Beruflich Dokumente
Kultur Dokumente
A common connection point for devices in a network.Hubs are commonly used to connect segments of a
LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so
that all segments of the LAN can see all packets.
Switch
In networks,a device that filters and forwards packets between LAN segments. Switches operate at the
data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and
therefore support any packet protocol. LANs that use switches to join segments are called switched LANs
or, in the case of Ethernet networks, switched Ethernet LANs.
Router
A device that forwards data packets along networks. A router is connected to at least two networks,
commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at gateways, the
places where two or more networks connect. Routers use headers and forwarding tables to determine the
best path for forwarding the packets, and they use protocols such as ICMP to communicate with each
other and configure the best route between any two hosts.
Hub
A hub is the simplest of these devices. Any data packet coming from one port is sent to all other ports. It
is then up to the receiving computer to decide if the packet is for it. Imagine packets going through a hub
as messages going into a mailing list. The mail is sent out to everyone and it is up to the receiving party to
decide if it is of interest.
The biggest problem with hubs is their simplicity. Since every packet is sent out to every computer on the
network, there is a lot of wasted transmission. This means that the network can easily become bogged
down.
Hubs are typically used on small networks where the amount of data going across the network is never
very high.
Bridge
A bridge goes one step up on a hub in that it looks at the destination of the packet before sending. If the
destination address is not on the other side of the bridge it will not transmit the data.
To build on the email analogy above, the bridge is allowed to decide if the message should continue on. It
reads the address bob@smith.com and decides if there is a bob@smith.com on the other side. If there
isn’t, the message will not be transmitted.
Bridges are typically used to separate parts of a network that do not need to communicate regularly, but
still need to be connected.
Switch
A switch steps up on a bridge in that it has multiple ports. When a packet comes through a switch it is
read to determine which computer to send the data to.
This leads to increased efficiency in that packets are not going to computers that do not require them.
Now the email analogy has multiple people able to send email to multiple users. The switch can decide
where to send the mail based on the address.
Most large networks use switches rather than hubs to connect computers within the same subnet.
Router
A router is similar in a switch in that it forwards packets based on address. But, instead of the MAC
address that a switch uses, a router can use the IP address. This allows the network to go across different
protocols.
In distributed computing, all elements which are interconnected operate under one operating system. To a
user, it appears as a virtual uni-processor system. In a computer network, the user has to specify and log
in on a specific machine. Each machine on the network has a specific address. Different machines
communicate by using the network which exists among them.
Physical layer coordinates the functions required to transmit a bit stream over a physical medium.
a. Physical characteristics of interfaces and media
b. Representation of bits
c. Data rate
d. Synchronization of bits
e. Line configuration
f. Physical topology
g. Transmission mode
The Data Link Layer transforms the physical layer, a raw transmission facility, to a reliable link and is
responsible for node-node delivery.
a. Framing
b. Physical Addressing
c. Flow Control
d. Error Control
e. Access Control
The Network Layer is responsible for the source-to-destination delivery of packet possibly across
multiple networks (links).
a. Logical Addressing
b. Routing
The Transport Layer is responsible for source-to-destination delivery of the entire message.
a. Service-point Addressing
b. Segmentation and reassembly
c. Connection Control
d. Flow Control
e. Error Control
The Session layer is the network dialog Controller. It establishes, maintains and synchronizes the
interaction between the communicating systems.
a. Dialog control
b. Synchronization
The Presentation layer is concerned with the syntax and semantics of the information exchanged between
two systems.
a. Translation
b. Encryption
c. Compression
The Application Layer enables the user, whether human or software, to access the network. It provides
user interfaces and support for services such as e-mail, shared database management and other types of
distributed information services.
a. Network virtual Terminal
b. File transfer, access and Management (FTAM)
c. Mail services
d. Directory Services
A protocol is set of rules to communicate between computer & her owe system and two computers....
Protocols are three types-
1)Non Routed ,
2)Routed &
3)Routing.
DNS is a server for resolving the name or we can say name to IP address of the system in domain.
DNS means DOMAIN NAME SYSTEM,IT,works for converting name to IP address,and IP address to
name,Conversion needs for user friendliness because user is difficult to keep in mind IP address of web
sit...
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an
Internet Protocol (IP) host with its IP address and other related configuration information such a...
ii. Switch – Establishes a direct connection from the sender to the destination without passing the data
traffic to other networking devices.
CSMA CA vs CSMA CD
Carrier Sense Multiple Access or CSMA is a Media Access Control (MAC) protocol that is used to
control the flow of data in a transmission media so that packets do not get lost and data integrity is
maintained. There are two modifications to CSMA, the CSMA CD (Collision Detection) and CSMA CA
(Collision Avoidance), each having its own strengths.
CSMA operates by sensing the state of the medium in order to prevent or recover from a collision. A
collision happens when two transmitters transmit at the same time. The data gets scrambled, and the
receivers would not be able to discern one from the other thereby causing the information to get lost. The
lost information needs to be resent so that the receiver will get it.
1.CSMA CD takes effect after a collision while CSMA CA takes effect before a collision.
2.CSMA CA reduces the possibility of a collision while CSMA CD only minimizes the recovery time.
3.CSMA CD is typically used in wired networks while CSMA CA is used in wireless networks.
1.“WiMAX” stands for “Worldwide Interoperability for Microwave Access”; “Wi-Fi” stands for
“Wireless Fidelity.”
2.WiMAX provides wireless broadband connectivity for long ranges; Wi-Fi provides short-range,
wireless broadband connectivity mostly within an office or home.
3.WiMAX is more controlled and requires a licensed spectrum; the service is deployed by the service
providers. Wi-Fi can work in a less controlled environment; it works in an unlicensed environment and is
less controlled. Moreover, the end users have to buy the devices.
4.WiMAX uses MAC protocol which is connection oriented; Wi-Fi uses connection-based or
connectionless protocol called CSMA/CA.
1) Pure Aloha is a Continuous time system whereas Slotted Aloha is discrete time system.
2) Pure ALOHA doesn't check whether the channel is busy before transmission.
Slotted ALOHA send the data at the beginning of timeslot.