Skip to main content

NETWORKING DEVICES A GENERAL SUMMARY

 NETWORKING DEVICES USED IN INTERNET CONNECTION: A GENERAL SUMMARY

NETWORK DEVICES, OR NETWORKING HARDWARE, ARE PHYSICAL DEVICES THAT ARE REQUIRED FOR COMMUNICATION AND INTERACTION BETWEEN HARDWARE ON A COMPUTER NETWORK.


LAYER 4 -> FIREWALL

LAYER 3 -> ROUTER

LAYER 2 -> BRIDGE, SWITCH

LAYER 1 ->LAN CARD, REPEATER, HUB, MODEM, ACCESS-POINT.


NETWORK INTERFACE CARD(NIC) A LAN CARD


IT IS A LAYER 1 DEVICE.  IT IS USED TO CONNECT A PC, LAPTOP, WORK STATION AND A SERVER TO A NETWORK.

A LAN CARD IS BUILT INTO A MOTHERBOARD BUT WE CAN PURCHASE ADDITIONAL LAN CARD ATTACH IT IN A PCI OR USB SLOT.  EVERY LAN CARD HAS ITS OWN MAC ADDRESS.


REPEATER





REPEATER IS A LAYER ONE DEVICE. IT WORKS LIKE N AMPLIFIER, BUT REMEMBER APLIFIER WORKS IN ANALOG SIGNAL WHERE REPEATER WORKS IN DIGITAL SIGNAL.  IT IS USED TO FIX THE PROBLEM OF ATTENUATION.


HUB



IT IS ALSO A LAYER1 DEVICE IT WORKS LIKE A REPEATER BUT REMEMBER REPEATER CANNOT BE A HUB.  A HUB CONTAIN 4, 6, 8, 12, 16 PORTS.  HUB REGENERATE AND INCOMMING SIGNAL AND FORWARDS IT BY ALL OFF ITS ACTIVE PORT.  THIS TYPE OF COMMUNICATION IS KNOWN AS BROADCAST.

HUB WORKS IN HALF DUPLEX MODE.  WHEN TWO DEVICES TRIES TO COMMUNICATE WITH EACH OTHER AT A SAME POINT OF TIME.  THEIR DATA GETS COLLIDED.


COLLISION DOMAIN


IN A HALF DUPLEX NETWORK WHEN TWO OR MORE THAN TWO COMPUTERS TRIES TO COMMUNICATE WITH EACH OTHER AT THE SAME POINT OF TIME THEIR DATA PACKETS GET COLLIDED.  IT IS CALLED COLISION DOMAIN.


WHEN A COLLISION OCCURS A JAM SIGNAL IS GENERATED AND ALL OF THE DEVICES INSIDE A NETWORK STOPS FORWARDING DATA.


BROADCAST DOMAIN

WHEN IN A NETWORK, A PC GENERATES A BROADCAST FRAME; ALL OF THE DEVICES INSIDE THT NETWORK GETS A COPY OF THE FRAME.   IT IS CALLED A BROADCAST DOMAIN.


A HUB NETWORK RESIDES INSIDE A SINGLE BROADCAST AND COLLISION DOMAIN.



CSMA – CD(CARIER SENSE MULTIPLE ACCESS COLLISION DETECTION)


IN A MULTI ACCESS NETWORK THE CARRIER SENSE MECHANISM DETECTS IF THE CHANNEL IS FREE OR NOT.  IT CHECKS FOR VOLTAGE LEVEL IN COPPER WIRE AND LIGHT IN FIBRE OPTICS.


THE COLLISION DETECTION MECHANISM DETECTS THE JAM SIGNAL AND STOPS FORWARDING DATA.  THEN A BACK OF ALGORITHM IS CALCULATED AND AGAIN THOSE COLIDDED DEVICES START SENDING THE DATA WITH LITTLE TIME GAP.



SWITCH



IT IS A LAYER 2 DEVICE.  IT WORKS WITH MAC ADDRESS.  IT IS A HARDWARE DEVICE.  IT IS ALSO KNOWN AS MULTIPORT BRIDGE.  A SWITCH CONTAINS  4, 8, 12, 16, 24, 48, 64 PORTS. EACH PORT WORKS AT FULL DUPLEX MODE.  EACH SIGNLE PORT OF A SWITCH IS IN SEPARATE COLLISION DOMAIN.


SWITCH CANNOT BREAK BROADCAST DOMAIN.  A SWITCHED NETWORK RESIDES INSIDE A SINGLE BROADCAST DOMAIN.  SWITCH HAS A PROCESSOR NAMED ASIC (APPLICATION SPECIFIC INTEGRATED CIRCUIT) WHICH LEARNS THE MAC ADDRESS OF ALL CONNECTED DEVICES AND STORES IN A TABLE CALLED CAM (CONTENT ADDRESSABLE MEMORY).


SWITCH IS OFF TWO TYPES (1) MANAGED SWITCH AND (2) UNMANAGED SWITCH.  (1)MANAGED SWITCH – THIS SWITCH CAN BE MANUALLY CONFIGURE (2) UNMANAGED SWITCH - THIS SWITCH CAN NOT BE CONFIGURED MANUALLY.


NOW I WILL SOMETHING ABOUT SWITCHING METHODS.


(1) CUT THROUGH SWITCHING

THIS TYPE OF SWITCH STARTS FORWARDING DATA FRAME IMMEDIATELY AFTER LEARNING DESTINATION MAC ADDRESS OF THAT FRAME.

IT IS A FASTEST SWITCHING METHOD.  THE PROBLEM WITH THE SWITCHING METHOD IS THAT IT CAN FORWARD CORRUPT FRAME AND RUNT FRAME (FRAME SIZE LESS THAN 64 BYTE).


(2)STORE AND FORWARD SWITCHING

THIS SWITCHING METHOD STORES THE ENTIRE FRAME INTO ITS BUFFER MEMORY.  THEN RUNS CRC(CYCLIC REDUNDANCY CHECK) TO VERIFY CORRUPTED DATA IF THE DATA IS GOOD THEN STARTS FORWARDING.

IT IS THE SLOWEST METHOD OF SWITCHING BUT NO CORRUPTED FRAME IS FORWARDING.  IF A BAD FRAME IS FOUND WITH BAD FCS(FRAME CHECK SEQUENCE).  IT WILL DROP THAT FRAME.


(3)FRAGMENT FREE SWITCHING

IT IS AN ADVANCED VERSION OF AS CUT THROUGH SWITCHING.  A SWITCH RUNNING IN FRAGMENT FREE MODE LEARNS THE FIRST 64 BYTE OF A FRAME, THEN STARTS FORWARDING THAT FRAME.  THIS METHOD DOESN’T ALLOW ANY RUNT FRAME TO BE FORWARDED.


FIREWALL


IT IS LAYER 4 DEVICE.  IT WORKS WITH ALL TYPES OF NETWORK ADDRESES (MAC, IP, PORT NUMBER).  IT IS A SECURITY APPLIANCE.   IT IS USED TO SECURE OUR NETWORK FROM UNATHOURIZED ACCESS, SUCH AS HACKING, NETWORK ATTACKS, VIRUSES AND WORMS.


FIREWALL IS OF TWO TYPES

1> SOFTWARE FIREWALL

2> HARDWARE FIREWALL


LET US SEE SOFTWARE FIREWALL

 IT IS A SOFTWARE BASE PROGRAM WHICH PROTECTS OUR PCS, LAPTROPS , SERVERS EG:- ANTIVIRUS FIREWALL, WINDOWS FIREWALL, COMODO FIREWALL, WINDOWS DEFENDER.


LET US SEE HARDWARE FIREWALL

IT IS A HARDWARE COMPONENT WHICH WORKS WITH SOFTWARE COMPONENT. IT CONTAINS VARIOUS SECURITY PROTOCOLS WHICH HELPS TO PROTECT A WHOLE NETWORK.

FOR EXAMPLE ->CISCO ASA, PIX, A5BIG IP, CHECK POINT, TALO ALTO


MODES OF FIREWALL


1.INTRUSION DETECTION SYSTEM

IT IS A PASSIVE PROTECTION WHICH DOESNOT BLOCK ANY MALICIOUS NETWORK ACTIVITY.  IT  HELPS TO MONITOR AND DETECT THOSE ACTIVITIES.


2.INTRUSION PREVENTION SYSTEM

IT IS A AN ACTIVE PROTECTION WHICH BLOCKS ANY MALICIOUS NETWORK ACTIVITY.



MODEM

MODEM MEANS MODULATION AND DEMODULATION.  THIS DEVICE CONVERTS ANALOG SIGNAL INTO DIGITAL SIGNAL AND VICE VERSA.IT IS USED WITH BROADBAND CONNECTION PROVIDED BY PLAIN OLD TELEPHONE SYSTEM (POTS) AND TELCO NETWORK. FOR EXAMPLE BSNL LANDLINE


MODEM IS OFF TWO TYPES:-

1> ADSL 2 WHICH PROVIDES WIRED NETWORK.

2> ADSL 2+ WHICH PROVIDED BOTH WIRED AND WIRELESS NETWORK.


ADSL – ASSYNCHRONOUS DIALUP SUBSCRIBER LINK


ACCESS POINT

IT IS A LAYER 1 DEVICE.  IT IS USED TO CREATE A WIRELESS LAN.  IT USES WIFI TECHNOLOGY .  IT NEVER MAKES COLLISION BUT WORKS INSIDE A SAME BROADCAST DOMAIN.  DATA ACCESS MECHANISM CSMA\CA  (CARRIER SENSE MULTI ACCESS WITH COLLISION AVOIDANCE).


THE COLLISION IS AVOIDED BY EXCHANGING CTS AND RTS MESSAGE.  ACCESS POINT WITH LAYER 3 ENGINE CAN FORWARD I TRAFFIC FROM ONE NETOWK TO ANOTHER THEN IT IS CALLED A WIFI ROUTER.


THE WIFI STANARDS COMES UNDER IEEE (INSTITUTE OF ELECRICAL AND ELECTRONICS ENGINEERS) 802 PROJECT.  WIFI COMES UNDER 802.11 STAMDARD.  IT HAS 5 SUB STANDARD.802.11 A,  802.11B, 802.11G, 80211N, 802.11AC.


ROUTER



IT ISS A LAYER 3 DEVICE.  IT IS USED TO CONNECT MULTIPLE NETWORKS.  IT WORKS WITH IP ADDRESS.  A ROUTER FORWARDS DATA PACKETS FROM ONE NETWORK TO ANOTHER ACCORDING TO THE DESTINATION IP OF THE DATA PACKET.


IF A DESTINATION IP NETWORKIS UNKNOWN TO THE ROUTER IT WILL DROP THAT PACKET.  TO LEARN ABOUT THIS NETWORK INFORMATION VARIOUS ROUTING PROTOCOLS ARE IMPLEMENTED IN A ROUTER.


ROUTER STORES THE UNKNOWN NETWORK INFOMRATION IN A TABLE KNOWN AS ROUTING INFORMATION BASE(RIB) OR ROUTING TABLE.  ROUTER WORKS AT FULL DUPLEX MODE.  IT NEVER BROADCAST .  EACH SINGLE PORT OF A ROUTER IS IN SEPERATEDE BROADCAST DOMAIN AND COLLISION DOMAIN.


Comments

Popular posts from this blog

EXPANSION SLOTS IN MOTHERBOARD

EXPANSION SLOTS IN MOTHERBOARD  Friends today i am going to share my knowledge and understanding of the expansion slots. So lets begin with our topic. Expansion slots are used to provide additional properties for carrying the computation task such as additional video, audio and sound, advanced graphics and Ethernet.   So lets begin with our knowledge hunting. I will start by AGP expansion slots. AGP AGP stands for ACCELARATED GRAPHICS PORT.  AGP was introduced with high speed 3D graphics display in 1996.  It is used for older graphics card types which is discontinued by PCI EX16 graphics port in 2005.   These were kernel version of AGP most of the brand in 1.5 volt DC.  AGP 1x channel and 66MHZ clock speed resulting a data table of 266 MBPS.   AGP 2x, 4x ,8x specification multiply MHZ clock to produce increase throughput. AGP 8x produces effective clock frequency of 533 MHZ resulting a throughput of 2 GBPS (2133MHZ) resulting a throughput of over a 32 bit channel. PCI PCI  stands for P

PROCESSOR AND HYPER THREADING A SHORT SUMMARY

PROCESSOR AND HYPERTHREADING Friends in the last post i tried to say something about computer science and mathematics relationship.   Now i am going to say something about processor and hyperthreading.   So let’s get started. The Physical Component By Which A Computer Is Made Which We Can See, Touch And Feel Is Called Computer Hardware Example Ram, Motherboard. ·          INPUT DEVICE   : These hardware are used to input any data, instruction on command insidea computer device.   example keyboard mo9use scanner microphone, webcam etc ·          OUTPUT DEVICE :   these hardware are used to get any output from a computer system.   example: monitor, printer, speaker. ·          CENTRAL PROCESSIG UNIT (CPU) : This Device Proceses All Instruction Given By A User, And It Also Other Haqrdwqaar Peripherals Example   :Microprocessor ·          MOTHERBOARD: It is the main electric circuit board which is made by a pcb(printed circuit board).   It hods all hardware componen

CODES OF LANGUAGE IN COMPUTER SYSTEM. WHAT ARE THE OTHER CODES WHICH ARE USED IN COMPUTER SYSTEM?

  CODES OF LANGUAGE IN COMPUTER SYSTEM.   WHAT ARE THE OTHER CODES WHICH ARE USED IN COMPUTER SYSTEM?   There are many codes in computer system which may remain unnoticed by many computer geeks and nerds.   I also first didn’t see it but I am going to share it because these are important codes and used by many computer hardware developers, vendors and computer software developers.    They are mostly understood by ELECTRONICS AND ELECTRICAL ENGINEERING geeks or nerds.   They are as under : ·         ERROR DETECTION CODES ·         ALPHANUMERIC CODES ·          REFTLECTED CODES First we will discuss something about ERROR DETECTION CODES.                                                                                                              ERROR DETECTION CODES:   Binary information , be it pulse modulated signals or digital computer input or output, may be transmitted though some form of communication medium or electrical wires or radio waves.   Any external noi