FIT Notes Unit 4
FIT Notes Unit 4
Communication System
Source
• The source is the location from which the sender sends the physical message.
• It could be a voice, pictures, text, video, or something else.
• The communication system assumes full responsibility after the sender has sent or
provided the message or information.
• The communication system should now deliver those messages to their intended
recipient.
Receiver
• A receiver is a device or circuit that receives the signal after it has travelled a long
distance through the channel.
• A receiver’s input signal can take any form, such as an electrical, optical, or
electromagnetic wave.
• However, the receiver only outputs electrical signals.
• A receiver’s functions are to receive the signal, remove noise or distortion,
demodulate if necessary, convert, and amplify.
Transducer of Output
• The electrical signal is converted by the output transducer into the actual message or
information in the form of a physical quantity.
• The speaker, for example, converts an electrical signal into sound.
• As a result, the receiver at the destination station can hear what the sender at the
source station is saying.
Destination
• The destination is the point at which the communication system comes to an end and
the receiver receives the actual message or information.
Amplifier
• The electronic circuit or device that increases the amplitude or the strength of the
transmitted signal is called an amplifier.
• When the signal strength becomes less than the required value, amplification can be
done anywhere between the transmitter and receiver.
• A DC power source will be provided for the amplification.
Modulator
• As the original message signal cannot be transmitted over a large distance because of
their low frequency and amplitude, they are superimposed with high frequency and
amplitude waves called carrier waves.
• This phenomenon of superimposing of message signals with a carrier wave is called
modulation, and the resultant wave is a modulated wave which is to be transmitted.
• There are different types of modulation:-
a) Amplitude Modulation (AM)
b) Frequency Modulation (FM)
c) Phase Modulation (PM)
Noise
• Noise is one of the channel imperfections or impairments in the received signal at the
destination.
• There are external and internal sources that cause noise.
• External sources include interference, i.e. interference from nearby transmitted signals
(cross talk), interference generated by a natural source such as lightning, solar or
cosmic radiation, automobile-generated radiation, etc.
• The external noise can be minimised and eliminated by the appropriate design of the
channel and shielding of cables. Also, by digital transmission, external noise can be
minimised.
• Internal sources include noise due to random motion and collision of electrons in the
conductors and thermal noise due to diffusion and recombination of charge carriers in
other electronic devices.
• Internal noise can be minimised by cooling and using digital technology for
transmission.
Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)
Transmission mode means transferring data between two devices. It is also known as a
communication mode. Buses and networks are designed to allow communication to occur
between individual devices that are interconnected.
There are three types of transmission mode:-
1. Simplex Mode –
Advantages:
Disadvantages:
2. Half-Duplex Mode –
• In half-duplex mode, each station can both transmit and receive, but not at the
same time.
• When one device is sending, the other can only receive, and vice versa.
• The half-duplex mode is used in cases where there is no need for communication
in both directions at the same time.
• The entire capacity of the channel can be utilized for each direction.
• Example: Walkie-talkie in which message is sent one at a time and messages are
sent in both directions.
Advantages:
• Half-duplex mode is less reliable than Full-Duplex mode, as both devices cannot
transmit at the same time.
• There is a delay between transmission and reception, which can cause problems in
some applications.
• There is a need for coordination between the transmitting and receiving devices,
which can complicate the communication process.
3. Full-Duplex Mode –
a) Either the link must contain two physically separate transmission paths, one for
sending and the other for receiving.
b) Or the capacity is divided between signals traveling in both directions.
• Full-duplex mode is used when communication in both directions is required all the
time. The capacity of the channel, however, must be divided between the two
directions.
• Example: Telephone Network in which there is communication between two
persons by a telephone line, through which both can talk and listen at the same
time.
Advantages:
Disadvantages:
1. Narrow Band
2. Voice Band
3. Broad Band
• Broad band is ideal for very high speed data transmission where the minimum data
transmission speed can be 1Mbps (Mega bits per second) and reach up to a few giga
bits per second.
• This band is used in data transmission through coaxial cable and optical fiber cable.
Beside these, board band is also used in satellite and microwave communication.
• Transmission media is a communication channel that carries the information from the
sender to the receiver. Data is transmitted through the electromagnetic signals.
• The main functionality of the transmission media is to carry the information in the
form of bits through LAN(Local Area Network).
• It is a physical path between transmitter and receiver in data communication.
• In a copper-based network, the bits in the form of electrical signals.
• In a fibre based network, the bits in the form of light pulses.
Classification Of Transmission Media:
Guided Media
• It is defined as the physical medium through which the signals are transmitted. It is
also known as Bounded media.
1. Twisted pair:
• Twisted pair is a physical media made up of a pair of cables twisted with each other.
• A twisted pair cable is cheap as compared to other transmission media. Installation
of the twisted pair cable is easy, and it is a lightweight cable.
• The frequency range for twisted pair cable is from 0 to 3.5KHz.
• A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
• The degree of reduction in noise interference is determined by the number of turns
per foot. Increasing the number of turns per foot decreases noise interference.
i. Category 1: Category 1 is used for telephone lines that have low-speed data.
ii. Category 2: It can support upto 4Mbps.
iii. Category 3: It can support upto 16Mbps.
iv. Category 4: It can support upto 20Mbps. Therefore, it can be used for long-distance
communication.
v. Category 5: It can support upto 200Mbps.
• It is cheap.
• Installation of the unshielded twisted pair is easy.
• It can be used for high-speed LAN.
Disadvantage:
• This cable can only be used for shorter distances because of attenuation.
• A shielded twisted pair is a cable that contains the mesh surrounding the wire that
allows the higher transmission rate.
i. The cost of the shielded twisted pair cable is not very high and not very low.
ii. An installation of STP is easy.
iii. It has higher capacity as compared to unshielded twisted pair cable.
iv. It has a higher attenuation.
v. It is shielded that provides the higher data transmission rate.
Disadvantages
2. Coaxial Cable
• Coaxial cable is very commonly used transmission media, for example, TV wire is
usually a coaxial cable.
• The name of the cable is coaxial as it contains two conductors parallel to each other.
• It has a higher frequency as compared to Twisted pair cable.
• The inner conductor of the coaxial cable is made up of copper, and the outer
conductor is made up of copper mesh. The middle core is made up of non-
conductive cover that separates the inner conductor from the outer conductor.
• The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI(Electromagnetic interference).
Coaxial cable is of two types:
3. Fibre Optic
• Fibre optic cable is a cable that uses electrical signals for communication.
• Fibre optic is a cable that holds the optical fibres coated in plastic that are used to
send the data by pulses of light.
• The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
• Fibre optics provide faster data transmission than copper wires.
• Core: The optical fibre consists of a narrow strand of glass or plastic known as a
core. A core is a light transmission area of the fibre. The more the area of the core,
the more light will be transmitted into the fibre.
• Cladding: The concentric layer of glass is known as cladding. The main
functionality of the cladding is to provide the lower refractive index at the core
interface as to cause the reflection within the core so that the light waves are
transmitted through the fibre.
• Jacket: The protective coating consisting of plastic is known as a jacket. The main
purpose of a jacket is to preserve the fibre strength, absorb shock and extra fibre
protection.
i. Greater Bandwidth: The fibre optic cable provides more bandwidth as compared
copper. Therefore, the fibre optic carries more data as compared to copper cable.
ii. Faster speed: Fibre optic cable carries the data in the form of light. This allows the
fibre optic cable to carry the signals at a higher speed.
iii. Longer distances: The fibre optic cable carries the data at a longer distance as
compared to copper cable.
iv. Better reliability: The fibre optic cable is more reliable than the copper cable as it
is immune to any temperature changes while it can cause obstruct in the
connectivity of copper cable.
v. Thinner and Sturdier: Fibre optic cable is thinner and lighter in weight so it can
withstand more pull pressure than copper cable.
UnGuided Transmission
1. Radio waves
• Radio waves are the electromagnetic waves that are transmitted in all the directions
of free space.
• Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
• The range in frequencies of radio waves is from 3Khz to 1 khz.
• In the case of radio waves, the sending and receiving antenna are not aligned, i.e.,
the wave sent by the sending antenna can be received by any receiving antenna.
• An example of the radio wave is FM radio.
• A Radio wave is useful for multicasting when there is one sender and many
receivers.
• An FM radio, television, cordless phones are examples of a radio wave.
• Radio transmission is mainly used for wide area networks and mobile cellular
phones.
• Radio waves cover a large area, and they can penetrate the walls.
• Radio transmission provides a higher transmission rate.
2. Microwaves:
Characteristics of Microwave:
• Frequency range: The frequency range of terrestrial microwave is from 4-6 GHz to
21-23 GHz.
• Bandwidth: It supports the bandwidth from 1 to 10 Mbps.
• Short distance: It is inexpensive for short distance.
• Long distance: It is expensive as it requires a higher tower for a longer distance.
• Attenuation: Attenuation means loss of signal. It is affected by environmental
conditions and antenna size.
Advantages Of Microwave:
• A satellite is a physical object that revolves around the earth at a known height.
• Satellite communication is more reliable nowadays as it offers more flexibility than
cable and fibre optic systems.
• We can communicate with any point on the globe by using satellite communication.
• The satellite accepts the signal that is transmitted from the earth station, and it
amplifies the signal. The amplified signal is retransmitted to another earth station.
• The coverage area of a satellite microwave is more than the terrestrial microwave.
• The transmission cost of the satellite is independent of the distance from the centre
of the coverage area.
• Satellite communication is used in mobile and wireless communication applications.
• It is easy to install.
• It is used in a wide variety of applications such as weather forecasting, radio/TV
signal broadcasting, mobile communication, etc.
• Satellite designing and development requires more time and higher cost.
• The Satellite needs to be monitored and controlled on regular periods so that it
remains in orbit.
• The life of the satellite is about 12-15 years. Due to this reason, another launch of
the satellite has to be planned before it becomes non-functional.
3. Infrared
• It supports high bandwidth, and hence the data rate will be very high.
• Infrared waves cannot penetrate the walls. Therefore, the infrared communication in
one room cannot be interrupted by the nearby rooms.
• An infrared communication provides better security with minimum interference.
• Infrared communication is unreliable outside the building because the sun rays will
interfere with the infrared waves.
Network Topologies
Topology defines the structure of the network of how all the components are interconnected
to each other. There are two types of topology: physical and logical topology.
1. Bus Topology
• The bus topology is designed in such a way that all the stations are connected
through a single cable known as a backbone cable.
• Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
• When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether
it has been addressed or not.
• The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
• The configuration of a bus topology is quite simpler as compared to other
topologies.
• The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
• The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).
• Low-cost cable: In bus topology, nodes are directly connected to the cable without
passing through a hub. Therefore, the initial cost of installation is low.
• Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based
networks that support upto 10 Mbps.
• Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily
available.
• Limited failure: A failure in one node will not have any effect on other nodes.
• Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
• Difficult troubleshooting: It requires specialized test equipment to determine the cable
faults. If any fault occurs in the cable, then it would disrupt the communication for all
the nodes.
• Signal interference: If two nodes send the messages simultaneously, then the signals
of both the nodes collide with each other.
• Reconfiguration difficult: Adding new devices to the network would slow down the
network.
• Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters
are used to regenerate the signal.
2. Ring Topology
• Network Management: Faulty devices can be removed from the network without
bringing the network down.
• Product availability: Many hardware and software tools for network operation and
monitoring are available.
• Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the
installation cost is very low.
• Reliable: It is a more reliable network because the communication system is not
dependent on the single host computer.
• The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
• Hubs or Switches are mainly used as connection devices in a physical star topology.
• A Central point of failure: If the central hub or switch goes down, then all the
connected nodes will not be able to communicate with each other.
4. Tree topology
• Tree topology combines the characteristics of bus topology and star topology.
• A tree topology is a type of structure in which all the computers are connected with
each other in hierarchical fashion.
• The top-most node in tree topology is known as a root node, and all other nodes are
the descendants of the root node.
• There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
Advantages of Tree topology:
o Easily expandable: We can add the new device to the existing network. Therefore,
we can say that tree topology is easily expandable.
o Easily manageable: In tree topology, the whole network is divided into segments
known as star networks which can be easily managed and maintained.
o Error detection: Error detection and error correction are very easy in a tree topology.
o Limited failure: The breakdown in one station does not affect the entire network.
• Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
• High cost: Devices required for broadband transmission are very costly.
• Failure: A tree topology mainly relies on main bus cable and failure in main bus cable
will damage the overall network.
• Reconfiguration difficult: If new devices are added, then it becomes difficult to
reconfigure.
5. Mesh topology
• Reliable: The mesh topology networks are very reliable as if any link breakdown will
not affect the communication between connected computers.
• Fast Communication: Communication is very fast between the nodes.
• Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
• Cost: A mesh topology contains a large number of connected devices such as a router
and more transmission media than other topologies.
• Management: Mesh topology networks are very large and very difficult to maintain
and manage. If the network is not monitored carefully, then the communication link
failure goes undetected.
• Efficiency: In this topology, redundant connections are high that reduces the
efficiency of the network.
6. Hybrid Topology
• Reliable: If a fault occurs in any part of the network will not affect the functioning of
the rest of the network.
• Scalable: Size of the network can be easily expanded by adding new devices without
affecting the functionality of the existing network.
• Flexible: This topology is very flexible as it can be designed according to the
requirements of the organization.
• Effective: Hybrid topology is very effective as it can be designed in such a way that
the strength of the network is maximized and weakness of the network is minimized.
• Complex design: The major drawback of the Hybrid topology is the design of the
Hybrid network. It is very difficult to design the architecture of the Hybrid network.
• Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs
are different from usual Hubs used in other topologies.
• Costly infrastructure: The infrastructure cost is very high as a hybrid network
requires a lot of cabling, network devices, etc.
Types of Network
• CAN is bigger than a LAN but smaller than a MAN. This is a type of computer
network that is usually used in places like a school or colleges.
• This network covers a limited geographical area that is, it spreads across several
buildings within the campus.
• CAN mainly use Ethernet technology with a range from 1km to 5km.
• Its transmission speed is very high with a moderate maintenance cost and moderate
cost.
• Examples of CAN are networks that cover schools, colleges, buildings, etc.
Intranet is a private
5. Internet is a public network.
network.
A company used to
Using Social media on your
communicate internally
8. phone or researching
with its employees and
resources via Google.
share information
S.NO Internet Intranet
An intranet is primarily
It is used for
used for internal
communication, sharing of
communication,
11. information, e-commerce,
collaboration, and
education, entertainment,
information sharing within
and other purposes.
an organization.
Access to an intranet is
Users can access the Internet restricted to authorized
from any location with an users within the
12.
Internet connection and a organization and is
compatible device. typically limited to specific
devices and locations.
Examples of intranet-based
Examples of Internet-based services include internal
services include email, communications,
15.
social media, search engines, knowledge management
and online shopping sites. systems, and collaboration
tools
Terminologies Related to Internet
1. Protocol
• A network protocol is a set of established rules that specify how to format, send and
receive data so that computer network endpoints, including computers, servers,
routers and virtual machines, can communicate despite differences in their underlying
infrastructures, designs or standards.
• To successfully send and receive information, devices on both sides of a
communication exchange must accept and follow protocol conventions.
• In networking, support for protocols can be built into the software, hardware or both.
• Without network protocols, computers and other devices would not know how to
engage with each other.
• As a result, except for specialty networks built around a specific architecture, few
networks would be able to function, and the internet as we know it wouldn't exist.
• Virtually all network end users rely on network protocols for connectivity.
Working of DNS
3. Internet Connections
• There are many connections that can be used for internet access. All the connections
have their own speed range that can be used for different purposes like for home, or for
personal use.
i. Dial-Up Connection
➢ A dial-up connection is established between your computer and the ISP server
using a modem.
➢ A dial-Up Connection is a cheap and traditional connection that is not preferred
these days as this type of connection is very slow.
➢ Broadband refers to high-speed internet access that is faster than traditional dial-up
access.
➢ It is provided through either cable or telephone composition. It does not require any
telephone connection that’s why here we can use telephone and internet connection
simultaneously.
➢ In this connection, more than one person can access the internet connection
simultaneously.
➢ It is a wide bandwidth data transmission that transports several signals and traffic
types. In this connection, the medium used is coaxial cable, optical fiber cable, radio,
or twisted pair cable.
iii. DSL
iv. Cable
➢ It is a form of broadband access cable modem that can provide extremely fast
access to the internet. The speed of this connection varies which can be
different for uploading data transmission or downloading.
➢ It uses a cable modem to provide an internet connection and operates over
cable TV lines. The speed of cable connection ranges from 512k to 20Mbps.h
v. Satellite Connection
➢ As the name suggests wireless connection does not use telephone lines or
cables to connect to the internet.
➢ The wireless connection uses a radio frequency band to connect to the
internet. It is also an always-on connection and this connection can be
accessed from anywhere and speed may vary for different locations. It
ranges from 5Mbps to 20Mbps.
vii. Cellular
viii. ISDN
4. IP Addresses
• An Internet protocol address (IP address) is a unique combination of numbers and
periods such as 172.1.1.1. This combination of numbers acts as an identity for the
network device when it connects to the internet.
• This identity is then used to access data and information available on the web when
the client device sends a request to the server and is passed through routers, hubs, and
other network nodes.
• The need for an IP address also increases with the number of network devices that
connect to the internet. The IANA issues the IP addresses (Internet Assigned
Numbers Authority), a department under the ICANN, where ICANN is a corporation
that aims to maintain internet security.
Working of an IP Address
1. The first step begins with your system, smartphone, and other network devices
establishing a connection between the network devices (wi-fi), which would, in a
way, indirectly connect your device with the internet.
2. If our device connects to the internet through our home network, then the connection
is provided by the Internet Service Provider (ISP). In contrast, in the case of a
professional location, it provides the network through the company network.
3. At this step, your system is provided with its IP address by the network.
4. The system's request for an internet connection goes through the ISP, where the
requested information is routed back to the system using the IP address. As the ISP
establishes the internet connection to our system, it is also responsible for assigning
the IP address to your device.
5. The IP addresses assigned to the system are never consistent. They change each time
you connect to the internet through the network (ISP). You can also contact your ISP
to provide your system with a different IP address.
6. In case you are traveling or are out of your home network, the internet connection
established to the system is provided by an alternative network (public wi-fi, airport
hotspot, etc.), which assigns the system with a temporary IP address provided by the
ISP of the location network.
Versions of IP Address
IPv4 Addresses
➢ This is the original version of the IP address, which was developed based on a 32-bit
binary format and contained 232 addresses, which was sufficient at the initial time of
making but somewhat lacking considering the increase in the current network
advancement.
➢ The addresses ranged from 0 to 255 in terms of 0s and 1s, with four octets, each of
them separated by a period (.). The network device uses the binary format, whereas
the numerical format is used for the host's reference.
IPv6 Addresses
➢ An IPv6 address is designed from 128 bits from which 4 hexadecimal digits and
eight sets are created, with each block containing 16 bits separated by a colon (:).
➢ IPv6 addresses are used to indicate the source and destination of each packet by
including them in the packet header. The routing structure of the IP packets is
assigned by using the IP address of the destination.
IP Address Classes
➢ It is used to indicate the location of a web resource to access the web pages. For
example, to visit the Google website, you will go to the URL www.google.com,
which is the URL for the google website.
➢ The URL sends users to a specific resource online such as video, webpage, or other
resources. When you search any query on Google, it will display the multiple URLs
of the resource that are all related to your search query. The displayed URLs are the
hyperlink to access the webpages.
➢ A URL (Uniform Resource Locator) contains the information, which is as follows:
• The World Wide Web (WWW), also known as the Web, is an interconnected
network of web pages and documents accessible through the Internet.
• The Web has since grown into a vast network of information, entertainment,
commerce, and communication accessible to anyone with an internet connection.
iii. Hyperlinks: One of the key features of the Web is hyperlinks, which allow you to
navigate between web pages by clicking on links. Hyperlinks are created using the
HTML <a> tag and can link to other web pages, files, or even specific parts of a
page.
iv. Uniform Resource Locators (URLs): Web pages are identified by URLs, which
are unique addresses that point to the location of the web page on the Internet. URLs
typically start with "http://" or "https://" and include the domain name of the web
server and the path to the specific web page.
v. Web standards: To ensure that web pages are compatible across different browsers
and devices, there are web standards that govern how HTML, CSS (Cascading Style
Sheets), and other web technologies should be used. These standards are developed
by organizations like the World Wide Web Consortium (W3C) and are
implemented by browser makers and web developers.
vi. Web applications: In addition to static web pages, the Web also supports
interactive web applications that allow users to shop online, play games, and
communicate with each other. Web applications are created using programming
languages like JavaScript and run in the browser or web servers.
6. Client-Server Model
• Client: When we talk the word Client, it mean to talk of a person or an organization
using a particular service. Similarly in the digital world a Client is a computer (Host)
i.e. capable of receiving information or using a particular service from the service
providers (Servers).
• Servers: Similarly, when we talk the word Servers, It mean a person or medium that
serves something. Similarly in this digital world a Server is a remote computer which
provides information (data) or access to particular services.
So, its basically the Client requesting something and the Server serving it as long as its present
in the database.
7. Search Engines
i. Crawling
• Crawling is the first stage in which a search engine uses web crawlers to find, visit,
and download the web pages on the WWW (World Wide Web). Crawling is
performed by software robots, known as "spiders" or "crawlers." These robots are
used to review the website content.
ii. Indexing
• Indexing is an online library of websites, which is used to sort, store, and organize the
content that we found during the crawling. Once a page is indexed, it appears as a
result of the most valuable and most relevant query.
• The ranking is the last stage of the search engine. It is used to provide a piece of
content that will be the best answer based on the user's query. It displays the best
content at the top rank of the website.
• Time-Saving: Search engine helps us to save time by the following two ways -
• Sometimes the search engine takes too much time to display relevant, valuable, and
informative content.
• Search engines, especially Google, frequently update their algorithm, and it is very
difficult to find the algorithm in which Google runs.
• It makes end-users effortless as they all time use search engines to solve their small
queries also.
• Voice is converted into a digital signal by VoIP services that travel over the Internet.
• If the regular phone number is called, the signal is converted to a regular telephone
signal i.e. an analog signal before it reaches the destination.
• VoIP can allow you to make a call directly from a computer having a special VoIP
phone, or a traditional phone connected to a special adapter.
• Wireless hot spots in locations such as airports, hospitals, cafes, etc allow you to
connect to the Internet and can enable you to use VoIP service wirelessly.
Equipments Required –
Advantages of VoIP –
• Some VoIP services offer features and services that are not available with a traditional
phone, or are available but only for an additional fee.
• Paying for both a broadband connection and a traditional telephone line can be
avoided.
• Smoother connection than an analog signal can be provided.
Disadvantages of VoIP –
• Some VoIP services don’t work during power outages and the service provider may
not offer backup power.
• Not all VoIP services connect directly to emergency services through emergency
service numbers.
• VoIP providers may or may not offer directory assistance.
• Network Devices: Network devices, also known as networking hardware, are physical
devices that allow hardware on a computer network to communicate and interact with
one another. For example Repeater, Hub, Bridge, Switch, Routers, Gateway, Brouter,
and NIC, etc.
1. Repeater –
2. Hub –
3. Bridge –
4. Switch –
➢ A switch is a multiport bridge with a buffer and a design that can boost its
efficiency(a large number of ports imply less traffic) and performance.
➢ A switch is a data link layer device.
➢ The switch can perform error checking before forwarding data, which makes it very
efficient as it does not forward packets that have errors and forward good packets
selectively to the correct port only.
➢ In other words, the switch divides the collision domain of hosts, but the broadcast
domain remains the same.
5. Routers –
➢ A router is a device like a switch that routes data packets based on their IP addresses.
The router is mainly a Network Layer device.
➢ Routers normally connect LANs and WANs and have a dynamically updating routing
table based on which they make decisions on routing the data packets.
➢ The router divides the broadcast domains of hosts connected through it.
6. Gateway –
➢ A gateway, as the name suggests, is a passage to connect two networks that may work
upon different networking models.
➢ They work as messenger agents that take data from one system, interpret it, and
transfer it to another system.
➢ Gateways are also called protocol converters and can operate at any network layer.
➢ Gateways are generally more complex than switches or routers. A gateway is also
called a protocol converter.
7. Brouter –
➢ It is also known as the bridging router is a device that combines features of both
bridge and router.
➢ It can work either at the data link layer or a network layer.
➢ Working as a router, it is capable of routing packets across networks and working as
the bridge, it is capable of filtering local area network traffic.
8. NIC –
➢ NIC or network interface card is a network adapter that is used to connect the
computer to the network.
➢ It is installed in the computer to establish a LAN. It has a unique id that is written on
the chip, and it has a connector to connect the cable to it.
➢ The cable acts as an interface between the computer and the router or modem.
➢ NIC card is a layer 2 device which means that it works on both the physical and data
link layers of the network model.
9. Bluetooth Technology
Bluetooth Architecture:
➢ Piconet is a type of Bluetooth network that contains one primary node called the
master node and seven active secondary nodes called slave nodes.
➢ Thus, we can say that there is a total of 8 active nodes which are present at a distance
of 10 meters.
➢ The communication between the primary and secondary nodes can be one-to-one or
one-to-many.
➢ Possible communication is only between the master and slave; Slave-slave
communication is not possible.
➢ It also has 255 parked nodes, these are secondary nodes and cannot take participation
in communication unless it gets converted to the active state.
ii. Scatternet:
Advantage:
Disadvantages:
Applications: