Computer Networks and Network Components Lecture
Computer Networks and Network Components Lecture
Network Components
Gil Nicholas Cagande
Network Components
Differenc
e
What is Computer Networks?
A computer network consists of a collection of computers, printers
and other equipment that is connected together so that they can
communicate with each other.
Advantages Disadvantages
Cut-through—In a cut-through configuration, the switch begins to forward the packet as soon as it is received. No error
checking is performed on the packet, so the packet is moved through quickly. The downside of cut-through is that because the
integrity of the packet is not checked, the switch can propagate errors.
Store-and-forward—In a store-and-forward configuration, the switch waits to receive the entire packet before beginning to
forward it. It also performs basic error checking.
Fragment-free—Building on the speed advantages of cut-through switching, fragment-free switching works by reading only
the part of the packet that enables it to dentify fragments of a transmission.
BRIDGES - are networking devices that
connect networks. Sometimes it is necessary to
divide networks into subnets to reduce the
amount of traffic on each larger subnet or for
security reasons. Once divided, the bridge
connects the two subnets and manages the
traffic flow betweenthem. Today, network
switches have largely replaced bridges.
How Bridges Works?
Types Of Bridges
Transparent bridge—A transparent bridge is invisible
to the other devices on the network.
Translational bridge—A translational bridge can
convert from one networking system to another. As
you might have guessed, it translates the data it
receives.
Source-route bridge—Source-route bridges were
designed by IBM for use on Token Ring networks. The
source-route bridge derives its name from the fact that
the entire route of the frame is embedded within the
frame.
ROUTERS - are an increasingly common
sight in any network environment, from a small
home office that uses one to connect to an
Internet service provider (ISP) to a corporate IT
environment where racks of routers manage data
communication with disparate remote sites.
Routers make internetworking possible, and in
view of this, they warrant detailed attention.
Function of A
Router
Two Types of Network Protocols
Routable Protocols - Large internetworks need protocols
that allow systems to be identified by the address of the
network to which they are attached and by an address that
uniquely identifies them on that network. Network protocols
that provide both of these features are said to be routable.
Three routable LAN network protocols are used today:
Transmission Control Protocol/Internet Protocol
(TCP/IP)
Internetwork Packet Exchange/Sequenced Packet
Exchange (IPX/SPX)
AppleTalk
Routing Protocols - are the means by which
routers communicate with each other. This
communication is necessary so that routers can
learn the network topology and changes that
occuring it.
The two types of routing protocols
Distance-Vector Protocols
Link-State Protocols
Brouters - A brouter is a device that can route
traffic that can be routed and bridge anything
that cannot be routed. As bridges have been
replaced by the more flexible routers, brouters
have also fallen out of favor. In today’s
networking world, routers rule. Just ask Cisco.
GATEWAYS - gateway is applied to
any device, system, or software application that
can perform the function of translating data from
one format to another. The key feature of a
gateway is that it converts the format of the
data, not the data itself.
How Gateway works?
CSUs/DSUs - Channel Service
Unit/Data Service Unit (CSU/DSU) acts as a
translator between the LAN data format and the
WAN data format. Such a conversion is
necessary because the technologies used on
WAN links are different from those used on
LANs.
How CSU/DSU used in a Network?
MODEM - is a contraction of the terms
modulator and demodulator. Modems perform a
simple function: They translate digital signals
from a computer into analog signals that can
travel across conventional phone lines. The
modem modulates the signal at the sending end
and demodulates at the receiving end.
Commonly Used AT Modem
Commands
ATA Answers an incoming call
Activity light—This LED indicates network activity. Under normal conditions, the light should flicker
sporadically and often. Constant flickering may indicate a very busy network or a problem somewhere
on the network that is worth investigating.
Speed light—This LED indicates that the interface is connected at a certain speed. This feature is
normally found on Ethernet NICs that operate at 10Mbps/100Mbp— and then only on certain cards
ISDN Terminal Adapters When the
speed provided by a modem just isn’t enough,
you must seek alternatives. One of the speedier
options available is an ISDN link. ISDN is a
digital communication method that can be used
over a conventional phone line, although certain
criteria must be met for an ISDN line to be
available (such as the availability of the service
and the proximity of your location to the telco’s
site).
Wireless Access Point (WAP)
- referred to as either WAPs or wireless APs,
are a transmitter and receiver (transceiver)
device used for wireless LAN (WLAN) radio
signals. A WAP is typically a separate network
device with a built-in antenna, transmitter, and
adapter. WAPs use the wireless infrastructure
network mode to provide a connection point
between WLANs and a wired Ethernet LAN.
WAPs connect WLANs and a
wired Ethernet LAN.
An infrastructure wireless
network uses a WAP.
Transceivers - does not necessarily
describe a separate network device but rather an
integrated technology embedded in devices such
as network cards. In a network environment, a
transceiver gets its name from being both a
transmitter and a receiver of signals, such as
analog or digital.
is responsible to place signals onto the network
media and also detecting incoming signals
traveling through the same cable.
Firewalls - is a networking device,
either hardware or software based, that controls
access to your organization’s network. This
controlled access is designed to protect data
and resources from outside threat.