PGDCA05 ComputerNetworks
PGDCA05 ComputerNetworks
Chaiman
Prof. (Dr.) Naresh Dadhich
Vice-Chancellor
Vardhaman Mahaveer Open University Kota
Convener / Coordinator Members
Prof. (Dr.) D.S. Chauhan 1. Prof. (Dr.) S.C. Jain
Department of Mathematics Engineering College Ajmer
University of Rajasthan Jaipur
2. Prof. (Dr.) M.C. Govil
Member Secretary / Coordinator M.N.I.T. Jaipur
Sh. Rakesh Sharma
Assistant Professor (Computer Application) 3. Dr. (Mrs.) Madhavi Sinha
V.M. Open University Kota A.I.M. & A.C.T. Jaipur
Editing and Course Writing
Editor
Sh. Rajeev Srivastava
HOD (Computer Science)
LBS PG College Jaipur
Writers
1. Dr. S.B. Sharma 4. Ms. Poonam Kshatriya
Director, Dau Dayal Vocational Institute Sr. Lecturer (Computer
Science)
Dr. B.R. Ambedkar University Agra A.I.M. & A.C.T. Jaipur
UNIT - IV INTERNET 66 - 75
UNIT - I
COMPUTER NETWORK FUNDAMENTALS
STRUCTURE OF THE UNIT
1.0 Objective
1.1 Introduction
1.2 Definitions
1.3 Applications
1.4 Transmission media
1.4.1 Magnetic Media
1.4.2 Twisted pair
1.4.3 Co-axial cable
1.4.4 Fiber Optics
1.5 Networking essentials
1.5.1 Repeaters
1.5.2 Hubs
1.5.3 Switches
1.5.4 Routers
1.5.5 Gateways
1.5.6 NIC
1.6 Summary
1.7 Glossary
1.8 Further Readings
1.9 Answers to the self learning exercises
1.10 Unit end questions
1.0 OBJECTIVE:
Students who complete this unit should be able to understand the following tasks:
w Evolution of Networking
w Various types of transmission media
w Various types of inter-network connecting devices
1.1 INTRODUCTION
Data networks developed as a result of business applications that were written for
microcomputers. The microcomputers were not connected so there was no efficient way to
share data among them. It was not efficient or cost-effective for businesses to use floppy
disks to share data known as Sneaker net. Sneaker net created multiple copies of the data.
Each time a file was modified it would have to be shared again with all other people who
needed that file. If two people modified the file and then tried to share it, one of the sets of
changes would be lost. Businesses needed a solution that would successfully address the
following three problems:
UNIT - I COMPUTER NETWORK FUNDAMENTALS 2
Enterprise Management
Enterprise management solutions generally do more than optimize infrastructure, availability
and performance. Companies provide solutions that put you in control and allow you to
focus on improving your business’ efficiency and increasing customer satisfaction. This
allows you a greater (ROI) return on investment.
Network Systems
In today’s challenging economic environment, IT managers increasingly have to do more
with constrained resources. For the enterprise network manager, this means looking for
smarter ways to use the network while managing the demands of users, applications and
limited budgets. Companies offer a unique blend of practical and innovative technologies
and way of combining them that provides you with high-value, leading-edge solutions
designed for the realities of business and the Internet.
1.4 TRANSMISSION MEDIA
Whatever type of network is used, some type of network media is needed to carry signals
between computers. Two types of media are used in networks: cable-based media, such as
twisted pair, and the media types associated with wireless networking, such as radio waves,
microwaves and Infrared waves.
In networks using cable-based media, there are three basic choices:
w Twisted pair
w Coaxial
w Fiber-optic
Twisted-pair and coaxial cables both use copper wire to conduct the signals electronically;
fiber-optic cable uses a glass or plastic conductor and transmits the signals as light.
For many years, coaxial was the cable of choice for most LANs. Today, however (and for
the past 10 years), twisted pair has proved to be far and away the cable media of choice,
thus retiring coax to the confines of storage closets. Fiber-optic cable has also seen its
popularity rise but because of cost has been primarily restricted to use as a network back-
bone where segment length and higher speeds are needed. That said, fiber is now increas-
ingly common in server room environments as a server to switch connection method, and
in building to building connections in what are termed as metropolitan area networks
(MANs).
Copper cable is used in almost every LAN. Many different types of copper cable are avail-
able. Each type has advantages and disadvantages. Proper selection of cabling is key to
efficient network operation. Since copper uses electrical currents to transmit information,
it is important to understand some basics of electricity.
1.4.1 Magnetic Media
All matter is composed of atoms. The Periodic Table of Elements lists all known types of
atoms and their properties. The atom is comprised of three basic particles:
w Electrons – Particles with a negative charge that orbit the nucleus
w Protons – Particles with a positive charge
w Neutrons – Neutral particles with no charge
UNIT - I COMPUTER NETWORK FUNDAMENTALS 6
The protons and neutrons are combined together in a small group called a nucleus. Atoms,
are groups of atoms called molecules, can be referred to as materials. Materials are classi-
fied into three groups based on how easily free electrons flow through them.
The basis for all electronic devices is the knowledge of how insulators, conductors, and
semiconductors control the flow of electrons and work together. The materials through
which current flows vary in their resistance to the movement of the electrons. The materi-
als that offer very little or no resistance are called conductors. Those materials that do not
allow the current to flow, or severely restrict its flow, are called insulators. The amount of
resistance depends on the chemical composition of the materials.
All materials that conduct electricity have a measure of resistance to the flow of electrons
through them. These materials also have other effects called capacitance and inductance
that relate to the flow of electrons. Impedance includes resistance, capacitance, and induc-
tance and is similar to the concept of resistance.
Attenuation is important in relation to networks. Attenuation refers to the resistance to the
flow of electrons and explains why a signal becomes degraded as it travels along the con-
duit.
Electrical insulators are materials that are most resistant to the flow of electrons through
them. Examples of electrical insulators include plastic, glass, air, dry wood, paper, rubber,
and helium gas. These materials have very stable chemical structures and the electrons are
tightly bound within the atoms.
Electrical conductors are materials that allow electrons to flow through them easily. The
outermost electrons are bound very loosely to the nucleus and are easily freed. At room
temperature, these materials have a large number of free electrons that can provide con-
duction. The introduction of voltage causes the free electrons to move, which results in a
current flow.
Semiconductors are materials that allow the amount of electricity they conduct to be pre-
cisely controlled. Examples include carbon (C), germanium (Ge), and the alloy gallium
arsenide (GaAs). Silicon (Si) is the most important semiconductor because it makes the
best microscopic-sized electronic circuits. Silicon is very common and can be found in
sand, glass, and many types of rocks.
Voltage is sometimes referred to as electromotive force (EMF). EMF is related to an elec-
trical force, or pressure, that occurs when electrons and protons are separated. The force
that is created pushes toward the opposite charge and away from the like charge. This
process occurs in a battery, where chemical action causes electrons to be freed from the
negative terminal of the battery. The electrons then travel to the opposite, or positive,
terminal through an external circuit. The electrons do not travel through the battery. Re-
member that the flow of electricity is really the flow of electrons. Voltage can also be
created in three other ways. The first is by friction, or static electricity. The second way is
by magnetism, or an electric generator. The last way that voltage can be created is by light,
or a solar cell.
The purpose of the physical layer is to transport a raw bit stream from one machine to
another. Various physical media can be used for the actual transmission. Each one has its
own niche in terms of bandwidth, delay, cost, and ease of installation and maintenance.
Media are roughly grouped into guided media, such as copper wire and fiber optics, and
unguided media, such as radio and lasers through the air.
UNIT - I COMPUTER NETWORK FUNDAMENTALS 7
Magnetic media, commonly called as copper wire media, is term referring to the transmis-
sion of audio/video, analog/digital data on a magnetised medium, in form of voltage pulses.
Cables have different specifications and expectations. Important considerations related to
performance are as follows:
w What speeds for data transmission can be achieved? The speed of bit transmission
through the cable is extremely important. The speed of transmission is affected by
the kind of conduit used.
w Will the transmissions be digital or analog? Digital or baseband transmission and
analog or broadband transmission require different types of cable.
w How far can a signal travel before attenuation becomes a concern? If the signal is
degraded, network devices might not be able to receive and interpret the signal.
The distance the signal travels through the cable affects attenuation of the signal.
Degradation is directly related to the distance the signal travels and the type of
cable used.
The following Ethernet specifications relate to cable type:
w 10BASE-T
w 10BASE5
w 10BASE2
10BASE-T refers to the speed of transmission at 10 Mbps. The type of transmission is
baseband, or digitally interpreted. The T stands for twisted pair.
10BASE5 refers to the speed of transmission at 10 Mbps. The type of transmission is
baseband, or digitally interpreted. The 5 indicates that a signal can travel for approxi-
mately 500 meters before attenuation could disrupt the ability of the receiver to interpret
the signal. 10BASE5 is often referred to as Thicknet. Thicknet is a type of network and
10BASE5 is the cable used in that network.
10BASE2 refers to the speed of transmission at 10 Mbps. The type of transmission is
baseband, or digitally interpreted. The 2, in 10BASE2, refers to the approximate maxi-
mum segment length being 200 meters before attenuation could disrupt the ability of the
receiver to appropriately interpret the signal being received. The maximum segment length
is actually 185 meters. 10BASE2 is often referred to as Thinnet. Thinnet is a type of net-
work and 10BASE2 is the cable used in that network.
1.4.2 Twisted Pair
Twisted pair is the ordinary copper wire that connects home and many business computers
to the telephone company. To reduce crosstalk or electromagnetic induction between pairs
of wires, two insulated copper wires are twisted around each other. Each connection on
twisted pair requires both wires. Since some telephone sets or desktop locations require
multiple connections, twisted pair is sometimes installed in two or more pairs, all within a
single cable. For some business locations, twisted pair is enclosed in a shield that func-
tions as a ground. This is known as shielded twisted pair (STP). Ordinary wire to the home
is unshielded twisted pair (UTP).
UNIT - I COMPUTER NETWORK FUNDAMENTALS 8
UTP :
UTP cables are made up of pairs of copper wires twisted together. The twisting serves an
important purpose – it helps to eliminate electromagnetic interference (EMI). EMI is a
common problem on networks using copper wire. Signals from one wire pair might inter-
fere with another (referred to as crosstalk), while powerful external electrical devices may
also impact transmission capabilities. When using UTP cables, a common mistake is to
unravel the twisting too far – this will certainly degrade signal strength and make the wires
more prone to interference.
UTP cable has many advantages. It is easy to install and is less expensive than other types
of networking media. In fact, UTP costs less per meter than any other type of LAN cabling.
However, the real advantage is the size. Since it has such a small external diameter, UTP
does not fill up wiring ducts as rapidly as other types of cable. This can be an extremely
important factor to consider, particularly when a network is installed in an older building.
When UTP cable is installed with an RJ-45 connector, potential sources of network noise
are greatly reduced and a good solid connection is almost guaranteed.
There are some disadvantages of twisted-pair cabling. UTP cable is more prone to electri-
cal noise and interference than other types of networking media, and the distance between
signal boosts is shorter for UTP than it is for coaxial and fiber optic cables. Twisted pair
cabling was once considered slower at transmitting data than other types of cable. This is
no longer true. In fact, today, twisted pair is considered the fastest copper-based media..
The category of the cabling defines how many wire pairs you’ll find in a given cable. Voice
grade cable, also known as Category (or simply ‘Cat’) 3, uses only two pairs and is used
for telephone service and 10Mb Ethernet. Cat 5 wiring, on the other hand, uses 4 wire pairs
and is the minimum required for 100Mb Fast Ethernet. For the most part, buildings today
are usually pre-wired for Cat 5, although Cat 3 may still be found in older environments.
You may also come across what is known as Cat 5E – this version of Cat 5 simply has more
twists per inch of wiring, providing better resistance to EMI and higher transmission capa-
bilities.
UNIT - I COMPUTER NETWORK FUNDAMENTALS 9
STP :
Twisted pair cables are often shielded in attempt to prevent electromagnetic interference
(EMI). Because the shielding is made of metal, it may also serve as a ground. However,
usually a shielded or a screened twisted pair(ScTP) cable has a special grounding wire
added called a drain wire. This shielding can be applied to individual pairs, or to the col-
lection of pairs. When shielding is applied to the collection of pairs, this is referred to as
screening. The shielding must be grounded for the shielding to work.
STP cable combines the techniques of cancellation, shielded, and twisted wires. Each pair
of wires is wrapped in metallic foil. The two pairs of wires are wrapped in an overall
metallic braid or foil. It is usually 150-ohm cable. As specified for use in Token Ring
network installations, STP reduces electrical noise within the cable such as pair to pair
coupling and crosstalk. STP also reduces electronic noise from outside the cable such as
electromagnetic interference (EMI) and radio frequency interference (RFI). STP cable shares
many of the advantages and disadvantages of UTP cable. STP provides more protection
from all types of external interference. However, STP is more expensive and difficult to
install than UTP. A variation of STP, known as ScTP for “screened twisted pair” or FTP for
“foil twisted pair,” uses only the overall shield and provides more protection than UTP, but
not as much as STP.
1.4.3 Coaxial Cable
Coaxial cable (or “coax) is the most common cable used for transmitting video signals.
The name “coaxial” refers to the common axis of the two conductors.
The dielectric is surrounded by foil shield/s and/or copper braid/s which form the outer
conductor and also shield against The outer conductor/shield is encased in a PVC jacket.
Most coaxial cables for video applications have a nominal impedance of 75 ohms. Their
differing electrical and physical characteristics make it important to select the correct type
of cable to suit the application.
UNIT - I COMPUTER NETWORK FUNDAMENTALS 10
Types of Coax :
Coaxial cables that conform to U.S. Government specifications are identified with an RG
designation. The meaning of the individual components of the designation are:
Radio Frequency
Government
Universal specification
R G 8 /U
Coaxial Connectors
BNC connector are bayonet type connectors, commonly used
in CCTV systems. They are the most suitable connector for use
with RG59/U cable. BNC connectors are specified by IEC
standard IEC60169-8. The argument, over what the “BNC” in
“BNC connector” means, will go on forever. It has been variously
defined as: British Navy Connector, Bayonet Node Connector,
Bayonet Nut Coupling, Baby Neil Connector, etc. The two
Amphenol engineers who invented the BNC connector were
named Paul Neil and Carl Concelman. It therefore seems logical
that the “true” meaning of the “BNC” acronym is perhaps
“Bayonet Neil-Concelman”.
F-Type connectors are used for CATV, SATV and Digital TV in
conjunction with either RG6 or RG11 cables. The copper-clad-
steel inner conductor of the cable forms the inner “pin” of the
connector. Although “twist-on” type connectors are available,
they do not produce a reliable connection in comparison to a
crimp-type connector that has been terminated with a good-quality
ratchet crimping tool. F-type connectors are also known as F-81
connectors and are specified by IEC standard IEC60169-24.
F-type connectors are named according to the type of cable or
the application that they have been designed for as shown in the
table below.
UNIT - I COMPUTER NETWORK FUNDAMENTALS 13
that light can take through the fiber, the fiber is called “multimode” fiber. Single-mode
fiber has a much smaller core that only allows light rays to travel along one mode inside
the fiber.
a light ray strikes a reflective surface determines the angle that the ray will reflect off the
surface.
These principles are depicted in the diagram below.
An overview of refraction:
When a light strikes the interface between two transparent materials, the light divides into
two parts. Part of the light ray is reflected back into the first substance, with the angle of
reflection equaling the angle of incidence. The remaining energy in the light ray crosses
the interface and enters into the second substance.
UNIT - I COMPUTER NETWORK FUNDAMENTALS 16
If the incident ray strikes the glass surface at an exact 90-degree angle, the ray goes straight
into the glass. The ray is not bent. However, if the incident ray is not at an exact 90-degree
angle to the surface, then the transmitted ray that enters the glass is bent. The bending of
the entering ray is called refraction. How much the ray is refracted depends on the index of
refraction of the two transparent materials. If the light ray travels from a substance whose
index of refraction is smaller, into a substance where the index of refraction is larger, the
refracted ray is bent towards the normal. If the light ray travels from a substance where the
index of refraction is larger into a substance where the index of refraction is smaller, the
refracted ray is bent away from the normal.
Consider a light ray moving at an angle other than 90 degrees through the boundary be-
tween glass and a diamond. The glass has an index of refraction of about 1.523. The dia-
mond has an index of refraction of about 2.419. Therefore, the ray that continues into the
diamond will be bent towards the normal. When that light ray crosses the boundary be-
tween the diamond and the air at some angle other than 90 degrees, it will be bent away
from the normal. The reason for this is that air has a lower index of refraction, about 1.000
than the index of refraction of the diamond.
Total internal reflection as it relates to optical media
A light ray that is being turned on and off to send data (1s and 0s) into an optical fiber must
stay inside the fiber until it reaches the far end. The ray must not refract into the material
wrapped around the outside of the fiber. The refraction would cause the loss of part of the
light energy of the ray. A design must be achieved for the fiber that will make the outside
surface of the fiber act like a mirror to the light ray moving through the fiber. If any light
ray that tries to move out through the side of the fiber were reflected back into the fiber at
an angle that sends it towards the far end of the fiber, this would be a good “pipe” or “wave
guide” for the light waves.
The laws of reflection and refraction illustrate how to design a fiber that guides the light
waves through the fiber with a minimum energy loss. The following two conditions must
be met for the light rays in a fiber to be reflected back into the fiber without any loss due to
refraction:
w The core of the optical fiber has to have a larger index of refraction (n) than the
material that surrounds it. The material that surrounds the core of the fiber is called
the cladding.
w The angle of incidence of the light ray is greater than the critical angle for the core
and its cladding.
When both of these conditions are met, the entire incident light in the fiber is reflected
back inside the fiber. This is called total internal reflection, which is the foundation upon
which optical fiber is constructed. Total internal reflection causes the light rays in the fiber
to bounce off the core-cladding boundary and continue its journey towards the far end of
the fiber. The light will follow a zigzag path through the core of the fiber.
A fiber that meets the first condition can be easily created. In addition, the angle of inci-
dence of the light rays that enter the core can be controlled. Restricting the following two
factors controls the angle of incidence:
w The numerical aperture of the fiber – The numerical aperture of a core is the
range of angles of incident light rays entering the fiber that will be completely
reflected.
UNIT - I COMPUTER NETWORK FUNDAMENTALS 17
w Modes – The paths which a light ray can follow when traveling down a fiber.
By controlling both conditions, the fiber run will have total internal reflection. This gives
a light wave guide that can be used for data communications.
Self Learning Exercises :
4 Why are pairs of wires twisted together in UTP cable :
(a) twisting of wires makes it less expensive
(b) twisting of wires makes it thinner
(c) twisting of reduces noise problems
(d) makes six pairs fit in space of four pairs
5 Which material is considered electrical semiconductor :
(a) Air (b) Silicon
(c) Glass (d) Gold
6 Which of the following are the parts of fiber optic cable :
(a) Clad (b) Braid
(c) Core (d) All of the above
1.5 NETWORKING ESSENTIALS
1.5.1 Repeaters
A repeater connects two segments of your network cable. It retimes and regenerates the
signals to proper amplitudes and sends them to the other segments. When talking about,
ethernet topology, you are probably talking about using a hub as a repeater. Repeaters
require a small amount of time to regenerate the signal. This can cause a propagation delay
which can affect network communication when there are several repeaters in a row. Many
network architectures limit the number of repeaters that can be used in a row. Repeaters
work only at the physical layer of the OSI network model.
1.5.2 Hubs
Hubs are actually multiport repeaters. The difference between hubs and repeaters is usu-
ally the number of ports that each device provides. A typical repeater usually has two ports.
A hub generally has from 4 to 24 ports. Hubs are most commonly used in Ethernet 10BASE-
T or 100BASE-T networks.
Hubs come in three basic types:
w Passive – A passive hub serves as a physical connection point only. It does not
manipulate or view the traffic that crosses it. It does not boost or clean the signal. A
passive hub is used only to share the physical media. A passive hub does not need
electrical power.
w Active – An active hub must be plugged into an electrical outlet because it needs
power to amplify a signal before it is sent to the other ports.
w Intelligent – Intelligent hubs are sometimes called smart hubs. They function like
active hubs with microprocessor chips and diagnostic capabilities. Intelligent hubs
are more expensive than active hubs. They are also more useful in troubleshooting
situations.
UNIT - I COMPUTER NETWORK FUNDAMENTALS 18
Devices attached to a hub receive all traffic that travels through the hub. If many devices
are attached to the hub, collisions are more likely to occur. A collision occurs when two or
more workstations send data over the network wire at the same time. All data is corrupted
when this occurs. All devices that are connected to the same network segment are mem-
bers of the same collision domain.
Sometimes hubs are called concentrators since they are central connection points for Ethernet
LANs.
1.5.3 Switches
Switches occupy the same place in the network as hubs. Unlike hubs, switches examine
each packet and process it accordingly rather than simply repeating the signal to all ports.
Switches map the Ethernet addresses of the nodes residing on each network segment and
then allow only the necessary traffic to pass through the switch. When a packet is received
by the switch, the switch examines the destination and source hardware addresses and
compares them to a table of network segments and addresses. If the segments are the same,
the packet is dropped (“filtered”); if the segments are different, then the packet is “for-
warded” to the proper segment. Additionally, switches prevent bad or misaligned packets
from spreading by not forwarding them.
Filtering of packets, and the regeneration of forwarded packets enables switching technol-
ogy to split a network into separate collision domains. Regeneration of packets allows for
greater distances and more nodes to be used in the total network design, and dramatically
lowers the overall collision rates. In switched networks, each segment is an independent
collision domain. In shared networks all nodes reside in one, big shared collision domain.
Easy to install, most switches are self learning. They determine the Ethernet addresses in
use on each segment, building a table as packets are passed through the switch. This “plug
and play” element makes switches an attractive alternative to hubs.
Switches can connect different networks types (such as Ethernet and Fast Ethernet) or
networks of the same type. Many switches today offer high-speed links, like Fast Ethernet
or FDDI, that can be used to link the switches together or to give added bandwidth to
important servers that get a lot of traffic. A network composed of a number of switches
linked together via these fast uplinks is called a “collapsed backbone” network.
Dedicating ports on switches to individual nodes is another way to speed access for critical
computers. Servers and power users can take advantage of a full segment for one node, so
some networks connect high traffic nodes to a dedicated switch port.
Full duplex is another method to increase bandwidth to dedicated workstations or servers.
To use full duplex, both network interface cards used in the server or workstation, and the
switch must support full duplex operation. Full duplex doubles the potential bandwidth on
that link, providing 20 Mbps for Ethernet and 200 Mbps for Fast Ethernet.
Bridge
A bridge reads the outermost section of data on the data packet, to tell where the message
is going. It reduces the traffic on other network segments, since it does not send all packets.
Bridges can be programmed to reject packets from particular networks. Bridging occurs at
the data link layer of the OSI model, which means the bridge cannot read IP addresses, but
only the outermost hardware address of the packet. In our case the bridge can read the
ethernet data which gives the hardware address of the destination address, not the IP ad-
UNIT - I COMPUTER NETWORK FUNDAMENTALS 19
dress. Bridges forward all broadcast messages. Only a special bridge called a translation
bridge will allow two networks of different architectures to be connected. Bridges do not
normally allow connection of networks with different architectures. The hardware address
is also called the MAC (media access control) address. To determine the network segment
a MAC address belongs to, bridges use one of:
w Transparent Bridging - They build a table of addresses (bridging table) as they
receive packets. If the address is not in the bridging table, the packet is forwarded
to all segments other than the one it came from. This type of bridge is used on
Ethernet networks.
w Source route bridging - The source computer provides path information inside
the packet. This is used on Token Ring networks.
1.5.4 Router
A router is used to route data packets between two networks. It reads the information in
each packet to tell where it is going. If it is destined for an immediate network it has access
to, it will strip the outer packet, readdress the packet to the proper Ethernet address, and
transmit it on that network. If it is destined for another network and must be sent to another
router, it will re-package the outer packet to be received by the next router and send it to
the next router. The section on routing explains the theory behind this and how routing
tables are used to help determine packet destinations. Routing occurs at the network layer
of the OSI model. They can connect networks with different architectures such as Token
Ring and Ethernet. Although they can transform information at the data link level, routers
cannot transform information from one data format such as TCP/IP to another such as IPX/
SPX. Routers do not send broadcast packets or corrupted packets. If the routing table does
not indicate the proper address of a packet, the packet is discarded.
There is a device called a brouter which will function similar to a bridge for network
transport protocols that are not routable, and will function as a router for routable proto-
cols. It functions at the network and data link layers of the OSI network model.
1.5.5 Gateways
A gateway can translate information between different network data formats or network
architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can
communicate with Apple brand computers. Most gateways operate at the application layer,
but can operate at the network or session layer of the OSI model. Gateways will start at the
lower level and strip information until it gets to the required level and repackage the infor-
mation and work its way back toward the hardware layer of the OSI model. To confuse
issues, when talking about a router that is used to interface to another network, the word
gateway is often used. This does not mean the routing machine is a gateway as defined
here, although it could be.
1.5.6 NIC (Network interface Card)
Each network card, called a network interface card (NIC) has a built in hardware address
programmed by its manufacturer. This is a 48 bit address and should be unique for each
card. This address is called a media access control (MAC) address.
Network Interface Cards, commonly referred to as NICs, are used to connect a PC to a
network. The NIC provides a physical connection between the networking cable and the
computer’s internal bus. Different computers have different bus architectures. PCI bus
UNIT - I COMPUTER NETWORK FUNDAMENTALS 20
slots are most commonly found on 486/Pentium PCs and ISA expansion slots are com-
monly found on 386 and older PCs. NICs come in three basic varieties: 8-bit, 16-bit, and
32-bit. The larger the number of bits that can be transferred to the NIC, the faster the NIC
can transfer data to the network cable. Most NICs are designed for a particular type of
network, protocol, and medium, though some can serve multiple networks.
Many NIC adapters comply with plug-and-play specifications. On these systems, NICs are
automatically configured without user intervention, while on non-plug-and-play systems,
configuration is done manually through a set-up program and/or DIP switches.
Cards are available to support almost all networking standards. Fast Ethernet NICs are
often 10/100 capable, and will automatically set to the appropriate speed. Gigabit Ethernet
NICs are 10/100/1000 capable with auto negotiation depending on the user’s Ethernet
speed. Full duplex networking is another option where a dedicated connection to a switch
allows a NIC to operate at twice the speed.
Self learning exercises:
7 What is the function of router?
(a) It routes traffic from one LAN segment to another
(b) It regenerates the data
(c) It transforms the data from one format to another
(d) None of the above
8 What is multiport repeater called as?
(a) Hub (b) Switch
(c) Router (d) Gateway
9 What is the Gateway?
(a) It is used to connect two totally dissimilar networks
(b) It regenerates and retransmits signals from one network to another
(c) It acts as a bridge between two networks
(d) It is used to change the format of the message
1.6 SUMMARY
Computer networks developed in response to business and government computing needs.
Applying standards to network functions provided a set of guidelines for creating network
hardware and software and provided compatibility among equipment from different com-
panies. Information could move within a company and from one business to another.
Network devices, such as repeaters, hubs, bridges, switches and routers connect host de-
vices together to allow them to communicate. Protocols provide a set of rules for commu-
nication.
The amount of information that can flow through a network connection in a given period
of time is referred to as bandwidth. Network bandwidth is typically measured in thousands
of bits per second (kbps), millions of bits per second (Mbps), billions of bits per second
(Gbps) and trillions of bits per second (Tbps). The theoretical bandwidth of a network is an
important consideration in network design. If the theoretical bandwidth of a network con-
nection is known, the formula T=S/BW (transfer time = size of file / bandwidth) can be
UNIT - I COMPUTER NETWORK FUNDAMENTALS 21
used to calculate potential data transfer time. However the actual bandwidth, referred to as
throughput, is affected by multiple factors such as network devices and topology being
used, type of data, number of users, hardware and power conditions.
Intranets are only available to users who have access privileges to the internal network of
an organization. Extranets are designed to deliver applications and services that are Intranet
based to external users or enterprises.
1.7 GLOSSARY
w Attenuation - signal loss due to impedance
w Backbone - Main cable used to connect computers on a network.
w Bandwidth - Indicates the amount of data that can be sent in a
time period. Measured in Mbps which is one mil-
lion bits per second.
w Baseband - Data bits are defined by discrete signal changes.
w Bridge - Read the outermost section of data on the data packet,
to tell where the message is going. It reduces the
traffic on other network segments, since it does not
send all packets but only sends packets intended for
that segment they are attached to.
w Broadband - Uses analog signals to divide the cable into several
channels with each channel at its own frequency.
Each channel can only transmit one direction.
w Broadcast - A transmission to all interface cards on the network.
w Brouter - Will function similar to a bridge for network trans-
port protocols that are not routable, and will func-
tion as a router for routable protocols.
w EMI - Interference by electromagnetic signals that can cause
interference) reduced data integrity (electromagnetic and
increased error rates on transmission channels.
w Media - The hardware method used to connect computers
over a network. The three main types are copper
cable, fiber optic cable, and wireless.
w Protocol - A set of standards sets of standards that define all
operations within a network. There are various pro-
tocols that operate at various levels of the OSI net-
work model such as transport protocols include TCP,
SPX.
w Repeater - Used on a network to regenerate signals to be sent
over long distances or tie computers together on a
network.
w Router - Routes data packets between two networks. It reads
the information in each packet to tell where it is go-
ing.
w Thicknet - Half inch rigid cable. Maximum cable length is 500
meters. Transmission speed is 10Mbps. Expensive
and is not commonly used. (RG-11 or RG-8).
UNIT - I COMPUTER NETWORK FUNDAMENTALS 22