0% found this document useful (0 votes)
22 views21 pages

Network Devices and Services

Uploaded by

thirosul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views21 pages

Network Devices and Services

Uploaded by

thirosul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Chapter No.

– 3

Network Devices and Services

 Network Devices / Connecting Devices:-


To connect computers or segments of networks we need connecting devices.
Each of these devices performs a different function and is hence used for different
purpose. The various interconnecting devices are as follows:-

1) Hubs:-
i. Hub is a special type of network device and is found in many home and small
business network.
ii. Hub is common connection point for devices in network. It connects multi
computer or other network devices with single device and performs like a
single network.
iii. A hub can contain multiple ports and the devices connected to this port
separately.
iv. Hub operates at the physical layer.

 How Network Hub Works:-


i. Working of networking hub depends upon its construction and the types that is
used for the networking.
ii. Hub connect multiple computers to each other, on this network, all computers
communicate directly with each other.
iii. Different computers are connected with the hub with the help of individual port.
iv. Hub does not read any of the data passing through them and are not aware of
their source or destination.
v. When hub gathers the signals from each individual device, optionally amplifies
each signal, and then sends the signals out to all other devices connected on the
network – including the one that originally send the packet.
vi. Amplification helps to ensure that devices on the networks receive reliable
information.

Page 1 Prof. Nale V.D.


vii. Everything including file server, workstation, and print server can be connected
to the hub, making it accessible to every other node of the network.

 Types of Hub:-
On the basis of working and the performance, networking hub is differentiated
into the three different types-

a. Passive Hub:-

Passive hub simply receive packets on one port and rebroadcast (forward) them
to other ports. Passive hubs do not amplify the signals.

b. Active Hub:-

Active hub performs store and forward and can analyze the data being
transmitted. Active hub amplifies the weak or "damaged" packets (signals). This
means it repairs “Damaged” packets. It is also called as multiport repeater.

c. Intelligent Hub:-

Intelligent hub helps to manage an entire network from one central location. It
performs the function of passive and active hub. Basically this hub provides the
opportunity to increase the speed of networking. A switching hub chooses only the
port of the device where the signal needs to go, rather than sending the signal along all
paths.

 Benefits of Hub:-
1. With the help of hubs we can create a home network easily.
2. Hubs can also monitor the whole network in a real expensive way.
3. It also provides the opportunity to the user to connect their old device with
their hub devices.

Page 2 Prof. Nale V.D.


 Disadvantage of Hub:-
1. Every packet is sent out to every computer on the network, there is a lot of
wasted transmission.

2) Bridges:-
i. A bridge is a device that has its own memory, processor and two NIC cards to
connect to two portion of a network.
ii. A bridge does not run application programs; it facilitates host-to-host
communication within a network.
iii. Bridge operates at the data link layer of the OSI model.
iv. The main idea of using a bridge is to divide a big network into smaller sub
networks, called segments. The bridge splits the entire network into segments.
v. The main advantage of a bridge is that it reduces the traffic on other network
segments, because it sends the data frames only to the concerned segment, not to
all segments on a network.
vi. For example, suppose we have network consisting of four segments numbered
to 1 to 4. If a host on segment 1 sends a frame destined for another host on
segment 3, the bridge forwards the frame only to segment 3, and not to segment
2 & 4, thus blocking unwanted data traffic.
vii. Bridge cannot read IP address, but only the outermost hardware address of the
packet. The hardware address is also called the MAC (Media Access Control)
address.

Fig.:- Bridge Operation


viii. Data packets generated on one segment and intended for that same segment are
not passed to the other segment. This saves on data transmission on the network
as a whole.

Page 3 Prof. Nale V.D.


ix. Bridge has a filtering capability. That means it can checks the destination
address of a frame and decide if the frame should be forwarded or dropped.
x. So a bridge has a table relating the address and port over which it should be
forwarded.

MAC Address Port

513B136545 1

513B136546 1

643B135561 2

643B135561 2

Fig.:- Bridge and Bridge Table


xi. If frame for 723B134561 arrives at port 2 then the bridge goes through its
table and understands that the frame is to be sent out on port 1.

 Types of Bridges:-
1. Transparent bridge
2. Routing bridge

1. Transparent Bridge:-
a) Transparent bridge is a bridge in which the stations are not at all aware of
the existence of the bridge.
b) Transparent bridge keeps a table of address in memory to determine where to
send data.
c) The duties of transparent bridge are-
a. Filtering frames
b. Forwarding
c. Blocking

Page 4 Prof. Nale V.D.


2. Routing bridge:-
a) In source routing a sending station defines the bridge that should be visited by
the frames.
b) The addresses of these bridges are included in the frame. So a frame contains
not only the source and destination address but also the bridge address.
c) These bridge were designed for the token ring LAN’s.

3) Switch:-
i. A switch is an essentially a multi-port bridge, which is designed to allow faster
performance.
ii. It is high speed device which performs switching/bridging function faster than
a regular bridge.
iii. It operates at the data link layer.
iv. Switch has many ports; it is most often used to connect individual computers
or segment in LAN.

Fig.:- Switch
 Switch operation : -
1. The devices connected to each port form a collision domain. Since only one
device is connected to a port in a switch, there is no collision.
2. The switch builds a table containing the MAC addresses of all devices
connected to switch.
3. The switch forwards a frame only to the port to which the destination device is
connected.
4. This leads to increased efficiency, in that, packet are not going to computers
that do not require them.
5. A switch can also concurrently switch among multiple ports.

Page 5 Prof. Nale V.D.


 Types of switch:-
a) Store and Forward switches:-
These switches receive an entire frame, perform error checking
and then forward the frame to the destination device. This requires the
switch to have a large amount of buffer space for incoming frame.
However, if the traffic is very high, the switch may run out of buffer
space and will have to discard frames.

b) Cut-Through switches:-
Modern switches do not store the frames. As soon as the
destination address is received, the frame is immediately forward even
before the entire frame has arrived.

This yields a much higher throughput, but increases the risk of sending
bad frames.

This switch forwards the packet to the output buffer as soon as the
destination address is received.

4) Repeaters:-
a. A repeater, also called as regenerator, is an electronic device, which simply
regenerates incoming electrical, wireless or optical signals.

b. Repeaters connect multiple network segments together.


c. It works at the physical layer of the OSI protocol.
d. Signals travelling across a physical wire travel some distance before they
become weak, or get corrupted as they get interfered with other signals / noise.
This means that the integrity of the data that the signal carries, is in danger. A
repeater receives such a signal, which is likely to become weak or corrupted,
and regenerate it.

Page 6 Prof. Nale V.D.


e. This is, the repeater simply recreates the bit pattern of the signal, and puts this
regenerated signal back on to the transmission medium. In effect, the original
signal is created once again.
f. Repeater allows extending a network beyond the physical boundaries.
g. Repeater allows extending network distance limitations. It does not give any
more bandwidth or does not allow transmitting data faster.

Fig:- Repeater
The only responsibility of a repeater is to take a stream of bits, in the form of a
signal, regenerate it, so that the signal is accurate now, and send it forward. It does not
perform any intelligent function.
 Advantages of Repeater:-
1. Simple to connect.
2. Makes it easy to expand a network over a large distance.
3. Connection between various type of media (e.g. Fiber optic, UTF, Coaxial
cable) is possible.
4. Cost effective.
5. Ability to strengthen signal.

 Disadvantages of a Repeater:-
1. Traffic cannot be filtered to ease congestion.
2. A repeater cannot work across multiple network architecture.
3. Repeater provides no method for isolating traffic generated on one cable
segment from traffic generated by the other cable segment.
5) Router : -
a. Router is a device that connects two or more computers networks together. This
allows two or more disparate computer networks to send data to each other.
b. Router operates at the network layer of the OSI model.

Page 7 Prof. Nale V.D.


c. A router has to determine the best possible transmission path, among the several
available.
d. In order to uniquely identify any machine which is connected to internetwork, a
global addressing scheme is needed. Thus, each device is assigned a logical
address. All routing is done on the basis of this logical address. (IP address).

Fig:- Router Connecting two Network together

 Router Operation :-
a. Router maintains routing tables, which tell the location of every network on the
internetwork.
b. When a router receives packets to be sent, it looks in its table to find the route
to the final destination.
c. A packet may make several hops from one router to another before reaching its
destination.
d. A routing table is built and maintained by a routing protocol which is dynamic
in nature to reflect the current network status and configuration.
e. To select route or make decision, different network algorithms are used. e.g.
Distance vector routing , link state routing .
f. Router can forward packets across different network types (e.g. Ethernet,
Token ring, X.25, FDDI etc.). However, all these dissimilar networks must use
a common protocol (such as TCP/IP or AppleTalk) for communication. If a
network uses a different protocol, a router would not be able to forward packets
from one network to another.

Page 8 Prof. Nale V.D.


6) Gateways :-
a. Gateway is a device that connects two computers network that use
different protocol.
b. A gateway is also called as Protocol convertor.
c. It translates between protocols, so that computers on the connected
networks can exchange data.
d. Gateway is a device that can interpret and translate the different protocols
that are used on two distance networks.
e. Gateways comprise of software, dedicated hardware or a combination of
both.
f. Gateway operates through all the seven layers of the OSI model.
g. A gateway can actually convert data so that it works with an application on
a computer on the other side of the gateway. Example, a gateway can
receive e-mail message in one format and convert them into another
format.
h. Gateway can connect system with different communication protocols,
languages and architecture. For e.g. Ethernet networks connected to Token
ring network using a gateways.

Fig.:- Gateway

Page 9 Prof. Nale V.D.


 Network Services:-

A. VPN (Virtual Private Network):-


1. Virtual private network is a technology that is popularly used in large
organization that uses the global internet for both intra and inter organization
communication, but require privacy in their internal communication.
2. Many companies have offices & plants scattered over many cities, sometimes
over multiple countries. The LNN's at different offices can be connected to
each other by using router & telephone leased lines is called Private Network.
3. Private network work fine & are very secure. Major drawback of private
network is cost. To connect several offices (LAN's), an organization needs
several leased lines, which means a high monthly fee.
4. A technology called VPN allows organization to use the global internet for
both private and public communication.
5. VPN creates a network that is private but virtual. It is private because it
guarantees privacy inside the organization. It is virtual because it does not use
real private WAN's, the network is physically public but virtually private.
6. A common design is to equip each offices with a router & create tunnels
through the internet between all pairs of offices. VPN technology uses IPSec
(IP security) in the tunnel mode to provide authentication, integrity & privacy,
7. The public network (internet) is responsible for carrying the packet from
source router to destination router. Outsiders cannot decipher the contents of
the packet or the source & destination address. Deciphering takes place at
destination router, which finds the destination address of the packet & delivers
it.

Fig.:- Private Network

Page 10 Prof. Nale V.D.


Fig.:- Virtual Private Network

B. GPS (Global Positioning System):-


1. GPS system is an example of MEO (Medium-Earth-Orbit) system.
2. GPS system provides location & time information in all weather conditions,
anywhere on or near the earth where there is an unobstructed line of sight to
four or more satellite.
3. GPS system is constructed and operated by the United States Department of
Defense (DOD), orbiting at an attitude about 18,000 km above the earth.
4. This system is freely accessible to anyone with a GPS receiver.
5. GPS is a satellite based navigation system made up of a network of 24
satellites orbiting the earth.
6. The system consists of 24 satellites & is used for land, sea & air navigation to
provide time & locations for vehicles & ships.
7. GPS uses 24 satellites in six orbits.
8. There are 4 satellites in each of 6 orbital planes.

Fig.:- Orbits for GPS Satellite


Page 11 Prof. Nale V.D.
9. The orbit and the location of the satellite in each orbit are designed in such a
way that at any time four satellites are visible from any point on earth. A GPS
receiver has an almanac that tells the current position of each satellite.

 How GPS work:-


a. GPS satellite circle the earth in a very precise orbit & continuously transmit
signal information to earth. The GPS signals do not contain positional data.
b. That information includes the time the message was transmitted & satellite
position of satellite at time of information transmission.
c. These radio signals travel at the speed of light.
d. GPS receivers take this information and calculate the distance to each satellite
based on how long it took for the message to arrive.
e. Distance to the satellite = speed * (tr – tt0) (where speed is the speed of light). tt0
is the time at the origin and tr is the time at the receiver).
f. Once it has information on how far away at least three satellites are, our GPS
receiver can pinpoint your location using a process called Triangulation.
g. Receiver use triangulation to calculate the user’s exact location.
h. For accurate location, GPS receiver need signal from at least 4 satellites.

Fig.:- Triangulation process

 Applications of GPS:-
a. GPS is used by military forces.
b. Another use of GPS in is navigation. Used for navigation in vehicles, aircraft
and ships. Drivers can use in-vehicle portable navigation devices to follow a

Page 12 Prof. Nale V.D.


route, find detours around traffic problems and with additional software receive
traffic alerts and warnings on safety camera locations.
c. Another very interesting application is clock synchronization

C. Wi-Fi (Wireless Fidelity):-


1. Wi-Fi is the name of a popular wireless networking technology that uses radio
waves to provide wireless high speed internet & network connection.
2. Wi-Fi is short for Wireless Fidelity.
3. Wi-Fi is also known as 802.11 network, as it covers the IEEE (Institute of
electrical & electronic Engineers).
4. Wi-Fi is increasingly becoming the preferred mode of internet connection all
over the world. To access this type of connection, one must have a wireless
adaptor in their computer.
5. Wi-Fi provides wireless connectivity by emitting frequencies between 2.4
GHZ to 5 GHZ based on the amount of data on the network.
6. Areas which are enabled with Wi-Fi connectivity are known as Hot-Spot.
7. The major advantage of Wi-Fi is that it is compatible with almost every
operating system, game device & advanced printers.
8. The range of Wi-Fi is about 32 meters.
9. Device that can use Wi-Fi can connect to internet via wireless network access
point (hotspot). Wi-Fi is a high speed internet.
10. 802.11 standards include 802.11a, 802.11b, 802.11g, 802.11n & so on.

a. 802.11a:-
It transmits data at a frequency level of 5 GHZ. The Orthogonal
Frequency Division Multiplexing (OFDM) used enhances reception by
dividing the radio signals into smaller signals before reaching the router.
Data transmission speed is up to 54 Mbps.

b. 802.11b:-
It will transmit data at a frequency level of 2.4 GHZ, which is relatively
slow speed. Data transmission speed is upto 11 Mbps. It has range upto 32 meters.

Page 13 Prof. Nale V.D.


c. 802.11g:-
It will mix of both 802.11a & 802.11b. It will transmit at 2.4 GHz. Data
transmission speed is upto 54 Mbps & also uses OFDM coding.
d. 802.11n:-
It is newest standard that is widely available. This standard can transmit
a maximum of 140 Mbps & uses a frequency level of 5 GHz.

D. Bluetooth:-
1. Bluetooth is wireless technology.
2. Bluetooth is a specification (IEEE 802.15.1) for the use of low-power radio
communication to link phones, computers & other network devices over short
distance without wires.
3. Bluetooth was originally started as a project by the Ericsson Company.
4. It is named for Harald Blaatand, the king of Denmark. Blaatand translates to
Bluetooth in English.
5. It is used for short distance communication. Wireless signals transmitted with
Bluetooth cover short distance, typically up to 30 feet.
6. Bluetooth device generally communicate at less than 1 Mbps.
7. Today, Bluetooth technology is the implementation of a protocol defined by the
IEEE 802.15 standard. The standard defines a Wireless Personal Area Network
(PAN) operable in an area the size of a room or a hall.

 Architecture:-
Bluetooth defines a two types of network:- Piconet and Scatternet.
a. Piconet:-
i. A Bluetooth network is called a Piconet or small net.
ii. A piconet can have upto eight station (devices), one of which is called the
primary (master) or the rest are called secondary (Slave).
iii. A piconet can have only one primary station.
iv. A communication between primary & secondary can be one-to-one or one-
to-many.
v. All communication is between primary & secondary, direct secondary to
secondary communication is not possible.

Page 14 Prof. Nale V.D.


Figure: Piconet

b. Scatternet:-
1. Piconet can be combined to form a scatternet. Interconnected collection of
piconets is called scatternet.
2. A secondary station in one piconet can be the primary in another piconet.
3. This station can receive messages from the primary in the first piconet &
acting as a primary, deliver them to secondary’s in the second piconet.
4. A station can be a member of two piconets.

Figure: Scatternet

 Application:-
1) Peripheral devices such as wireless mouse or keyboard can communicate with
the computer through this technology.
2) We can send files, songs from one mobile to another mobile using Bluetooth.
3) Conference attendees can synchronize their laptop computers at a conference.

Page 15 Prof. Nale V.D.


E. GSM:-
a. GSM stands for Global System for Mobile Communication (GSM).
b. GSM is a European standard that was developed to provide a common second
generation (2G) technology for all Europe.
c. GSM is a cellular system. GSM is typical second generation system, replacing
the first generation analog system.
d. GSM is a fully digital system.
e. The primary goal of GSM was to provide a mobile phone system that allow
users to roam throughout Europe & provide voice services compatible to ISDN
& other PSTN systems.
f. GSM uses two bands for duplex communication. Each band is 25 MHz in
width, shifted towards 900 MHz. Each band is divided into 124 channels of
200 KHz separated by guard bands.

 service provided by GSM:-


1. Telephony – Basic Teleservice.
2. Emergency calling.
3. Voice messaging.
4. Bearer
5. Low speed data transfer.
6. Group Fax and SMS.
7. Call offering, call forwarding, call waiting, and call hold.
8. Multiparty teleconferencing.

 Architecture of GSM:-

GSM system consists of three subsystems:-


1) Radio Subsystem (RSS)
2) Network & Switching Subsystem (NSS)
3) Operation Subsystem (OSS)
1) Radio Subsystem (RSS):-
The RSS comprise all radio specific entities, i.e. the mobile station
(MS) & base station subsystem (BSS)
a. Mobile Station (MS):- This refers to the physical phone itself. The MS
comprises all user equipment & software needed for communication with
GSM network.
b. Base Transceiver Station (BTS):- A BTS Comprise all radio equipment i.e.
antennas, signal processing, amplifiers necessary for radio transmission. The
BTS is the mobile stations access point to the network. It is responsible for

Page 16 Prof. Nale V.D.


carrying out radio communication between the network & the MS. The
interface between the MS and BTS is known as the Um interface or the air
interface.
c. Base Station Controller (BSC):- The BSC controls multiple BTS. It handles
allocation of radio channels, frequency administration, power and signal
measurement from the MS and handovers from one BTS to another it both
BTS are controlled by the same BSC. The interface between the BTS and the
BSC is known as the Abis interface.

Figure: Architecture of GSM

2) NSS (Network and Switching Subsystem):-


The “heart” of the GSM system is formed by the NSS. The NSS connects
the wireless network with standard public network, performs handover between
different BSS. It also includes the databases needed in order to store information
about the subscribers & to manage their mobility. The different components of
NSS are - MSC, HLR, VLR, AuC, and EIR.

Page 17 Prof. Nale V.D.


a. Mobile Switching Center (MSC):- MSC set up connections to other MSC &
to the BSC via the A interface. It handle call set up, supervision, release,
billing information collection, mobility management, access to HLR & VLR.
b. Home Location Register (HLR):- HLR is the most important database in a
GSM system. It stores all user relevant information. It contains permanent
database of all the subscribers in the network.
c. Visitor Location Register (VLR):- VLR is a database associated to each
MSC. It contains temporary visitor’s database.
d. Authentication Center (AuC):- The AUC is responsible for generating the
necessary crypto variable for Authentication & encryption on the network.

F. GPRS:-
1. General Packet Radio Service or more commonly known as GPRS allows
mobile phone to send & receive data using a regular Internet Protocol (IP)
network.
2. With the GPRS network, mobile phone users can have wireless access & use
the internet to check their email, surf & even watch video streams.
3. GPRS network is packet based, meaning, data are transmitted in several
“packets” and are just processed at the receiving end.
4. GPRS is a step between GSM & 3G cellular network. GPRS offers faster data
transmission via a GSM network within range 9.6 Kbits to 115 Kbits.
5. This new technology makes it possible for users to make telephone calls &
transmit data at the same time. For e.g., if you a mobile phone using GPRS,
we will be able to simultaneously make calls & receive email messages.
6. The main benefits of GPRS are that it reserve radio resources only when
there is data to send & it reduces reliance on traditional circuit switched
network elements.
7. There is no need to establish a connection to GPRS before data transmission
begins. The connection to GPRS network is always on, but the device needs to
connect to the data terminal.
8. GPRS usage is typically charged based on volume of data transferred,
contrasting with circuit switched data, which is usually billed per minute of
connection time.

Page 18 Prof. Nale V.D.


 Application for GPRS:-
1. With the accessibility & ease of use that the GPRS extends to mobile phone
users, it is now possible to browse online & use other applications such as
watching videos, downloading music & playing online.
2. We can also download the latest polyphonic ringtones to our mobile phones,
watch movie trailer & download a wide choice of online 3D & arcade games.
3. Wide range of contest can be delivered to mobile phone users ranging from
share prices, sports, scores, weather, flight information, news headlines & so
on.
4. Still images such as photographs, pictures, postcards, greeting cards can be
send & receiver over the mobile network as they are across fixed telephone
network.

G. Video Conferencing:-
1. It is also known as video conference or video teleconference. Which allow two
or more locations to communicate by simultaneous two-way video and audio
transmission.
2. It has also been called ‘visual collaboration’ & is a type of groupware.
3. Video conferencing is the transmission of image (video) & speech (audio) back
forth between two or more physically separate locations.
4. First is it deployed commercially in the United States by AT&T Corporation
during the early 1970.
5. Video conferencing uses audio & video telecommunication to bring people at
different sites together. This can be as simple as a conversation between people
in private offices (point to point) or involve several (multipoint) sites in large
rooms at multiple locations.
The following are the components required for video conferencing-
1) Video Input:- The video cameras or webcam is used to capture & send video
from our local endpoint.
2) Video Output:- Video display (computer monitor, television or projector) are
used to display video received from remote endpoint.
3) Audio Input:- Microphones are used to capture & send audio from our local
endpoint.
4) Audio Output:- Speakers are used to play audio received from remote
endpoint.
5) Data transfer:- To transfer data analog or digital telephone network, LAN or
internet are used.

Page 19 Prof. Nale V.D.


6) Computers:- A data processing unit that ties together the other computers,
does the compressing & decompressing and initiates and maintains the data
linkage via the network.

 Application of Video conferencing:-


a. Business:- participates in meeting from different places.
b. Education:- Guest lecture from other institutes.
c. Government:- Military use.
d. Medicine:- Patients may contact nurses & physicians in emergency.

H. Virtual LAN (VLAN):-


1. Virtual LAN is also called as VLAN or virtual local network.
2. A station is considered part of a LAN, if it physically belongs to that LAN. The
criterion of membership is geographic.
3. If we need a virtual connection between two stations belonging to two different
physical LAN we use VLAN.
4. VLAN as a local area network configured by software not by physical
wiring.
5. Following figure shows a switched LAN in an engineering firm in which 10
station are grouped into three LAN’s that are connected by a switch.

Fig.:- Switch Connecting 3 LANs

Page 20 Prof. Nale V.D.


The LAN configuration needs to changed, if the administrator needed to
move two engineers (stations) from the first group to the third group, to speed up
the project being done by the third group. The network technician must rewire the
network. In a switched LAN, changes in the work group mean physical changes in
the network configuration.
6. The idea of VLAN technology is to divide a LAN into logical, instead of
physical segments.
7. A LAN can be divided into several logical LAN’s called VLAN. Each VLAN
is a work group in the organization.
8. If a person moves from one group to another, there is no need to change the
physical configuration. The group membership in VLAN is defined by
software, not hardware.
9. Any station can be logically moved to another VLAN.
10. All members belonging to a VLAN can receive broadcast messages send to that
particular VLAN.
11. This means if a station moves from VLAN1 to VLAN2, it receives broadcast
message sent to VLAN2 but no longer receiver broadcast message sent to
VLAN1.

Fig.:- Switch Using VLAN software

12. In VLAN it is easy to move one station from one group to another group
through software without changing the configuration of the physical network.
Characteristics that can be used to group station in a VLAN are port
number, MAC address, IP address or combination of two or more. The VLAN vendor
use switch port number, MAC address of station or IP address as a membership
characteristics.

Page 21 Prof. Nale V.D.

You might also like