DCC UNIT5 Notes Final
DCC UNIT5 Notes Final
KADAM
UNIT: 5
Course Outcome:
5.3 Network Connecting devices: Switch, Router, Repeater, Bridge, Gateway, Modem,
References:
a. www.nptelvideos.in/2012/11/data-communication.html
b.http://www.myreadingroom.co.in/notes-and-studymaterial/68-den/750-analog-to-analog-
conversion-techniques.html
c. http://www.tutorial reports.com/wireless/wlanwifi/wifi_architecture.php
d. http://standards.ieee.org/about/get/802/802.11.html
e. www.tutorialspoint.com/data_communication_computer_network/
f. http://www.studytonight.com/computer-networks/overview-of-computer-networks
1
DCC (22414) MRS. S.S.KADAM
• These two types of networks decide the relationship between each computer on the network
• Client –Server network uses centralized management system., where decision are made in
central location
1. Client
2. Server
• In client-Server network , certain computers act as servers and others act as client.
• Server is simply a computer that has the network resources and provides services to other
computer when they request for it.
• A client is the computer running a program and request the services from a server.
• Server has more priority than client due to storage, speed or disk space.
2
DCC (22414) MRS. S.S.KADAM
Functions of Server:
1. Accept the query which is coming from Client
• Functions of Client:
1. Client place a request on the server. i.e. ask the services from Server
1. More Secure
2. More Reliable
3. Better Performance
4. Centralized Backup
2. Professional Administration
3
DCC (22414) MRS. S.S.KADAM
Types of Server :
1. File Server
2. Print Server
3. Application Server
4. Message Server
5. Database Server
1.File Server :
• File server provides services for storing, retrieving and moving the data. User can perform
various operations with the help of file server like read, write, exchange and manage files.
2.Print Server :
4
DCC (22414) MRS. S.S.KADAM
• Print server manages the printing functions on the network. It means that print server is used
for controlling and managing printing on the network.
• Print server provides various print and fax services. For printing, print server uses print
queue.
3.Application Server :
• With the help of application server, the expensive software can be shared in a network
1. Message Server :
• A message server is middle ware program that handles messages that are sent for use by
other programs using messaging application program interface.
•It is used to co-ordinate the interaction between users, documents and applications.
• This interaction can be in different forms like audio, video, binary, text or graphics. File
server cannot handle all those things, so message server came into the picture
5
DCC (22414) MRS. S.S.KADAM
5.Database Server :
• Database server allows user to access centralized database. It performs various tasks
such as data analysis, storage data manipulation, archiving and other non-user
specific task
6
DCC (22414) MRS. S.S.KADAM
• Hard to backup
7
DCC (22414) MRS. S.S.KADAM
8
DCC (22414) MRS. S.S.KADAM
iii.Management of network.
iv.Architecture of network.
v.Cable type.
vi.Expandability of the system (Future growth).
vii.The desired performance of the system.
viii.The desired reliability of the entire system.
2.Types of Network Topology
Depending on the manner of connecting the computers, we can have different network
topologies:
1. Star Topology:
In star topology, each computer is connected to a central unit called hub. Each computer on a
star network communicates with a central hub that resends the message either to all the
computers or to the destination computer.
If one device wants to send data to another, it sends the data to the hub (controller), which
then relays the data to the other connected device.
It means that, the data is transmitted in the form of electronic signal, the signal is transferred
from the PC to the HUB and then the hub is responsible for broadcasting the data.
Thus, the source computer sends the data to the hub. A hub broadcasts the data which is
received by all the computers except the source computer, then the destination address is
9
DCC (22414) MRS. S.S.KADAM
checked. If the address gets matched, then that PC accepts the data otherwise it rejects the
data.
The hub in star network can be active or passive. An active hub generates the electrical signal
and sends it to all the computers connected to it. Active hub is also called as multiport
repeater. Active hub requires external power supply.
A passive hub is a wiring panel or punch down block which acts as a connection point. It
does not amplify or regenerate the signal. Passive hub does not require electrical power
supply.
All traffic that traverses the network passes through the central hub. The star topology is
considered the easiest topology to design and implement.
Star topology is an active network because it uses hub which can be of intelligent and passive
types. The intelligent hubs need external power supply, electronic components for
regeneration of signal as well as routing it to the required computer.
Star expansion is possible by placing another hub as shown in figure. This arrangement
allows several more computers or hubs to be connected to that hub.
Advantages
i. It is very easy to install, manage and reconfigure.
ii. Cabling cost is very less.
iii. Robustness: If one link fails, only that link is affected.
iv. Easy to add new computer to a star network without disturbing the rest of the network.
iv. Single computer failure does not necessarily bring down the whole star network.
v. Star topology eliminates traffic problem.
vi. It is fast as compared to ring topology.
Disadvantages
i. If central node (hub) goes down, then the entire network goes down.
ii. Cost of network is high, because of hub.
iii. Hubs are difficult to install.
iv. More expensive than bus topology.
10
DCC (22414) MRS. S.S.KADAM
Star topology degrades most gracefully in high network load situation. The reason is that with
increased load, there will be a large increase in the number of messages travelling on the
network. There would be a large number of collisions and delays possible for the bus and ring
topologies. Mesh is not suitable for large network.
2. Mesh Topology
Mesh topology is a network where all the nodes are connected to each other and is a complete
network. It means that each device in mesh topology has a dedicated point-to-point link to
every other device. The term dedicated means that the link carries traffic only between two
devices it connects.
Every node not only sends its own signals but also relays data from other nodes. Mesh
topology is very expensive as there are many redundant connections, thus it is not mostly
used in computer networks. It does not have traffic congestion problem because dedicated
links are being used.
This topology is difficult and expensive, as there are a number of to have redundant
connections to every computer. If one network cable fails, the data always has an alternative
path to get its destination.
11
DCC (22414) MRS. S.S.KADAM
Advantages
i. The use of dedicated link guarantees that each connection can carry its own data load.
Thus, it eliminates traffic problems.
ii. Even if one of the computers fails, there is always an alternative present. So data transfer
doesn’t get affected.
iii. It provides privacy and security when every message travels along a dedicated line, only
the intended recipient sees it. Physical boundaries prevent other users from gaining access to
message.
iv.Point-to-point links make fault identification and fault isolation easy.
v.Expansion and modification in topology can be done without disturbing nodes.
Disadvantages
i.Requires more cable than the other LAN topologies (cabling cost is more).
ii.It is suitable for small network.
iii.Installation and reconnection are difficult.
iv.The hardware required to connect each link (I/O ports and cable) is expensive.
3. Tree Topology
A tree topology combines characteristics of linear bus and star topologies. It is a variation of
a star-topology. It consists of groups of star configured workstations connected to a linear bus
backbone cable. This topology allows for the expansion of an existing network.
The signals that are being transmitted by the root node are received by all the nodes at the
same time. This increases the efficiency of the overall functioning of the network. The tree
network topology can be extended easily to function and there are no limitations to how big it
12
DCC (22414) MRS. S.S.KADAM
can be extended. Additional root nodes can be added, and they can be interconnected within
one single network.
Tree has a hierarchy of various hubs, like you have branches in a tree.
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw how in
Physical Star network Topology, computers (nodes) are connected by each other through
central hub. And we also saw in Bus Topology, work station devices are connected by the
common cable called Bus. After understanding these two network configurations, we can
understand tree topology better. In Tree Topology, the number of Star networks is connected
using Bus. This main cable seems like a main stem of a tree, and other star networks as the
branches. It is also called Expanded Star Topology. Ethernet protocol is commonly used in
this type of topology. The diagram below will make it clear.
4. Hybrid Topology:
13
DCC (22414) MRS. S.S.KADAM
Hybrid networks use a combination of any two or more topologies, in such a way that the
resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).
For example a tree network connected to a tree network is still a tree network topology. A
hybrid topology is always produced when two different basic network topologies are
connected. Two common examples for Hybrid network are: star ring network and star bus
network
1) Reliable: Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the functioning of rest of the
network.
2) Scalable: It’s easy to increase the size of network by adding new components, without
disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of the
organization and by optimizing the available resources. Special care can be given to nodes
where traffic is high as well as where chances of fault are high.
4) Effective: Hybrid topology is the combination of two or more topologies, so we can
design it in such a way that strengths of constituent topologies are maximized while there
weaknesses are neutralized. For example we saw Ring Topology has good data reliability
(achieved by use of tokens) and Star topology has high tolerance capability (as each node is
not directly connected to other but through central device), so these two can be used
effectively in hybrid star-ring topology.
1) Complexity of Design: One of the biggest drawbacks of hybrid topology is its design. Its
not easy to design this type of architecture and it’s a tough job for designers. Configuration
and installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These
hubs are different from usual hubs as they need to be intelligent enough to work with
different architectures and should be function even if a part of network is down.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a
lot of cables; cooling systems, sophisticate network devices, etc.
In network, many computers are connected to one another or to the internet. For such
connections, we need to use the connecting devices. These connecting devices are also called
as network control devices. Network control devices can operate on different layers of the
internet model (OSI Reference model). Different network control devices are connector,
transceivers, hubs, switches, repeaters, bridges, routers, modem and gateways.
14
DCC (22414) MRS. S.S.KADAM
1. Repeater:
Advantages
i. It can extend network.
ii. It regenerates desired information.
iii. It is less expensive for expanding network.
Disadvantages
i. It has no filtering capability.
ii. It does not support different network architectures.
iii. It can operate only at the physical layer.
iv. It cannot connect two LAN’s. It connects two segments of the same LAN.
Types of Repeaters
Types of repeaters are as follows:
i. Single port repeater: This repeater has one input and one output. One segment sends
signal to repeater, it boosts and passes to the next signal that is it operates with only two
segments.
ii. Multi-port repeater: This repeater has one input and multiple output ports. One segment
sends signal and another connects to cable segments.
iii. Smart repeater: It is similar to a bridge in functionality. In smart repeater packet filtering
is done. It is a hybrid device.
iv. Optical repeater: The repeater which operates optical signal is called optical repeater.
Today multiport repeater is mostly used, and is called as hub.
15
DCC (22414) MRS. S.S.KADAM
2. Bridge:
i. Simple bridge: The user has to enter the address manually in the table. Simple bridges are
the most primitive and least expensive type of bridge.
Whenever, a new station is added, the table must be modified. If station is removed, its
address must be deleted from the table. It links only two segments (LAN).
iii. Transparent bridge: The Bridge builds its table of station address on its own as it
performs its bridge function, and it is also called learning bridge. Transparent bridge is
invisible for the devices on the network. It performs the function of blocking or forwarding
data based on MAC address. At the time of installation, table of transparent bridge is empty.
It uses the source address in packet to build a table. It checks address in memory to determine
where to send the data. Filtering frames, forwarding and blocking these are the duties of
transparent bridge.
iv. Translation bridge: It connects network segment running at different speed or using
different protocols, such as token ring and Ethernet network. This bridge takes data link layer
16
DCC (22414) MRS. S.S.KADAM
frame off the packets to be relayed to other segment and packages them in new frame for
transmitting.
v. Source route bridge: In source Route Bridge, sending station defines the bridges that
should be visited by the frames. In frame the address of these bridges are saved. So frame
contains different addresses like source and destination, and bridge address.
Advantages
Disadvantages
3. Switch:
17
DCC (22414) MRS. S.S.KADAM
Types of switch
There are two types of switch:
i. Store-and-forward switch: It stores the frame in the input buffer until the whole packet
has arrived. This packet is stored in the buffer. Then switch takes the decision about
destination machine with the help of switching table. Then the packet is forwarded towards
the appropriate destination.
ii. Cut-through switch: It forwards the packet to the output buffer as soon as the destination
address is received.
Switches may operate at one or more layers of the OSI model, including the data link and
network layers. A device that operates simultaneously at more than one of these layers is
known as a multilayer switch. In switches intended for commercial use, built-in or modular
interfaces make it possible to connect different types of networks, including Ethernet, Fiber
Channel, ATM, ITU-TG.hn and 802.11. This connectivity can be at any of the layers
mentioned. While layer-2 functionality is adequate for bandwidth-shifting within one
technology, interconnecting technologies such as Ethernet and token ring is easier at layer 3.
Devices that interconnect at layer 3 are traditionally called routers, so layer-3 switches can
also be regarded as (relatively primitive) routers.
Where there is a need for a great deal of analysis of network performance and security,
switches may be connected between WAN routers as places for analytic modules. Some
vendors provide firewall, network intrusion detection,[7] and performance analysis modules
that can plug into switch ports. Some of these functions may be on combined modules.[8]
In other cases, the switch is used to create a mirror image of data that can go to an external
device. Since most switch port mirroring provides only one mirrored stream, network
hubs can be useful for fanning out data to several read-only analyzers, such as intrusion
detection systems and packet sniffers.
4. Router:
18
DCC (22414) MRS. S.S.KADAM
Routers are small physical devices that join multiple networks together. Router operates at
the network layer of the OSI model. Home networks typically use a wireless or wired Internet
Protocol (IP) router, IP being the most common OSI network layer protocol. An IP router
such as a DSL or cable modem broadband router joins the home's local area network
(LAN) to the wide-area network (WAN) of the Internet.
Router is an efficient device which performs the task of delivering and forwarding
information. When computer on one network wants to transmit data to a computer on another
network, the computer sends its packet to a router, which then forwards them to destination
network. Router forwards a packet based on the destination address in the network layer
protocol header. Each router consists of routing table, which determines the best way for the
data to reach the destination. Routers use the software configured network address (IP
address) to make a decision. To find out the shortest path, router used some routing
algorithms. These routing algorithms determine the routing decisions, i.e., how to forward a
packet on to its next journey.
Types of router
i. Static router: It can manually set up and configure all routes. This router uses the same
route determined by a routing entry. Static router is more secure because the administrator
specifies each route. An administrator is required to maintain the routing table and the router.
Static router can work well for small inter networks, but do not scale well for large or
dynamically changing inter network due to their manual administrator.
ii. Dynamic router: It manually configures the first route. It automatically detects additional
networks and routers. Dynamic routing consists of routing tables that are built and maintained
automatically through an ongoing communication between routers. This communication is
facilitated by a routing protocol, a series of periodic or on-demand messages containing
routing information that is exchanged between routers.
In dynamic router, security can be improved by manually configuring the router. An
administrator is required to maintain the router.
Advantages
i. Router can connect dissimilar LANs and WANs running at different transmission speeds.
ii. Routers are used to interconnect network.
iii. It is a multiport device, i.e., router with multiple slots that can hold different cable and
other devices.
Disadvantages
i. Routers are slower than other devices because of decision making.
ii. They do not have ability to stop broadcast packets from being forwarded to other
networks.
19
DCC (22414) MRS. S.S.KADAM
5. Gateway:
Gateway is a network device which connects two dissimilar networks. It is a network point
that acts as an entrance to another network. A gateway is required to convert data packets
from one protocol format to another, format. It operates on all seven layers of OSI reference
model. Gateways are application specific interfaces that link all seven layers of the OSI
model. They are dissimilar at any or all levels.
The term gateway is applied to any device, system or software applications that can perform
the function of translating data from one format to another. A gateway not only has the ability
to translate between different frame formats but also between different protocols.
The gateway works with protocols used by each network connected to a router. It can
translate from one to the other. Gateway must take care of differing frame sizes, data rates,
formats, acknowledgement schemes, priority schemes, etc. That means the task of the
gateway is very tough. A gateway is a very powerful device as compared to a bridge or a
router. It is typically used to connect huge and incompatible networks.
Example:
i. If network A is a token ring network using TCP/IP and network B is a Novell network, a
gateway can relay frames between the two.
ii. Many companies use an e-mail system such as Microsoft exchange or Novell group wise.
These systems transmit mail internally in a certain format. When an e-mail is sent across the
internet to users using a different e-mail system, the e-mail must be converted to another
format, usually to Simple Mail Transfer Protocol (SMTP). This conversion is performed by
software gateway.
Advantage:
20
DCC (22414) MRS. S.S.KADAM
6. Modem:
A modem is a network device that both modulates and demodulates analog carrier signals
(called sine waves) for encoding and decoding digital information for processing. Modems
accomplish both of these tasks simultaneously and, for this reason, the term modem is a
combination of "modulate" and "demodulate."
A modem modulates outgoing digital signals from a computer or other digital device to
analog signals for a conventional copper twisted pair telephone line and demodulates the
incoming analog signal and converts it to a digital signal for the digital device.
Modems are available both as internal modem and external modem. Internal modems are
installed in the computer’s expansion slot or in the motherboard circuit. External modem is a
small box that is connected to a computer by a RS-232 cable. RS-232 cable is used to connect
a PC to its modem. Twisted pair wires and RJ-45 connectors are used to connect two
modems.
Functions of Modem
i. Converts the binary data into analog signal at sending side and converts the analog signal
into binary data at the receiving side.
ii. Takes the data from the RS-232 interface.
iii. Send dialing signals.
iv. Performs line control and signaling to the other end of phone line.
21
DCC (22414) MRS. S.S.KADAM
22