You are on page 1of 30

RVU/Department of Computer science 2013 E/C

Chapter three
Components of computer Network
The building blocks of computer network are categorized into two main
categories.
1. Hardware components of network
2. Software components of network
Hardware components
The hardware building blocks of networks are network hardware devices such as
servers, client computer, cabling, and Shared resource, connecting other network
Devices & peripherals like NIC, hubs, switches, routers, bridge, gateway, and so
on.
Client computer
– Computers that request or order information from a server
– All computers connected to the file server on a network are called
workstations
Server computer
 A server is a computer connected to a network that distributes and stores
resources for other network users.
 With proper licensing, many network users can use the same applications and
data files simultaneously and share other resources, such as storage space or a
printer.
 A very fast computer with a large amount of RAM and storage space along with
a fast network interface card.
 The network operating system software resides on this computer

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 1
RVU/Department of Computer science 2013 E/C
 Computers that work behind the scenes to provide (serve) the resources
requested by the clients
 Two types server are:-
1. Non-dedicated server – network server provides many different services to
its client computers such as file retrieval, printing, and emailing
2. Dedicated server is a network server designated to provide one particular
service is known as dedicated server. For example if a computer is assigned
for database service only then that computer is known as dedicated database
server.

Some of the servers based on services:-


 File Servers  DHCP Servers
 Print Servers  database server
 Application Servers  proxy server
 Mail Servers  talent server
 Communication Servers  Backup Servers
File Server
A term often used synonymously with operating system, a platform is the
underlying hardware or software for a system and is thus the engine that drives
the server In the client/server model, a file server is a computer responsible for
the central storage and management of data files so that other computers on the
same network can access the files. A file server allows users to share
information over a network without having to physically transfer files by floppy
diskette or some other external storage device. Any computer can be configured
to be a host and act as a file server. In its simplest form, a file server may be an
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 2
RVU/Department of Computer science 2013 E/C
ordinary PC that handles requests for files and sends them over the network. In
a more sophisticated network, a file server might be a dedicated network-
attached storage (NAS) device that also serves as a remote hard disk drive for
other computers, allowing anyone on the network to store files on it as if to
their own hard drive.
FTP Servers
 FTP (File Transfer Protocol) is an Internet standard that permits file uploading
and downloading with other computers on the Internet
 An FTP server is a computer that allows users to upload and/or download files
using FTP
 One of the oldest of the Internet services, File Transfer Protocol makes
itpossible to move one or more files securely between computers
whileproviding file security and organization as well as transfer control.
Mail Servers
 Almost as ubiquitous and crucial as Web servers, mail servers move andstore
mail over corporate networks (via LANs and WANs) and acrossthe Internet.

Proxy Servers
 Isolates internal network computers from the internet.
 The user first accesses the proxy server and the proxy server accesses the
internet and retrieves the requested web page or document. The user then gets a
copy of that page from the proxy server.
 Proxy servers sit between a client program (typically a Web browser)and an
external server (typically another server on the Web) to filterrequests, improve
performance, and share connections.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 3
RVU/Department of Computer science 2013 E/C
Telnet Servers
 A Telnet server enables users to log on to a host computer and perform tasks as
if they're working on the remote computer itself.
Web Servers
 At its core, a Web server serves static content to a Web browser byloading a file
from a disk and serving it across the network to a user'sWeb browser. The
browser and server talking to each other using HTTPmediate this entire
exchange.
Gateways
 The Internet is the collection of heterogeneous computers with
differenthardware and software platforms. Without gateways computers
willnever be able to understand and communicate with each other.Essentially,
gateways perform protocol translation between networks.
 Gateways are generally designed and used for LAN-WAN connectionsand not
for inter LAN communications. Gateways unction is to do anynecessary
conversion of protocols between networks. Gateways arecustomized and
designed to perform a specific function and are used on acase-by-case basis.
Gateways may do anything from convertingprotocols to converting application
data.

Network Cables
Cabling: -are transmissions media that used to transmitted resource from source
to destination along a network thoseare fiber optics, coaxial cable and twisted
pair cable.

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 4
RVU/Department of Computer science 2013 E/C
Network cables are used to interconnect computer & network components
together. Many cable types are available to meet the varying needs & size of the
networks from small to large. There are three major groups of cabling to connect
the majority of networks.
 Coaxial cable
 Twisted-pair cable
 Fibre-optic cable
The choices of the network cable for a particular networking purpose depends
upon a number of factors like:-
 Cost; budget for getting the cable
 Distance; network coverage area
 Number of computer involved
 Bandwidth; how fast data is to be transferred
Coaxial cable
In its simplest form, coaxial cable consists of a core of copper wire surrounded by
insulation, a braided metal shielding, and an outer cover. Figure 1 shows the
various components that make up a coaxial cable.

The shielding protects transmitted data by absorbing stray electronic signals, called
noise, so that they do not get onto the cable and distort the data. The core of a
coaxial cable carries the electronic signals that make up the data. This wire core
can be either solid or stranded. If the core is solid, it is usually copper. Surrounding
the core is an insulating layer that separates it from the wire mesh. The braided
wire mesh acts as a ground and protects the core from electrical noise. Coaxial
cable uses the BNC connector to connect to computers and other devices.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 5
RVU/Department of Computer science 2013 E/C

Coaxial cable is more resistant to interference and attenuation than twisted-pair


cabling. The stranded, protective sleeve absorbs stray electronic signals so that
they do not affect data being sent over the inner copper cable. For this reason,
coaxial cabling is a good choice for longer distances.

Figure 1 – The components of coaxial cable and the BNC connector

There are two types of coaxial cable: thinnet and thicknet. Thicknet cabling is
thicker, and a better choice for longer distances, but is more expensive and more
difficult to work with. Thinnet coaxial cable can carry a signal for a distance of up
to approximately 185 meters before the signal starts to suffer from attenuation.
Thicknet cable can carry a signal for 500 meters. Therefore, because of thicknet's
ability to support data transfer over longer distances, it is sometimes used as a
backbone to connect several smaller thinnet-based networks.

Twisted-pair cable

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 6
RVU/Department of Computer science 2013 E/C
In its simplest form, twissted-pair cable consists of two insulated strands of copper
wire twisted around each other. Figure 2 shows the two types of twisted-pair cable:
unshielded twisted-pair (UTP) and shielded twisted-pair (STP) cable.

Figure 2 – Unshielded and shielded twisted pair cabling

UTP is the most popular type of twisted-pair cable and is fast becoming the most
popular LAN cabling. It is cheap and easy to use. However, its performance over
long distances is not as good as coaxial cable. The maximum cable length segment
of UTP is 100 meters. There are a number of different types (or categories) of UTP
cable, which differ in their specification and in the number of pairs of wire
contained within the cable. Most telephone systems use UTP cable (with the RJ11
connector), and many LANs nowadays also use UTP (with the RJ45 connector).
STP is higher quality than UTP, but more expensive and less popular.

Fiber-optic cable
It is constructed of plastic and glass. In fibre-optic cable, optical fibres carry digital
data signals in the form of modulated pulses of light. This is a relatively safe way
to send data because, unlike copper-based cables that carry data in the form of
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 7
RVU/Department of Computer science 2013 E/C
electronic signals, no electrical impulses are carried over the fibre-optic cable. This
means that fibre-optic cable cannot be tapped, and its data cannot be stolen.

Fibre-optic cable is good for very high-speed, high-capacity data transmission


because of the purity of the signal and lack of signal attenuation. It cost more than
either twisted pair or coaxial cable.

Figure 3 – Fibre optic cable

Network Cable Arrangement


There are two ways of making UTP/STP cables: the straight-through cable that is
used to connect a computer to a hub or switch, and a crossover cable. Crossover
cables are only used when connecting two computers directly together, and for
hub-to-hub connections. Figure 2 shows how the different pins on the RJ45
connector should be connected for each of the two types.

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 8
RVU/Department of Computer science 2013 E/C
Figure 2 – Adding RJ45 connectors to Category 5 UTP/STP cable to make
straight-through and crossover cables

Here is what the internals of the cable look like:

Internal Cable Structure and Color Coding

Standard, Straight-Through Wiring Diagram(both ends are the same):


Wire Color Wire Diagram 10Base-T Signal
RJ45 Pin # 1000Base-T Signal
(T568A) (T568A) 100Base-TX Signal

1 White/Green Transmit+ BI_DA+

2 Green Transmit- BI_DA-

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 9
RVU/Department of Computer science 2013 E/C
Wire Color Wire Diagram 10Base-T Signal
RJ45 Pin # 1000Base-T Signal
(T568A) (T568A) 100Base-TX Signal

3 White/Orange Receive+ BI_DB+

4 Blue Unused BI_DC+

5 White/Blue Unused BI_DC-

6 Orange Receive- BI_DB-

7 White/Brown Unused BI_DD+

8 Brown Unused BI_DD-

10Base-T Signal
Wire Color Wire Diagram 1000Base-T
RJ45 Pin # 100Base-TX
(T568B) (T568B) Signal
Signal

1 White/Orange Transmit+ BI_DA+

2 Orange Transmit- BI_DA-

3 White/Green Receive+ BI_DB+

4 Blue Unused BI_DC+

5 White/Blue Unused BI_DC-

6 Green Receive- BI_DB-

7 White/Brown Unused BI_DD+

8 Brown Unused BI_DD-

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 10
RVU/Department of Computer science 2013 E/C

Crossover Cable Wiring Diagram(T568B):


RJ45 Pin # Diagram End RJ45 Pin # Diagram End
Wire Color Wire Color
(END 1) #1 (END 2) #2

1 White/Orange 1 White/Green

2 Orange 2 Green

3 White/Green 3 White/Orange

4 Blue 4 Blue

5 White/Blue 5 White/Blue

6 Green 6 Orange

7 White/Brown 7 White/Brown

8 Brown 8 Brown

Equipment, Tools and Materials needed for cable crimping.

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 11
RVU/Department of Computer science 2013 E/C
 RJ-45 Crimper
 Cat-5 UTP Cable
 RJ-45 Connectors
 Cable Tester

PROCEDURE:

Instructions

Follow the step properly.

1. Step 1

Prepare your workspace. Take the roll of UTP cable and cut the cable to
length using the cutting blade on the crimp tool.

2. Step 2

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 12
RVU/Department of Computer science 2013 E/C
Splice the end by two inches using the splicing blades to expose the
unshielded twisted pairs.

3. Step 3

Take each twisted pair and make four wire strands, each going out from the
center of the wire.

4. Step 4

Now take the individual twisted wire pairs and untwist them down to
individual wires in the following order: Striped Orange, Orange, Striped
Green, Blue, Striped Blue, Green, Striped Brown, and Brown.

5. Step 5

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 13
RVU/Department of Computer science 2013 E/C

Next, grasp the wires with your thumb and index finger of your non-
dominant hand. Take each wire and snug them securely side by side.

6. Step 6

Using the cutting blade of the crimp tool, cut the ends off of the wires to
make each wire the same height.

7. Step 7

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 14
RVU/Department of Computer science 2013 E/C
Still grasping the wires, insert the RJ-45 jack on the wires with the clip
facing away from you.

8. Step 8

Insert the jack into the crimper and press down tightly on the tool to seal
the wires in place.

9. Step 9

Once the first head is made, repeat steps two through eight. When
untwisting the wires down to sing strands, use the following order: Striped
Green, Green, Striped Orange, Blue, Striped Blue, Orange, Striped Brown,
and Brown.

10.Step 10
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 15
RVU/Department of Computer science 2013 E/C
Plug in the cable to test connectivity.

PRECAUTIONS:

For your protection, observe the following safety precautions when cutting the
cable
1. Never bend the cable
2. Ensure that the wire coding is inserted properly.
QUALITY CRITERIA:

1. Compare both end and check the proper colour code


2. Check lock if properly crimp
3. Use cable tester for the continuity of signal

Shared resource, Connecting other network Devices & peripherals


1. Network Interface Card

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 16
RVU/Department of Computer science 2013 E/C
Network interface cards, commonly referred to as NICs are used to connect a PC to
a network media. The NIC provides a physical connection between the networking
medium and the computers' internal bus, and is responsible for facilitating an
"access method" to the network. Most NICs are designed for a particular type of
network, protocol and media, although some can serve multiple networks.
NIC card functions:
LAN adapters have their own onboard architectures and they carry NIC Functions
out several important functions including
 Connectivity devices enabling a workstation, server, printer, or other node to
receive and transmit data over the network media
 This NIC has interfaces for twisted pair, thicknet, and thinnet connectors.
 Puts the data into packets and transmits packet onto the network.
 May be wired or wireless
 Monitoring activity on the communication medium
 Providing each workstation/server with a unique identification address
(MAC)
 operate on Layer 2(data link layer) of the OSI model
 Recognizing and receiving data transmitted to the computer
 Creating (building) the frames needed to transmit data on the
communication medium
 Controlling LAN transmission speed
 encode and decode information
 Transmission error detection and recovery

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 17
RVU/Department of Computer science 2013 E/C

2. Hub:A hub is the simplest of these devices. Any data packet coming from one
port is sent to all other ports. It is then up to the receiving computer to decide if
the packet is for it. Imagine packets going through a hub as messages going into
a mailing list. The mail is sent out to everyone and it is up to the receiving party
to decide if it is of interest.The biggest problem with hubs is their simplicity.
Since every packet is sent out to every computer on the network, there is a lot of
wasted transmission. This means that the network can easily become bogged
down. Hubs are typically used on small networks where the amount of data
going across the network is never very high. A device that is used to connect
several computers to form a network.A hub has several ports. The number
generally is 8, 12, 16, 24, 32, or 48
The network 'Hub' allows computers to share data packets within a network. Each
computer will be connected to a single 'port' on the hub. So an 8 port hub will be
able to connect up to eight computers together.
 Prepares data from computer for network and sends
 Receives data from network and translates for computer
 Hubs regenerate and retime network signals
 Hubs propagate signals through the network
 They cannot filter network traffic
 They cannot determine best path
 They are used as network concentration points
 They are really multi-port repeaters
 An unintelligent network device that sends one signal to all of the stations
connected to it.
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 18
RVU/Department of Computer science 2013 E/C
 All computers/devices are competing for attention because it takes the data that
comes into a port and sends it out all the other ports in the hub.
 Traditionally, hubs are used for star topology networks, but they are often used
with other configurations to make it easy to add and remove computers without
bringing down the network.
 Resides on Layer 1 of the OSI model
 Hubs cannot determine which host should get any particular message.
 A hub simply accepts electronic signals from one port and regenerates (or
repeats) the same message out all of the other ports.
 All of the ports on the Ethernet hub connect to the same channel to send and
receive messages.

3. Repeaters
A repeater receives the signal, regenerates it, and passes it on. Repeaters are used
mainly at the edges of networks to extend the wire so more workstations can be
added A repeater is a device that gives your network signals a boost so that the
signals can travel farther. You need a repeater when the total length of a single
span of network cable is larger than the maximum allowed for your cable type.
Repeaters
 Operates only in the physical layers or layer 1 in OSI model
 Can extend the physical length of a LAN
 Receive the signal before it becomes too weak or corrupted and regenerates the
original bit pattern
 Do not actually connect two LANs
 connects two segments of the same LAN
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 19
RVU/Department of Computer science 2013 E/C
 Segments connected are still part of one single LAN
 A repeater cannot connect two LANs of different protocols

Fig. 5 - Repeater

4. Switches
Switch is a device that provides a central connection point for cables from
workstations, servers, and peripherals. In a star topology, twisted-pair wire is run
from each workstation to a central switch/hub. Most switches are active, that is
they electrically amplify the signal as it moves from one device to another.
Switches no longer broadcast network packets as hubs did in the past, they
memorize addressing of computers and send the information to the correct location
directly. Switches are usually configured with 8, 12, or 24 RJ-45 ports
 Switches learn certain information about the data packets that they receive from
computers on the network.
 They use this to build forwarding tables to determine the destination of data
being sent by one computer to another on the network.

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 20
RVU/Department of Computer science 2013 E/C
 They help segment a network and reduce network traffic congestion by limiting
each port to its own collision domain.
 Split large networks into small segments, decreasing the number of users
sharing the same network resources and bandwidth.
 Understands when two devices want to talk to each other, and gives them a
switched connection
 Helps prevent data collisions and reduces network congestion, increasing
network performance.
 Most home users get very little, if any, advantage from switches, even when
sharing a broadband connection.
 Resides on Layer 2 of the OSI model.

Fig. 24 port Switch

5. Bridges
A bridge goes one step up on a hub in that it looks at the destination of the packet
before sending. If the destination address is not on the other side of the bridge it
will not transmit the data.
Used to form a connection between two separate, but similar networksIn a way, it
creates an extended LAN by passing information between two or more LANsThe
bridge function is to connect separate homogeneous networks. Bridges map the

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 21
RVU/Department of Computer science 2013 E/C
Ethernet address of the nodes residing on eachnetwork segment and allow only
necessary traffic to pass through thebridge. When a packet is received by the
bridge, the bridgedetermines the destination and source segments. If the segments
aredifferent, then the packet is "forwarded" to the correct segment.Bridges are also
called "store-and-forward" device because they lookat the whole Ethernet packet
before making filtering or forwarding decisions.A bridge is a device that connects
two networks so that they act as if they are one network. Bridges are used to
partition one large network into two smaller networks for performance reasons.
 A bridge (or bridge-like device) can be used to connect two similar LAN
 The bridge examines the destination address in a frame and either forwards this
frame onto the next LAN or does not.
 The bridge examines the source address in a frame and places this address in a
routing table, to be used for future routing decisions.
 Connects two LANs and forwards or filters data packets between them.
 Creates an extended network in which any two workstations on the linked
LANs can share data.
 Transparent to protocols and to higher level devices like routers.
 Forward data depending on the Hardware (MAC) address, not the Network
address (IP).
 Resides on Layer 2 or data link layer of the OSI model.
 A layer 2 device designed to create two or more LAN segments, each of which
is a separate collision domain.
 The purpose is to filter traffic on a LAN, to keep local traffic local, yet allow
connectivity to other segments of the network.
 Filter traffic by looking at the MAC address
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 22
RVU/Department of Computer science 2013 E/C
 Has one input and one output
 Used to isolate network traffic and computers
 Has the intelligent to examine incoming packet source and destination
addresses
 Frame filtering

6. Router
Routers, layer-three devices, are much more complex, using microprocessor-
based circuitry to route packets between networks based on their IP address.
Routers provide the following services: route discovery; selection of the best
route to a destination; adaptation to changes in the network; translation from one
technology to another, such as Ethernet to token ring; packet filtering based on IP
address, protocol, or UDP/TCP port number; and connection to a WAN.
Routing achieved commercially popularity in the mid – 1980s – at a time when
large-scale Internetworking began to replace the fairly simple, homogeneous
environments. Routing is the act of moving information across an Internetwork
from a source to a destination. It is often contrasted with bridging, which perform a
similar function. Routers use information within each packet to route it from one
LAN to another, and communicate with each other and share information that
allows them to determine the best route through a complex network of many

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 23
RVU/Department of Computer science 2013 E/C
LANs.A Router is a device that transfers data from one network to another in an
intelligent way. It has the task of forwarding data packets to their destination by the
most efficient route.
In order to do this, the router has a micro computer inside it.  This holds a table in
memory that contains a list of all the networks it is connected to, along with the
latest information on how busy each path in the network is, at that moment. This is
called the 'routing table'.

 They are slower than bridges and switches but make "smart" decisions on how
to route packets received on one port to a network on another port.
 Routers are capable of segmenting the network.
 Routers are capable of segmenting a network into multiple collision domains as
well as into multiple broadcast domains.
 Routers can be computers with special network software installed on them or
they can be other devices built by network equipment manufacturers.
 Routers contain tables of network addresses along with optimal destination
routes to other networks.
 Multiport connectivity device
 Can integrate LANs and WANs running at different transmission speeds and
using a variety of protocols
 Routers operate at the Network layer (Layer 3) of the OSI Model
 Filter out broadcast transmission to alleviate network congestion
 Prevent certain types of traffic from getting to a network
 Support simultaneous local and remote activity
 Provide high network fault tolerance through redundant components

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 24
RVU/Department of Computer science 2013 E/C
 Monitor network traffic and report statistics of network
 Diagnose internal or other connectivity problems and trigger alarms
 Routers often incorporate firewall functions
 A router accepts an outgoing packet, removes any LAN headers and trailers,
and encapsulates the necessary WAN headers and trailers
 Because a router has to make wide area network routing decisions, the router
has to dig down into the network layer of the packet to retrieve the network
destination address
 A device that connects any number of LANs.
 Uses standardized protocols to move packets efficiently to their destination.
 More sophisticated than bridges, connecting networks of different types (for
example, star and token ring)
 Forwards data depending on the Network address (IP), not the Hardware
(MAC) address.
 Routers are the only one of these four devices that will allow you to share a
single IP address among multiple network clients.
 Routers can connect two or more network segments.
 A special-purpose computer that directs data traffic when several paths are
available
 A router examines the destination info in each arriving packet and then routes it
through the most efficient path available
 The router either delivers the packet to the destination computer across a local
network or forwards the packet to another router that is closer to the final
destination

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 25
RVU/Department of Computer science 2013 E/C

7. Gateway
Connects networks with different protocols like TCP/IP network. Routers and
Gateways often refer to the same device. A special-purpose computer that
connects and translates between networks that use different communications
protocols. LAN’s may use a gateway (or router) to connect to the Internet.

8. MODEM
Modulation is Computer digital signals converted to analog. Sent over analog
phone line. Demodulation – Analog signal converted back to digital
A modem converts the digital data from the computer into a continuous analogue
wave form that the telephone system is designed to deal with (Modulation).  The
reason for this is that the telephone system was originally designed for the human
voice i.e. continuous signals.  The modem also converts thealogue signal from the
telephone network back into digital data that the computer can understand.
(Demodulation).Standard modems come in two forms: - External modem that
links to your computer either through a serial or USB port, or an internal modem
that is plugged directly to the motherboard inside the computer.

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 26
RVU/Department of Computer science 2013 E/C
Figure. Internal Modem

Figure. External modem

Router vs. Switch


A router is similar in a switch in that it forwards packets based on address. But,
instead of the MAC address that a switch uses, a router can use the IP address. This
allows the network to go across different protocols.
The most common home use for routers is to share a broadband internet
connection. The router has a public IP address and that address is shared with the
network. When data comes through the router it is forwarded to the correct
computer. Because of the additional processing required for each packet, a router
has a higher latency than a switch. In addition, a router requires an initial set-up
sequence, in which the ports are programmed and certain protocols and
characteristics are enabled or disabled. A switch may be simply plugged into the
network, automatically learning how to forward frames as the network is used.
Note that some protocols (e.g., NetBEUI) can’t be routed; instead, they will pass
through a switch. Finally, switches are used within networks to forward local
traffic intelligently. Routers are used between networks to route packets between
networks in the most efficient manner.

MAC Address
A MAC address, or Media Access Control address, is a 48- or 64-bit address
associated with a network adapter. While IP addresses are associated with
software, MAC addresses are linked to the hardware of network adapters. For this
reason, the MAC address is sometimes called the hardware address, the burned-in
address (BIA), or the physical address. MAC addresses are expressed in

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 27
RVU/Department of Computer science 2013 E/C
hexadecimal notation in the following format: 01-23-45-67-89-AB, in the case of a
48-bit address, or 01-23-45-67-89-AB-CD-EF, in the case of a 64-bit address.
Colons (:) are sometimes used instead of dashes (-).
• Every computer has a unique way of identifying itself: MAC address or
physical address.
• The physical address is located on the Network Interface Card (NIC).
• MAC addresses have no structure, and are considered flat address spaces.
Software components
 Communication Protocols
 Network Operating System- NOS
 peer-to-peer (Windows Xp,Win7)
 Client-server (Windows server 2003 ‫و‬Linux)
Network Operating Systems
All network operating systems, from the simplest (such as Windows XP Home
Edition) to the most complex (such as Windows Server 2008), must provide certain
core functions, such as

 The ability to control resources on the network,


 Ability to connect to other computers on the network,
 Share files and other resources,
 Provide for security,
Most common Network Operating systems are: -
 Windows NT Server  Windows Server 2008
 Windows 2000 Server  Windows Server 2010
 Windows Server 2003  Windows Server 2012
Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 28
RVU/Department of Computer science 2013 E/C
 Linux (Open SUSE, Ubuntu,
Red hat, Debian and etc…)
1. Network Application Software
Users can interact with network resources through application software that are
used to communicate with the network and use network resources.

The most common network application soft ware are:-


i. Email clients: Enable users to send and receive email messages from and to
mail servers
Example:
 Mozilla Thunderbird  Microsoft outlook
 Outlook express  Evolution
ii. FTP Clients: FTP Clients (File Transfer Protocol) are used to interact with
FTP servers for the sake of sharing files and folders through the network.
The enable to send and receive files, folders and software to and from FTP
servers.

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 29
RVU/Department of Computer science 2013 E/C

Data Communication and computer Network lecture Note for CS& IS Dept Complied by
Tadesse O Page 30

You might also like