Professional Documents
Culture Documents
Chapter three
Components of computer Network
The building blocks of computer network are categorized into two main
categories.
1. Hardware components of network
2. Software components of network
Hardware components
The hardware building blocks of networks are network hardware devices such as
servers, client computer, cabling, and Shared resource, connecting other network
Devices & peripherals like NIC, hubs, switches, routers, bridge, gateway, and so
on.
Client computer
– Computers that request or order information from a server
– All computers connected to the file server on a network are called
workstations
Server computer
A server is a computer connected to a network that distributes and stores
resources for other network users.
With proper licensing, many network users can use the same applications and
data files simultaneously and share other resources, such as storage space or a
printer.
A very fast computer with a large amount of RAM and storage space along with
a fast network interface card.
The network operating system software resides on this computer
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 1
RVU/Department of Computer science 2013 E/C
Computers that work behind the scenes to provide (serve) the resources
requested by the clients
Two types server are:-
1. Non-dedicated server – network server provides many different services to
its client computers such as file retrieval, printing, and emailing
2. Dedicated server is a network server designated to provide one particular
service is known as dedicated server. For example if a computer is assigned
for database service only then that computer is known as dedicated database
server.
Proxy Servers
Isolates internal network computers from the internet.
The user first accesses the proxy server and the proxy server accesses the
internet and retrieves the requested web page or document. The user then gets a
copy of that page from the proxy server.
Proxy servers sit between a client program (typically a Web browser)and an
external server (typically another server on the Web) to filterrequests, improve
performance, and share connections.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 3
RVU/Department of Computer science 2013 E/C
Telnet Servers
A Telnet server enables users to log on to a host computer and perform tasks as
if they're working on the remote computer itself.
Web Servers
At its core, a Web server serves static content to a Web browser byloading a file
from a disk and serving it across the network to a user'sWeb browser. The
browser and server talking to each other using HTTPmediate this entire
exchange.
Gateways
The Internet is the collection of heterogeneous computers with
differenthardware and software platforms. Without gateways computers
willnever be able to understand and communicate with each other.Essentially,
gateways perform protocol translation between networks.
Gateways are generally designed and used for LAN-WAN connectionsand not
for inter LAN communications. Gateways unction is to do anynecessary
conversion of protocols between networks. Gateways arecustomized and
designed to perform a specific function and are used on acase-by-case basis.
Gateways may do anything from convertingprotocols to converting application
data.
Network Cables
Cabling: -are transmissions media that used to transmitted resource from source
to destination along a network thoseare fiber optics, coaxial cable and twisted
pair cable.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 4
RVU/Department of Computer science 2013 E/C
Network cables are used to interconnect computer & network components
together. Many cable types are available to meet the varying needs & size of the
networks from small to large. There are three major groups of cabling to connect
the majority of networks.
Coaxial cable
Twisted-pair cable
Fibre-optic cable
The choices of the network cable for a particular networking purpose depends
upon a number of factors like:-
Cost; budget for getting the cable
Distance; network coverage area
Number of computer involved
Bandwidth; how fast data is to be transferred
Coaxial cable
In its simplest form, coaxial cable consists of a core of copper wire surrounded by
insulation, a braided metal shielding, and an outer cover. Figure 1 shows the
various components that make up a coaxial cable.
The shielding protects transmitted data by absorbing stray electronic signals, called
noise, so that they do not get onto the cable and distort the data. The core of a
coaxial cable carries the electronic signals that make up the data. This wire core
can be either solid or stranded. If the core is solid, it is usually copper. Surrounding
the core is an insulating layer that separates it from the wire mesh. The braided
wire mesh acts as a ground and protects the core from electrical noise. Coaxial
cable uses the BNC connector to connect to computers and other devices.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 5
RVU/Department of Computer science 2013 E/C
There are two types of coaxial cable: thinnet and thicknet. Thicknet cabling is
thicker, and a better choice for longer distances, but is more expensive and more
difficult to work with. Thinnet coaxial cable can carry a signal for a distance of up
to approximately 185 meters before the signal starts to suffer from attenuation.
Thicknet cable can carry a signal for 500 meters. Therefore, because of thicknet's
ability to support data transfer over longer distances, it is sometimes used as a
backbone to connect several smaller thinnet-based networks.
Twisted-pair cable
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 6
RVU/Department of Computer science 2013 E/C
In its simplest form, twissted-pair cable consists of two insulated strands of copper
wire twisted around each other. Figure 2 shows the two types of twisted-pair cable:
unshielded twisted-pair (UTP) and shielded twisted-pair (STP) cable.
UTP is the most popular type of twisted-pair cable and is fast becoming the most
popular LAN cabling. It is cheap and easy to use. However, its performance over
long distances is not as good as coaxial cable. The maximum cable length segment
of UTP is 100 meters. There are a number of different types (or categories) of UTP
cable, which differ in their specification and in the number of pairs of wire
contained within the cable. Most telephone systems use UTP cable (with the RJ11
connector), and many LANs nowadays also use UTP (with the RJ45 connector).
STP is higher quality than UTP, but more expensive and less popular.
Fiber-optic cable
It is constructed of plastic and glass. In fibre-optic cable, optical fibres carry digital
data signals in the form of modulated pulses of light. This is a relatively safe way
to send data because, unlike copper-based cables that carry data in the form of
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 7
RVU/Department of Computer science 2013 E/C
electronic signals, no electrical impulses are carried over the fibre-optic cable. This
means that fibre-optic cable cannot be tapped, and its data cannot be stolen.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 8
RVU/Department of Computer science 2013 E/C
Figure 2 – Adding RJ45 connectors to Category 5 UTP/STP cable to make
straight-through and crossover cables
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 9
RVU/Department of Computer science 2013 E/C
Wire Color Wire Diagram 10Base-T Signal
RJ45 Pin # 1000Base-T Signal
(T568A) (T568A) 100Base-TX Signal
10Base-T Signal
Wire Color Wire Diagram 1000Base-T
RJ45 Pin # 100Base-TX
(T568B) (T568B) Signal
Signal
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 10
RVU/Department of Computer science 2013 E/C
1 White/Orange 1 White/Green
2 Orange 2 Green
3 White/Green 3 White/Orange
4 Blue 4 Blue
5 White/Blue 5 White/Blue
6 Green 6 Orange
7 White/Brown 7 White/Brown
8 Brown 8 Brown
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 11
RVU/Department of Computer science 2013 E/C
RJ-45 Crimper
Cat-5 UTP Cable
RJ-45 Connectors
Cable Tester
PROCEDURE:
Instructions
1. Step 1
Prepare your workspace. Take the roll of UTP cable and cut the cable to
length using the cutting blade on the crimp tool.
2. Step 2
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 12
RVU/Department of Computer science 2013 E/C
Splice the end by two inches using the splicing blades to expose the
unshielded twisted pairs.
3. Step 3
Take each twisted pair and make four wire strands, each going out from the
center of the wire.
4. Step 4
Now take the individual twisted wire pairs and untwist them down to
individual wires in the following order: Striped Orange, Orange, Striped
Green, Blue, Striped Blue, Green, Striped Brown, and Brown.
5. Step 5
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 13
RVU/Department of Computer science 2013 E/C
Next, grasp the wires with your thumb and index finger of your non-
dominant hand. Take each wire and snug them securely side by side.
6. Step 6
Using the cutting blade of the crimp tool, cut the ends off of the wires to
make each wire the same height.
7. Step 7
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 14
RVU/Department of Computer science 2013 E/C
Still grasping the wires, insert the RJ-45 jack on the wires with the clip
facing away from you.
8. Step 8
Insert the jack into the crimper and press down tightly on the tool to seal
the wires in place.
9. Step 9
Once the first head is made, repeat steps two through eight. When
untwisting the wires down to sing strands, use the following order: Striped
Green, Green, Striped Orange, Blue, Striped Blue, Orange, Striped Brown,
and Brown.
10.Step 10
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 15
RVU/Department of Computer science 2013 E/C
Plug in the cable to test connectivity.
PRECAUTIONS:
For your protection, observe the following safety precautions when cutting the
cable
1. Never bend the cable
2. Ensure that the wire coding is inserted properly.
QUALITY CRITERIA:
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 16
RVU/Department of Computer science 2013 E/C
Network interface cards, commonly referred to as NICs are used to connect a PC to
a network media. The NIC provides a physical connection between the networking
medium and the computers' internal bus, and is responsible for facilitating an
"access method" to the network. Most NICs are designed for a particular type of
network, protocol and media, although some can serve multiple networks.
NIC card functions:
LAN adapters have their own onboard architectures and they carry NIC Functions
out several important functions including
Connectivity devices enabling a workstation, server, printer, or other node to
receive and transmit data over the network media
This NIC has interfaces for twisted pair, thicknet, and thinnet connectors.
Puts the data into packets and transmits packet onto the network.
May be wired or wireless
Monitoring activity on the communication medium
Providing each workstation/server with a unique identification address
(MAC)
operate on Layer 2(data link layer) of the OSI model
Recognizing and receiving data transmitted to the computer
Creating (building) the frames needed to transmit data on the
communication medium
Controlling LAN transmission speed
encode and decode information
Transmission error detection and recovery
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 17
RVU/Department of Computer science 2013 E/C
2. Hub:A hub is the simplest of these devices. Any data packet coming from one
port is sent to all other ports. It is then up to the receiving computer to decide if
the packet is for it. Imagine packets going through a hub as messages going into
a mailing list. The mail is sent out to everyone and it is up to the receiving party
to decide if it is of interest.The biggest problem with hubs is their simplicity.
Since every packet is sent out to every computer on the network, there is a lot of
wasted transmission. This means that the network can easily become bogged
down. Hubs are typically used on small networks where the amount of data
going across the network is never very high. A device that is used to connect
several computers to form a network.A hub has several ports. The number
generally is 8, 12, 16, 24, 32, or 48
The network 'Hub' allows computers to share data packets within a network. Each
computer will be connected to a single 'port' on the hub. So an 8 port hub will be
able to connect up to eight computers together.
Prepares data from computer for network and sends
Receives data from network and translates for computer
Hubs regenerate and retime network signals
Hubs propagate signals through the network
They cannot filter network traffic
They cannot determine best path
They are used as network concentration points
They are really multi-port repeaters
An unintelligent network device that sends one signal to all of the stations
connected to it.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 18
RVU/Department of Computer science 2013 E/C
All computers/devices are competing for attention because it takes the data that
comes into a port and sends it out all the other ports in the hub.
Traditionally, hubs are used for star topology networks, but they are often used
with other configurations to make it easy to add and remove computers without
bringing down the network.
Resides on Layer 1 of the OSI model
Hubs cannot determine which host should get any particular message.
A hub simply accepts electronic signals from one port and regenerates (or
repeats) the same message out all of the other ports.
All of the ports on the Ethernet hub connect to the same channel to send and
receive messages.
3. Repeaters
A repeater receives the signal, regenerates it, and passes it on. Repeaters are used
mainly at the edges of networks to extend the wire so more workstations can be
added A repeater is a device that gives your network signals a boost so that the
signals can travel farther. You need a repeater when the total length of a single
span of network cable is larger than the maximum allowed for your cable type.
Repeaters
Operates only in the physical layers or layer 1 in OSI model
Can extend the physical length of a LAN
Receive the signal before it becomes too weak or corrupted and regenerates the
original bit pattern
Do not actually connect two LANs
connects two segments of the same LAN
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 19
RVU/Department of Computer science 2013 E/C
Segments connected are still part of one single LAN
A repeater cannot connect two LANs of different protocols
Fig. 5 - Repeater
4. Switches
Switch is a device that provides a central connection point for cables from
workstations, servers, and peripherals. In a star topology, twisted-pair wire is run
from each workstation to a central switch/hub. Most switches are active, that is
they electrically amplify the signal as it moves from one device to another.
Switches no longer broadcast network packets as hubs did in the past, they
memorize addressing of computers and send the information to the correct location
directly. Switches are usually configured with 8, 12, or 24 RJ-45 ports
Switches learn certain information about the data packets that they receive from
computers on the network.
They use this to build forwarding tables to determine the destination of data
being sent by one computer to another on the network.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 20
RVU/Department of Computer science 2013 E/C
They help segment a network and reduce network traffic congestion by limiting
each port to its own collision domain.
Split large networks into small segments, decreasing the number of users
sharing the same network resources and bandwidth.
Understands when two devices want to talk to each other, and gives them a
switched connection
Helps prevent data collisions and reduces network congestion, increasing
network performance.
Most home users get very little, if any, advantage from switches, even when
sharing a broadband connection.
Resides on Layer 2 of the OSI model.
5. Bridges
A bridge goes one step up on a hub in that it looks at the destination of the packet
before sending. If the destination address is not on the other side of the bridge it
will not transmit the data.
Used to form a connection between two separate, but similar networksIn a way, it
creates an extended LAN by passing information between two or more LANsThe
bridge function is to connect separate homogeneous networks. Bridges map the
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 21
RVU/Department of Computer science 2013 E/C
Ethernet address of the nodes residing on eachnetwork segment and allow only
necessary traffic to pass through thebridge. When a packet is received by the
bridge, the bridgedetermines the destination and source segments. If the segments
aredifferent, then the packet is "forwarded" to the correct segment.Bridges are also
called "store-and-forward" device because they lookat the whole Ethernet packet
before making filtering or forwarding decisions.A bridge is a device that connects
two networks so that they act as if they are one network. Bridges are used to
partition one large network into two smaller networks for performance reasons.
A bridge (or bridge-like device) can be used to connect two similar LAN
The bridge examines the destination address in a frame and either forwards this
frame onto the next LAN or does not.
The bridge examines the source address in a frame and places this address in a
routing table, to be used for future routing decisions.
Connects two LANs and forwards or filters data packets between them.
Creates an extended network in which any two workstations on the linked
LANs can share data.
Transparent to protocols and to higher level devices like routers.
Forward data depending on the Hardware (MAC) address, not the Network
address (IP).
Resides on Layer 2 or data link layer of the OSI model.
A layer 2 device designed to create two or more LAN segments, each of which
is a separate collision domain.
The purpose is to filter traffic on a LAN, to keep local traffic local, yet allow
connectivity to other segments of the network.
Filter traffic by looking at the MAC address
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 22
RVU/Department of Computer science 2013 E/C
Has one input and one output
Used to isolate network traffic and computers
Has the intelligent to examine incoming packet source and destination
addresses
Frame filtering
6. Router
Routers, layer-three devices, are much more complex, using microprocessor-
based circuitry to route packets between networks based on their IP address.
Routers provide the following services: route discovery; selection of the best
route to a destination; adaptation to changes in the network; translation from one
technology to another, such as Ethernet to token ring; packet filtering based on IP
address, protocol, or UDP/TCP port number; and connection to a WAN.
Routing achieved commercially popularity in the mid – 1980s – at a time when
large-scale Internetworking began to replace the fairly simple, homogeneous
environments. Routing is the act of moving information across an Internetwork
from a source to a destination. It is often contrasted with bridging, which perform a
similar function. Routers use information within each packet to route it from one
LAN to another, and communicate with each other and share information that
allows them to determine the best route through a complex network of many
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 23
RVU/Department of Computer science 2013 E/C
LANs.A Router is a device that transfers data from one network to another in an
intelligent way. It has the task of forwarding data packets to their destination by the
most efficient route.
In order to do this, the router has a micro computer inside it. This holds a table in
memory that contains a list of all the networks it is connected to, along with the
latest information on how busy each path in the network is, at that moment. This is
called the 'routing table'.
They are slower than bridges and switches but make "smart" decisions on how
to route packets received on one port to a network on another port.
Routers are capable of segmenting the network.
Routers are capable of segmenting a network into multiple collision domains as
well as into multiple broadcast domains.
Routers can be computers with special network software installed on them or
they can be other devices built by network equipment manufacturers.
Routers contain tables of network addresses along with optimal destination
routes to other networks.
Multiport connectivity device
Can integrate LANs and WANs running at different transmission speeds and
using a variety of protocols
Routers operate at the Network layer (Layer 3) of the OSI Model
Filter out broadcast transmission to alleviate network congestion
Prevent certain types of traffic from getting to a network
Support simultaneous local and remote activity
Provide high network fault tolerance through redundant components
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 24
RVU/Department of Computer science 2013 E/C
Monitor network traffic and report statistics of network
Diagnose internal or other connectivity problems and trigger alarms
Routers often incorporate firewall functions
A router accepts an outgoing packet, removes any LAN headers and trailers,
and encapsulates the necessary WAN headers and trailers
Because a router has to make wide area network routing decisions, the router
has to dig down into the network layer of the packet to retrieve the network
destination address
A device that connects any number of LANs.
Uses standardized protocols to move packets efficiently to their destination.
More sophisticated than bridges, connecting networks of different types (for
example, star and token ring)
Forwards data depending on the Network address (IP), not the Hardware
(MAC) address.
Routers are the only one of these four devices that will allow you to share a
single IP address among multiple network clients.
Routers can connect two or more network segments.
A special-purpose computer that directs data traffic when several paths are
available
A router examines the destination info in each arriving packet and then routes it
through the most efficient path available
The router either delivers the packet to the destination computer across a local
network or forwards the packet to another router that is closer to the final
destination
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 25
RVU/Department of Computer science 2013 E/C
7. Gateway
Connects networks with different protocols like TCP/IP network. Routers and
Gateways often refer to the same device. A special-purpose computer that
connects and translates between networks that use different communications
protocols. LAN’s may use a gateway (or router) to connect to the Internet.
8. MODEM
Modulation is Computer digital signals converted to analog. Sent over analog
phone line. Demodulation – Analog signal converted back to digital
A modem converts the digital data from the computer into a continuous analogue
wave form that the telephone system is designed to deal with (Modulation). The
reason for this is that the telephone system was originally designed for the human
voice i.e. continuous signals. The modem also converts thealogue signal from the
telephone network back into digital data that the computer can understand.
(Demodulation).Standard modems come in two forms: - External modem that
links to your computer either through a serial or USB port, or an internal modem
that is plugged directly to the motherboard inside the computer.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 26
RVU/Department of Computer science 2013 E/C
Figure. Internal Modem
MAC Address
A MAC address, or Media Access Control address, is a 48- or 64-bit address
associated with a network adapter. While IP addresses are associated with
software, MAC addresses are linked to the hardware of network adapters. For this
reason, the MAC address is sometimes called the hardware address, the burned-in
address (BIA), or the physical address. MAC addresses are expressed in
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 27
RVU/Department of Computer science 2013 E/C
hexadecimal notation in the following format: 01-23-45-67-89-AB, in the case of a
48-bit address, or 01-23-45-67-89-AB-CD-EF, in the case of a 64-bit address.
Colons (:) are sometimes used instead of dashes (-).
• Every computer has a unique way of identifying itself: MAC address or
physical address.
• The physical address is located on the Network Interface Card (NIC).
• MAC addresses have no structure, and are considered flat address spaces.
Software components
Communication Protocols
Network Operating System- NOS
peer-to-peer (Windows Xp,Win7)
Client-server (Windows server 2003 وLinux)
Network Operating Systems
All network operating systems, from the simplest (such as Windows XP Home
Edition) to the most complex (such as Windows Server 2008), must provide certain
core functions, such as
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 29
RVU/Department of Computer science 2013 E/C
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 30