Network Devices and Services
Network Devices and Services
– 3
1) Hubs:-
i. Hub is a special type of network device and is found in many home and small
business network.
ii. Hub is common connection point for devices in network. It connects multi
computer or other network devices with single device and performs like a
single network.
iii. A hub can contain multiple ports and the devices connected to this port
separately.
iv. Hub operates at the physical layer.
Types of Hub:-
On the basis of working and the performance, networking hub is differentiated
into the three different types-
a. Passive Hub:-
Passive hub simply receive packets on one port and rebroadcast (forward) them
to other ports. Passive hubs do not amplify the signals.
b. Active Hub:-
Active hub performs store and forward and can analyze the data being
transmitted. Active hub amplifies the weak or "damaged" packets (signals). This
means it repairs “Damaged” packets. It is also called as multiport repeater.
c. Intelligent Hub:-
Intelligent hub helps to manage an entire network from one central location. It
performs the function of passive and active hub. Basically this hub provides the
opportunity to increase the speed of networking. A switching hub chooses only the
port of the device where the signal needs to go, rather than sending the signal along all
paths.
Benefits of Hub:-
1. With the help of hubs we can create a home network easily.
2. Hubs can also monitor the whole network in a real expensive way.
3. It also provides the opportunity to the user to connect their old device with
their hub devices.
2) Bridges:-
i. A bridge is a device that has its own memory, processor and two NIC cards to
connect to two portion of a network.
ii. A bridge does not run application programs; it facilitates host-to-host
communication within a network.
iii. Bridge operates at the data link layer of the OSI model.
iv. The main idea of using a bridge is to divide a big network into smaller sub
networks, called segments. The bridge splits the entire network into segments.
v. The main advantage of a bridge is that it reduces the traffic on other network
segments, because it sends the data frames only to the concerned segment, not to
all segments on a network.
vi. For example, suppose we have network consisting of four segments numbered
to 1 to 4. If a host on segment 1 sends a frame destined for another host on
segment 3, the bridge forwards the frame only to segment 3, and not to segment
2 & 4, thus blocking unwanted data traffic.
vii. Bridge cannot read IP address, but only the outermost hardware address of the
packet. The hardware address is also called the MAC (Media Access Control)
address.
513B136545 1
513B136546 1
643B135561 2
643B135561 2
Types of Bridges:-
1. Transparent bridge
2. Routing bridge
1. Transparent Bridge:-
a) Transparent bridge is a bridge in which the stations are not at all aware of
the existence of the bridge.
b) Transparent bridge keeps a table of address in memory to determine where to
send data.
c) The duties of transparent bridge are-
a. Filtering frames
b. Forwarding
c. Blocking
3) Switch:-
i. A switch is an essentially a multi-port bridge, which is designed to allow faster
performance.
ii. It is high speed device which performs switching/bridging function faster than
a regular bridge.
iii. It operates at the data link layer.
iv. Switch has many ports; it is most often used to connect individual computers
or segment in LAN.
Fig.:- Switch
Switch operation : -
1. The devices connected to each port form a collision domain. Since only one
device is connected to a port in a switch, there is no collision.
2. The switch builds a table containing the MAC addresses of all devices
connected to switch.
3. The switch forwards a frame only to the port to which the destination device is
connected.
4. This leads to increased efficiency, in that, packet are not going to computers
that do not require them.
5. A switch can also concurrently switch among multiple ports.
b) Cut-Through switches:-
Modern switches do not store the frames. As soon as the
destination address is received, the frame is immediately forward even
before the entire frame has arrived.
This yields a much higher throughput, but increases the risk of sending
bad frames.
This switch forwards the packet to the output buffer as soon as the
destination address is received.
4) Repeaters:-
a. A repeater, also called as regenerator, is an electronic device, which simply
regenerates incoming electrical, wireless or optical signals.
Fig:- Repeater
The only responsibility of a repeater is to take a stream of bits, in the form of a
signal, regenerate it, so that the signal is accurate now, and send it forward. It does not
perform any intelligent function.
Advantages of Repeater:-
1. Simple to connect.
2. Makes it easy to expand a network over a large distance.
3. Connection between various type of media (e.g. Fiber optic, UTF, Coaxial
cable) is possible.
4. Cost effective.
5. Ability to strengthen signal.
Disadvantages of a Repeater:-
1. Traffic cannot be filtered to ease congestion.
2. A repeater cannot work across multiple network architecture.
3. Repeater provides no method for isolating traffic generated on one cable
segment from traffic generated by the other cable segment.
5) Router : -
a. Router is a device that connects two or more computers networks together. This
allows two or more disparate computer networks to send data to each other.
b. Router operates at the network layer of the OSI model.
Router Operation :-
a. Router maintains routing tables, which tell the location of every network on the
internetwork.
b. When a router receives packets to be sent, it looks in its table to find the route
to the final destination.
c. A packet may make several hops from one router to another before reaching its
destination.
d. A routing table is built and maintained by a routing protocol which is dynamic
in nature to reflect the current network status and configuration.
e. To select route or make decision, different network algorithms are used. e.g.
Distance vector routing , link state routing .
f. Router can forward packets across different network types (e.g. Ethernet,
Token ring, X.25, FDDI etc.). However, all these dissimilar networks must use
a common protocol (such as TCP/IP or AppleTalk) for communication. If a
network uses a different protocol, a router would not be able to forward packets
from one network to another.
Fig.:- Gateway
Applications of GPS:-
a. GPS is used by military forces.
b. Another use of GPS in is navigation. Used for navigation in vehicles, aircraft
and ships. Drivers can use in-vehicle portable navigation devices to follow a
a. 802.11a:-
It transmits data at a frequency level of 5 GHZ. The Orthogonal
Frequency Division Multiplexing (OFDM) used enhances reception by
dividing the radio signals into smaller signals before reaching the router.
Data transmission speed is up to 54 Mbps.
b. 802.11b:-
It will transmit data at a frequency level of 2.4 GHZ, which is relatively
slow speed. Data transmission speed is upto 11 Mbps. It has range upto 32 meters.
D. Bluetooth:-
1. Bluetooth is wireless technology.
2. Bluetooth is a specification (IEEE 802.15.1) for the use of low-power radio
communication to link phones, computers & other network devices over short
distance without wires.
3. Bluetooth was originally started as a project by the Ericsson Company.
4. It is named for Harald Blaatand, the king of Denmark. Blaatand translates to
Bluetooth in English.
5. It is used for short distance communication. Wireless signals transmitted with
Bluetooth cover short distance, typically up to 30 feet.
6. Bluetooth device generally communicate at less than 1 Mbps.
7. Today, Bluetooth technology is the implementation of a protocol defined by the
IEEE 802.15 standard. The standard defines a Wireless Personal Area Network
(PAN) operable in an area the size of a room or a hall.
Architecture:-
Bluetooth defines a two types of network:- Piconet and Scatternet.
a. Piconet:-
i. A Bluetooth network is called a Piconet or small net.
ii. A piconet can have upto eight station (devices), one of which is called the
primary (master) or the rest are called secondary (Slave).
iii. A piconet can have only one primary station.
iv. A communication between primary & secondary can be one-to-one or one-
to-many.
v. All communication is between primary & secondary, direct secondary to
secondary communication is not possible.
b. Scatternet:-
1. Piconet can be combined to form a scatternet. Interconnected collection of
piconets is called scatternet.
2. A secondary station in one piconet can be the primary in another piconet.
3. This station can receive messages from the primary in the first piconet &
acting as a primary, deliver them to secondary’s in the second piconet.
4. A station can be a member of two piconets.
Figure: Scatternet
Application:-
1) Peripheral devices such as wireless mouse or keyboard can communicate with
the computer through this technology.
2) We can send files, songs from one mobile to another mobile using Bluetooth.
3) Conference attendees can synchronize their laptop computers at a conference.
Architecture of GSM:-
F. GPRS:-
1. General Packet Radio Service or more commonly known as GPRS allows
mobile phone to send & receive data using a regular Internet Protocol (IP)
network.
2. With the GPRS network, mobile phone users can have wireless access & use
the internet to check their email, surf & even watch video streams.
3. GPRS network is packet based, meaning, data are transmitted in several
“packets” and are just processed at the receiving end.
4. GPRS is a step between GSM & 3G cellular network. GPRS offers faster data
transmission via a GSM network within range 9.6 Kbits to 115 Kbits.
5. This new technology makes it possible for users to make telephone calls &
transmit data at the same time. For e.g., if you a mobile phone using GPRS,
we will be able to simultaneously make calls & receive email messages.
6. The main benefits of GPRS are that it reserve radio resources only when
there is data to send & it reduces reliance on traditional circuit switched
network elements.
7. There is no need to establish a connection to GPRS before data transmission
begins. The connection to GPRS network is always on, but the device needs to
connect to the data terminal.
8. GPRS usage is typically charged based on volume of data transferred,
contrasting with circuit switched data, which is usually billed per minute of
connection time.
G. Video Conferencing:-
1. It is also known as video conference or video teleconference. Which allow two
or more locations to communicate by simultaneous two-way video and audio
transmission.
2. It has also been called ‘visual collaboration’ & is a type of groupware.
3. Video conferencing is the transmission of image (video) & speech (audio) back
forth between two or more physically separate locations.
4. First is it deployed commercially in the United States by AT&T Corporation
during the early 1970.
5. Video conferencing uses audio & video telecommunication to bring people at
different sites together. This can be as simple as a conversation between people
in private offices (point to point) or involve several (multipoint) sites in large
rooms at multiple locations.
The following are the components required for video conferencing-
1) Video Input:- The video cameras or webcam is used to capture & send video
from our local endpoint.
2) Video Output:- Video display (computer monitor, television or projector) are
used to display video received from remote endpoint.
3) Audio Input:- Microphones are used to capture & send audio from our local
endpoint.
4) Audio Output:- Speakers are used to play audio received from remote
endpoint.
5) Data transfer:- To transfer data analog or digital telephone network, LAN or
internet are used.
12. In VLAN it is easy to move one station from one group to another group
through software without changing the configuration of the physical network.
Characteristics that can be used to group station in a VLAN are port
number, MAC address, IP address or combination of two or more. The VLAN vendor
use switch port number, MAC address of station or IP address as a membership
characteristics.