general standards and methods of
networking.
In 1973, an Experimental Packet Switched System in the UK identified the requirement for
defining the higher-level protocols.
In the year 1983, OSI model was initially intended to be a detailed specification of actual
interfaces.
In 1984, the OSI architecture was formally adopted by ISO as an international standard
THE UPPER LAYERS: It deals with application issues and mostly implemented only in
software. The highest is closest to the end system user. In this layer, communication from
one end-user to another begins by using the interaction between the application layers. It will
process all the way to end-user.
THE LOWER LAYERS: These layers handle activities related to data transport. The
physical layer and data link layers also implemented in software and hardware.
Upper and lower layers further divide network architecture into seven different layers as
below:-
Application
Presentation
Session
Transport
Network
Data-link
Physical layers
17
NETWORK LAYERS DIAGRAM
1. PHYSICAL LAYER
The physical layer helps you to define the electrical and physical specifications of the data
connection. This level establishes the relationship between a device and a physical
transmission medium. The physical layer is not concerned with protocols or other such
higher-layer items.
Examples of hardware in the physical layer are network adapters, ethernet, repeaters,
networking hubs, etc.
Data link layer corrects errors which can occur at the physical layer. The layer allows you to
define the protocol to establish and terminates a connection between two connected network
devices.
It is IP address understandable layer, which helps you to define logical addressing so that any
endpoint should be identified.
The layer also helps you implement routing of packets through a network. It helps you to
define the best path, which allows you to take data from the source to the destination.
18
The data link layer is subdivided into two types of sub layers:
LOGICAL LINK CONTROL LAYER- This layer is responsible for identity and
encapsulating network-layer protocols and allows you to find the error.
Framing which divides the data from Network layer into frames.
Allows you to add header to the frame to define the physical address of the source and
the destination machine
Adds Logical addresses of the sender and receivers
It is also responsible for the sourcing process to the destination process delivery of the
entire message.
It also offers a system for error control in which it detects retransmits damage or lost
frames.
Data link layer also provides a mechanism to transmit data over independent networks
which are linked together.
3. TRANSPORT LAYER
The transport layer builds on the network layer to provide data transport from a process on a
source machine to a process on a destination machine. It is hosted using single or multiple
networks, and also maintains the quality of service functions.
It determines how much data should be sent where and at what rate. This layer builds on the
messages which are received from the application layer. It helps ensure that data units are
delivered error-free and in sequence.
Transport layer helps you to control the reliability of a link through flow control, error
control, and segmentation or desegmentation.
The transport layer also offers an acknowledgment of the successful data transmission and
sends the next data in case no errors occurred. TCP is the best-known example of the
transport layer.
It divides the message received from the session layer into segments and numbers
them to make a sequence.
Transport layer makes sure that the message is delivered to the correct process on the
destination machine.
19
It also makes sure that the entire message arrives without any error else it should be
retransmitted.
4. NETWORK LAYER
The network layer provides the functional and procedural means of transferring variable
length data sequences from one node to another connected in "different networks".
Message delivery at the network layer does not give any guaranteed to be reliable network
layer protocol.
a. Routing protocols
b. Multicast group management
c. Network-layer addresses assignment.
5. SESSION LAYER
Session Layer controls the dialogues between computers. It helps you to establish starting
and terminating the connections between the local and remote application.
This layer request for a logical connection which should be established on end user's
requirement. This layer handles all the important log-on or password validation.
Session layer offers services like dialog discipline, which can be duplex or half-duplex. It is
mostly implemented in application environments that use remote procedure calls.
6. PRESENTATION LAYER
Presentation layer allows you to define the form in which the data is to exchange between the
two communicating entities. It also helps you to handles data compression and data
encryption.
20
This layer transforms data into the form which is accepted by the application. It also formats
and encrypts data which should be sent across all the networks. This layer is also known as
a SYNTAX LAYER.
APPLICATION LAYER
Application layer interacts with an application program, which is the highest level of OSI
model. The application layer is the OSI layer, which is closest to the end-user. It means OSI
application layer allows users to interact with other software application.
Example of the application layer is an application such as file transfer, email, remote login,
etc.
Every layer within an OSI model communicates with the other two layers which are below it
and its peer layer in some another networked computing system.
21
In the below-given diagram, you can see that the data link layer of the first system
communicates with two layers, the network layer and the physical layer of the system. It also
helps you to communicate with the data link layer of, the second system.
22
Layer 4 Transport TCP, UDP
Layer 2 Data Link RAPA, PPP, Frame Relay, ATM, Fiber Cable, etc.
OSI model provides a clear distinction TCP/IP doesn't offer any clear distinguishing
between interfaces, services, and protocols. points between services, interfaces, and
protocols.
OSI uses the network layer to define routing TCP/IP uses only the Internet layer.
standards and protocols.
OSI model use two separate layers physical TCP/IP uses only one layer (link).
and data link to define the functionality of the
bottom layers
OSI model, the transport layer is only A layer of the TCP/IP model is both
connection-oriented. connection-oriented and connectionless.
In OSI model, data link layer and physical are In TCP data link layer and physical layer are
separate layers. combined as a single host-to-network layer.
The minimum size of the OSI header is 5 Minimum header size is 20 bytes.
bytes.
23
ADVANTAGES OF THE OSI MODEL
Here are major benefits/pros of using the OSI model:
24
SUMMARY
The OSI Model is a logical and conceptual model that defines network communication
which is used by systems open to interconnection and communication with other systems
In OSI model, layer should only be created where the definite levels of abstraction are
needed.
In 1984, the OSI architecture was formally adopted by ISO as an international standard.
25