Unit-3 and 4 PC and Network
Unit-3 and 4 PC and Network
A computer network can be categorized by their size. A computer network is mainly of four
types:
Wireless Personal Area Network: Wireless Personal Area Network is developed by simply
using wireless technologies such as WiFi, Bluetooth. It is a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
In networking, there are various hardware and software components that work together to
facilitate communication and data transfer between devices. Here are some key components:
Hardware Components:
1. Network Interface Card (NIC): It is a hardware component that allows a device to connect to
a network. It provides the physical interface between the device and the network medium (e.g.,
Ethernet cable or wireless signal).
2. Switches: Switches are devices that enable the connection of multiple devices within a local
area network (LAN). They receive data packets and forward them to the appropriate
destination device based on MAC addresses.
3. Routers: Routers are devices responsible for connecting multiple networks together, such as
LANs and the Internet. They use IP addresses to direct network traffic between different
networks and determine the optimal path for data transmission.
Software Components:
1. Network Operating System (NOS): NOS is the software that manages and controls network
operations. It provides features like network protocols, security mechanisms, and device
management capabilities.
2. Network Protocols: Protocols define the rules and conventions for communication between
devices on a network. Examples include Internet Protocol (IP), Transmission Control Protocol
(TCP), and User Datagram Protocol (UDP).
3. Network Management Software: This software is used to monitor and manage network
devices, troubleshoot network issues, and perform tasks such as configuration, performance
optimization, and security management.
4. Network Services: Network services are software applications that provide specific
functionality within a network, such as Domain Name System (DNS) for name resolution,
Dynamic Host Configuration Protocol (DHCP) for IP address assignment, and File Transfer
Protocol (FTP) for file sharing.
5. Virtual Private Network (VPN) Software: VPN software enables secure remote access to a
private network over a public network infrastructure, such as the Internet. It encrypts data
traffic to ensure privacy and confidentiality.
There are various network communication standards used in networking, depending on the
type of network and the protocols being used. Some of the common standards are:
Bluetooth:
Bluetooth Transmission capacity 720 kbps.
Bluetooth is Wireless.
Bluetooth is a Low-cost short-distance radio communications standard.
Bluetooth is robust and flexible.
Bluetooth is cable replacement technology that can be used to connect almost any device
to any other device.
The basic architecture unit of Bluetooth is a piconet.
Bluetooth Architecture:
Piconet is a type of Bluetooth network that contains one primary node called the
master node and seven active secondary nodes called slave nodes.
Thus, we can say that there is a total of 8 active nodes which are present at a distance
of 10 meters.
The communication between the primary and secondary nodes can be one-to-one or
one-to-many. Possible communication is only between the master and slave; Slave-
slave communication is not possible.
It also has 255 parked nodes, these are secondary nodes and cannot take participation
in communication unless it gets converted to the active state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act
as master or we can say primary in another piconet.
This kind of node can receive a message from a master in one piconet and deliver the
message to its slave in the other piconet where it is acting as a master.
This type of node is referred to as a bridge node. A station cannot be mastered in two
piconets.
Wi-Fi:
WiFi is a universal wireless networking technology that utilizes radio frequencies to
transfer data. WiFi allows high-speed Internet connections without the use of cables.
The term WiFi is a contraction of "wireless fidelity" and commonly used to refer to
wireless networking technology.
The WiFi Alliance claims rights in its uses as a certification mark for equipment
certified to 802.11x standards.
WiFi is a freedom – freedom from wires. It allows you to connect to the Internet from
just about anywhere — a coffee shop, a hotel room, or a conference room at work.
OSI model
ISO stands for International organization of Standardization. This is called a model
for Open System Interconnection (OSI) and is commonly known as OSI model.
The ISO-OSI model is a seven layer architecture. It defines seven layers or levels in a
complete communication system. They are:
1. Data link layer synchronizes the information which is to be transmitted over the physical
layer.
2. The main function of this layer is to make sure data transfer is error free from one node
to another, over the physical layer.
3. Transmitting and receiving data frames sequentially is managed by this layer.
4. This layer sends and expects acknowledgements for frames received and sent
respectively. Resending of non-acknowledgement received frames is also handled by
this layer.
5. This layer establishes a logical layer between two nodes and also manages the Frame
traffic control over the network. It signals the transmitting node to stop, when the frame
buffers are full.
1. Network Layer routes the signal through different channels from one node to other.
2. It acts as a network controller. It manages the Subnet traffic.
3. It decides by which route data should take.
4. It divides the outgoing messages into packets and assembles the incoming packets into
messages for higher levels.
1. Transport Layer decides if data transmission should be on parallel path or single path.
2. Functions such as Multiplexing, Segmenting or Splitting on the data are done by this
layer
3. It receives messages from the Session layer above it, convert the message into smaller
units and passes it on to the Network layer.
4. Transport layer can be very complex, depending upon the network requirements.
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
1. Session Layer manages and synchronize the conversation between two different
applications.
2. Transfer of data from source to destination session layer streams of data are marked and
are resynchronized properly, so that the ends of the messages are not cut prematurely
and data loss is avoided.
1. OSI model distinguishes well between the services, interfaces and protocols.
2. Protocols of OSI model are very well hidden.
3. Protocols can be replaced by new protocols as technology changes.
4. Supports connection oriented services as well as connectionless service.
The TCP/IP model also has a layered architecture which allows easy data
communication along with the facility of integrating multiple protocols. The layout
remains similar to OSI Model but the number of layer, their functionalities and
properties got changed.
This Internet Model(TCP/IP) comprises of only four layers as compared to seven layers
of OSI Model. These four layers are generated by combining the layers of OSI model
internally so that protocols can be implemented. These layers have fixed positions too
and their positions cannot be altered.
Application Layer, Transport Layer, Internet Layer and Network Access Layers are the
four layers of TCP/IP Model.
Types of Topologies:
1. Star Topology:
All the computers are connected to a central Node using a single path.
A lot has happened since the early days of LAN technology. We have
already explained in more detail which standards exist today, which
categories of cables, and which plug-in technologies are used and what an
Ethernet cable is.
Some of them are particularly suitable for short distances. Their design
can be particularly space-saving so that they can also be used in confined
areas. Others are designed for longer distances or outdoor use.
However, all of these serve only one purpose: to connect devices to each
other with a network connector. In addition to computers, routers or servers,
peripheral devices such as printers or IP cameras also form part of the
network.
For this purpose, a LAN cable is connected to a terminal device. The data
reaches the other end device via a LAN distributor. Of course, this must also
K.MAHESH BABU 9110390203 Page 22
be integrated into the network.
Connectors
A connector is the unique end of a plug, jack, or edge of a card that
connects to a port. For example, all desktop computer expansion cards have
a connector that allows them to connect in a slot on the motherboard. When
referring to cables, the connector is the end of the cable that connects to a
port. For example, the end of a USB cable has a connector to connect to a
USB port.
The network adapter allows the device to communicate over the local area
network (LAN), connecting to the internet or to other computers.
Wireless network adapters, such as those on laptop computers and tablets, take the
computer's signals and convert them into radio waves that transmit via antenna
(visible or hidden). The radio frequency signals are actually electromagnetic waves
that vibrate as they travel through the air on the appropriate bands or frequencies.
The frequencies usually tend to be 2.4 GHz and 5 GHz, with 14 channels available.
The radio waves go to routers and then broadband modems or internal networks.
Anti-Magnetic mat
Crimping Tool
They're often used in screw terminals to stop multiple core wires from splitting
and can handle a range of popular wire sizes.
Choose a high leverage one, such as the Maun Bootlace Ferrule Crimper, to get
a good crimp without tiring out your hand. You can also choose the plier
version to crimp a wider range of sizes.
When you're working with thin cables, you don't have much margin for error,
which is why traditional hand crimping tools can create problems.
The solution to this is to use a crimping tool with a ratchet feature, such as this
one, that helps to control the crimp to remove human error from the process,
ensuring a good crimp every time, even with smaller cables.
These tools are designed to crimp QM connectors and IP68 connectors, which are
ideal for mains control lead connections, as well as small transmission systems.
This tool can handle QM connectors up to 24 AWG wire size and IP68 connectors
up to 28 AWG wire size, making it a versatile choice.
If you're looking to crimp splices, either gel-filled or butt splice connectors, then
you need a proper tool for it, as opposed to a generic crimping tool.
Crimping tools for this type of cable tend to come in different categories
depending on the coaxial cable impedance (calculated in Ohms Ω), so make sure
to get one that matches your cable type.
A cable tester is a device used to test the strength and connectivity of a particular
type of cable or other wired assemblies. There are many different types of cable
testers. Each of them can test a specific type of cable or wire (some can test
different types of cables or wires). A cable tester can test whether a cable or wire
is set up properly, connected correctly, and the communication strength between
the source and destination. The picture is an example of a cable tester from
TRENDnet.
For computers, one of the most common types of cable testers used is for testing
Cat 5, Cat 5e, and Cat 6 network cables. Because so many different types of data
are transmitted over a network cable, a proper connection needs to be established
between the computer and server. Also, make sure the signal strength is adequate
for transmitting data and that there is no outside interference. A cable tester can
test for these factors and verify the network cables connections are correct and
work for the intended purpose.
Network Cable Toner and Probe Kits are used for finding electrical cables such as
internet cables, phone lines, speaker wires, and ethernet wires in a house or
building. They allow you to find cables by tracing electrical signals back to their
sources.
They work like fax machines. Cables transfer data in two ways: electrical pulses
that indicate whether or not they are working properly (good signal), or break-off
signals indicating they have been cut or broken (no signal). The tester sends out an
electrical pulse, which then bounces back when it reaches a cable.
The device will pick up on these pulses and display them on its screen so you
can see where your cables are located. In order to use a network toner and probe
Kit, plug one end of your device into an outlet or power strip, then connect your
cable to the other end of your device using a coaxial connector or BNC
connector.
Now plug the other end of your cable into another outlet or power strip using
another coaxial connector or BNC connector. Then turn on both devices at once
to start searching for cables.
Step 1: Plug the tone generator part of a cable tester into the patch panel RJ45 port
that is connected to either a CAT5 or CAT6 network cable.
Step 2: To locate the other end of the cable, take your tone tracer to the place
where you think it might be.
Step 3: Place the tone tracer tool on each port until it produces a beeping sound.
When this happens, that is the port to which the other end of the cable being traced
is connected.
A punch down tool, also called a krone tool, is a hand tool used to connect
telecommunications and network wires to a patch panel, punch down block,
keystone module, or surface mount box. The "punch down" part of the name
comes from punching a wire into place using an impact action. It consists of a
handle, a spring mechanism, and a removable slotted blade.
When the punch down tool connects a wire, the blade cuts off the excess wire.
The network protocol is a set of rules that regulates the communication and
exchange of data over the internet or network. Both the sender and receiver should
follow the same protocols in order to communicate and exchange the data.
Whenever we access a website or exchange some data with another device, then
these processes are governed by a set of rules called the internet protocols.
Working:
The internet and many other data networks work by organizing data into small
parts called packets. Each large data is broken down into small packets and then
sent between two network devices by the underlying hardware and software. When
the packets arrive at their destination, they are reassembled into the original.
Each network protocol defines the rules for how its data packets must be organized
in a specific way according to the protocols the network supports.
Protocol Analyzer:
A protocol analyzer is a tool that helps you to monitor the network traffic and
analyze its behavior. It can be used for troubleshooting, detecting security issues,
or monitoring network performance. The main purpose of protocol analyzers is to
help us in understanding how packets are being transmitted over a network. It as
is a hardware or software tool used to capture and analyze the data over a
communication channel by which two or more devices communicate with each
other. Its main function is to capture digital data on the communication channel
that two or more devices use to communicate with each other and convert the
digital data bits into an information protocol sequence. Communication channels
vary from the local computer buses to satellite links.
IP Addressing
IP Address is short for Internet Protocol Address.
It is a unique address assigned to each computing device in an IP network.
ISP assigns IP Address to all the devices present on its network.
Computing devices use IP Address to identify and communicate with other devices in the
IP network.
1. Network ID represents the IP Address of the network and is used to identify the network.
2. Host ID represents the IP Address of the host and is used to identify the host within the
network.
IP Address Example
Example of an IP Address is
00000001.10100000.00001010.11110000 (Binary Representation)
OR
1.160.10.240 (Decimal Representation)
o MAC address is the physical address, which uniquely identifies each device on a given
network. To make communication between two networked devices, we need two
K.MAHESH BABU 9110390203 Page 40
addresses: IP address and MAC address. It is assigned to the NIC (Network Interface
card) of each device that can be connected to the internet.
o It stands for Media Access Control, and also known as Physical address, hardware
address, or BIA (Burned In Address).
o It is globally unique; it means two devices cannot have the same MAC address. It is
represented in a hexadecimal format on each device, such as 00:0a:95:9d:67:16.
o It is 12-digit, and 48 bits long, out of which the first 24 bits are used for OUI(Organization
Unique Identifier), and 24 bits are for NIC/vendor-specific.
o It works on the data link layer of the OSI model.
o It is provided by the device's vendor at the time of manufacturing and embedded in its NIC,
which is ideally cannot be changed.
o The ARP protocol is used to associate a logical address with a physical or MAC address.
Classful Addressing:
The 32 bit IP address is divided into five sub-classes. These are:
Class A
Class B
Class C
Class D
Class E
Each of these classes has a valid range of IP addresses. Classes D and E are reserved for
multicast and experimental purposes respectively. The order of bits in the first octet determine
Class A:
IP address belonging to class A are assigned to the networks that contain a large number of
hosts.
The network ID is 8 bits long.
The host ID is 24 bits long.
The higher order bit of the first octet in class A is always set to 0. The remaining 7 bits in first
octet are used to determine network ID. The 24 bits of host ID are used to determine the host in
any network. The default subnet mask for class A is 255.x.x.x. Therefore, class A has a total of:
2^7-2= 126 network ID(Here 2 address is subtracted because 0.0.0.0 and 127.x.y.z are
special address. )
2^24 – 2 = 16,777,214 host ID
IP addresses belonging to class A ranges from 1.x.x.x – 126.x.x.x
Class C:
IP address belonging to class C are assigned to small-sized networks.
The network ID is 24 bits long.
The host ID is 8 bits long.
The higher order bits of the first octet of IP addresses of class C are always set to 110.
The remaining 21 bits are used to determine network ID. The 8 bits of host ID is used to
determine the host in any network. The default sub-net mask for class C is 255.255.255.x.
Class C has a total of:
2^21 = 2097152 network address
2^8 – 2 = 254 host address
IP addresses belonging to class C ranges from 192.0.0.x – 223.255.255.x.
Class D:
Class E:
IP addresses belonging to class E are reserved for experimental and research purposes. IP
addresses of class E ranges from 240.0.0.0 – 255.255.255.254. This class doesn’t have
any sub-net mask. The higher order bits of first octet of class E are always set to 1111.
Classless Addressing:
Classless Inter-Domain Routing (CIDR) is another name for classless addressing. This addressing
type aids in the more efficient allocation of IP addresses. This technique assigns a block of IP
addresses based on specified conditions when the user demands a specific amount of IP
addresses. This block is known as a "CIDR block", and it contains the necessary number of IP
addresses.
When allocating a block, classless addressing is concerned with the following three rules.
Rule 1 − The CIDR block's IP addresses must all be contiguous.
Rule 2 − The block size must be a power of two to be attractive. Furthermore, the block's
size is equal to the number of IP addresses in the block.
Rule 3 − The block's first IP address must be divisible by the block size.
What is IP Address?
The address through which any computer communicates with our computer is simply called
an Internet Protocol Address or IP address .
Types of IP Address
1. IPv4 (Internet Protocol Version 4)
2. IPv6 (Internet Protocol Version 6)
IPv4
IPv4 address consists of two things that are the network address and the host address. It stands
for Internet Protocol version four. It was introduced in 1981 by DARPA and was the first
deployed version in 1982 for production on SATNET and on the ARPANET in January 1983.
IPv4 addresses are 32-bit integers that have to be expressed in Decimal Notation. It is
represented by 4 numbers separated by dots in the range of 0-255, which have to be converted
to 0 and 1, to be understood by Computers. For Example, An IPv4 Address can be written
as 189.123.123.90.
IPv4 Address Format is a 32-bit Address that comprises binary digits separated by a dot (.).
IPv6
IPv6 is based on IPv4 and stands for Internet Protocol version 6. It was first introduced in
December 1995 by Internet Engineering Task Force. IP version 6 is the new version of Internet
Protocol, which is way better than IP version 4 in terms of complexity and efficiency. IPv6 is
written as a group of 8 hexadecimal numbers separated by colon (:). It can be written as 128
bits of 0s and 1s.
Benefits of IPv6
The recent Version of IP IPv6 has a greater advantage over IPv4. Here are some of the
mentioned benefits:
SUBNETTING
Subnetting is a technique used in computer networking to divide a large IP network into smaller
subnetworks called subnets. It allows for efficient use of IP addresses and helps in organizing and
managing network resources effectively.
When subnetting, you start with a network address and borrow some bits from the host portion of
the IP address to create the subnet portion. The number of borrowed bits determines the number of
subnets and the number of hosts per subnet that can be created.
1. Determine the required number of subnets: Assess the network's needs and decide how many
subnets are necessary.
2. Determine the number of hosts per subnet: Determine the number of devices or hosts that each
subnet needs to accommodate.
3. Choose a subnet mask: Select a subnet mask that provides enough address space for the required
number of subnets and hosts per subnet. The subnet mask consists of a series of 1s followed by a
series of 0s.
4. Calculate the subnet bits: Determine the number of bits required for the subnet portion of the IP
address. This is based on the number of subnets you determined in step 1.
In networking, the TCP/IP addressing scheme refers to the method of assigning unique addresses
to devices connected to a TCP/IP-based network. TCP/IP (Transmission Control Protocol/Internet
Protocol) is the fundamental protocol suite used for communication on the internet and most local
area networks (LANs).
The TCP/IP addressing scheme uses IP addresses to identify devices on a network. There are two
versions of IP addresses: IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6).
IPv4 addresses are limited in number and have been largely exhausted due to the growth of the
internet. To address this limitation, IPv6 was introduced.
2. IPv6 Addressing: IPv6 addresses are 128-bit addresses represented in a hexadecimal format, such
as 2001:0db8:85a3:0000:0000:8a2e:0370:7334. The longer address length of IPv6 allows for a
significantly larger number of unique addresses compared to IPv4. IPv6 addresses are divided into
multiple segments and can be further classified into different types, including:
Global Unicast Address: Similar to IPv4 public addresses, these are routable addresses on the
internet.
Link-Local Address: These addresses are used for communication within a single network
segment.
Unique Local Address: These addresses are similar to private IPv4 addresses and are used for
local communication within an organization or site.
Multicast Address: These addresses are used for multicast communication.
IPv6 adoption is gradually increasing, and it is expected to replace IPv4 as the dominant protocol
in the future due to its vast address space.
In both IPv4 and IPv6, IP addresses are used to uniquely identify devices on a network and enable
communication between them.
There are five IP address classes: A, B, C, D, and E. However, the D and E classes are reserved
for special purposes and not commonly used for regular network addressing. The network classes
A, B, and C are the most commonly used and have the following components:
1. Network Address: The network address identifies the network to which the IP address belongs. It
represents the network portion of the IP address and is used for routing packets across networks.
The length of the network address portion varies depending on the IP address class:
Class A: The first octet (8 bits) represents the network address.
Class B: The first two octets (16 bits) represent the network address.
Class C: The first three octets (24 bits) represent the network address.
2. Host Address: The host address identifies a specific device (host) within the network. It
represents the unique address assigned to a device on the network. The length of the host address
portion also varies depending on the IP address class:
Class A: The last three octets (24 bits) represent the host address.
Class B: The last two octets (16 bits) represent the host address.
Class C: The last octet (8 bits) represents the host address.
It's worth noting that the network and host address components are used together to form a
complete IP address. For example, in a Class C network, an IP address might look like this:
192.168.0.1. Here, "192.168.0" represents the network address, and "1" represents the host
address.