尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187
CNW 101 ASSIGNMENT INFORMATICS Page 1
ROUTER
Routers are networking devices used to extend or segment networks by forwarding
packets from one logical network to another. Routers are most often used in large
internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and
local area networks (LANs) to the Internet using dedicated leased lines.
ADVANTAGES OF ROUTER
 Routers have advanced features that allow you to implement quality of services
using querying or traffic shaping, filtering traffic using access control lists
(ACLs), or protecting traffic using encryption.
 A router contains broadcasts and multicasts, when a broadcast or multicast is
received on an interface, it is not forwarded to another interface, by default.
 Routers are better at connecting different layers to technologies together such
Ethernet and token ring or FDDI and serial, without any conversion issues.
 Router can change packets on the same interface using virtual LANs (VLANS).
 Routers are commonly used to solve broadcast problems.
DISADVANTAGES OF ROUTER
 Router is more expensive than Hub, Bridge & Switch.
 Router only work with routable protocol.
 Routing updates consume bandwidth.
Increase latency due to greater degree of packet filtering.
 Router is one cannot configure a particular port.
MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187
CNW 101 ASSIGNMENT INFORMATICS Page 2
FUNCTIONS OF ROUTER
The function of a router is to manage the paths along which information is forwarded
within a network. They are necessary to facilitate communication between computers and
the Internet.
Internet data is transferred through the TCP/IP networking protocols that are designed to
communicate data. When it is transmitted, the data is split into fragments called packets.
A router is designed to direct these packets to the correct destination along the best
possible route, hence the name, router.
Routers range in size from the small ones we have in our homes and that are available
from computer shops and from Internet Service Providers, to absolutely huge models that
manage huge flows of data between computer networks and throughout the Internet. The
smaller, home-based models make it possible to share one Internet connection between a
few computers on the network, and this enables more than one person to use it, whereas
the larger ones are far more intricate and have many multi-function routing devices.
Routers come in two basic types: Dynamic and static. The dynamic comes already
programmed to manage data traffic across the network, which is managed by a routing
protocol, whereas a static router needs to be manually configured by a network
administrator who programs all of the necessary routes that are needed for data packets.
Essential services and utilities can be integrated into a network so that it is more secure
and responds more efficiently. For example, a router can be made to incorporate a
security feature such as a firewall for added protection against viruses and other nastiest
that have the ability to destroy computers and enable hackers to gather our personal
information. It is also possible to increase network function by integrating services such
as IP voice, or video capability.
SWITCH
Switches are a special type of hub that offers an additional layer of intelligence to basic,
physical-layer repeater hubs. A switch must be able to read the MAC address of each
frame it receives.
MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187
CNW 101 ASSIGNMENT INFORMATICS Page 3
ADVANTAGES OF SWITCH
 Reduces the number of Broadcast domains.
 Supports VLAN's which can help in Logical segmentation ports physical ports
splitting up the broadcast domain.
 Intelligent device compared to Hub's which can make use of CAM table for Port to
MAC mapping
 Compared to Bridges, Switches are more H/w oriented therefore operations are less
CPU intense Basic operations.
 The cost to number of ports ratio is best for a cheaper cost you get switches with
more number of ports available than Routers.
DISADVANTAGES OF SWITCH
 Not as good as a router in limiting Broadcasts
 Communication between VLAN's need inter VLAN routing Router, but these
days there are a number of Multilayer switches available in the market.
 Handling Multicast packets needs quite a bit of configuration & proper designing.
 At times switches when in Promiscuous mode is a opening for Security attacks
spoofing ip address or capturing Ethernet Frames using ethereal.
FUNCTIONS OF SWITCH
LEARNING FUNCTIONS
Learning is the process of obtaining the MAC address of connected devices. When a
frame reaches into the port of a switch, the switch reads the MAC address of the source
device from frame and compares it to its MAC address table also known as CAM
Content Addressable Memory table). If the switch cannot find a corresponding entry
in MAC address table, the switch will add the address to the table with the port
number via the frame arrived.
FORWARDING FUNCTION
Forwarding is the process of passing network traffic a device connected to one port of a
Network Switch to another device connected to another port on the switch. When
a Layer 2 frame reaches a port on the Network Switch the switch reads the source MAC
address of the frame as a part of learning function, and it also reads the destination MAC
MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187
CNW 101 ASSIGNMENT INFORMATICS Page 4
address also as a part of forwarding function. The destination MAC address is important
to determine the port number which the destination device is connected.
PREVENTING LAYER 2 SWITCHING LOOP
In practical Local Area Networking, redundant links are created to avoid complete
network failure in an event of failure in one link. Redundant links can cause layer 2
switching loops and broadcast storms. It is the function of a network switch to prevent
layer 2 switching loops and broadcast storms.
REPEATER
A digital device that amplifies, reshapes, retimes, or performs a combination of any of
these functions on a digital input signal for retransmission.
ADVANTAGE OF REPEATER
 Makes it easy to expand a network over a large distance.
 Connection between various types of media example fibre optic, UTF, coaxial
cable is possible.
DISADVANTAGE OF REPEATER
 Traffic cannot be filtered to ease congestion.
 A repeater cannot work across multiple network architectures.
FUNCTIONS OF REPEATER
A repeater is used to amplify signals carried by a network. The function of a repeater is to
receive incoming signals or a packet of data, regenerate the signals to their original
strength and retransmit them. When a repeater amplifies the electric signals in a network,
MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187
CNW 101 ASSIGNMENT INFORMATICS Page 5
they allow transmissions to travel a greater distance. For a repeater to work, both network
segments must be identical.
Repeaters are used to lengthen individual network segments to form a large extended
network.
Repeaters are used to boost signals in coaxial and twisted pair cable and in optical
fiber lines. An electrical signal in a cable gets weaker the further it travels, due to energy
dissipated in conductor resistance and dielectric losses. Similarly a light signal traveling
through an optical fiber suffers attenuation due to scattering and absorption. In long cable
runs, repeaters are used to periodically regenerate and strengthen the signal.
BRIDGE
BRIDGE: This is device filters data traffic at a network boundary. Bridges reduce the
amount of traffic on a LAN by dividing it into two segments.
ADAVANTAGES OF BRIDGE
 Bridges are self configuring.
 Primitive bridges are often inexpensive.
 Reduce size of collision domain by micro segmentation in non switched
networks.
 Transparent to protocols above the MAC layer.
 Allows the introduction of management performance information and access
control.
 LANs interconnected are separate and physical constraints such as number of
stations, repeaters and segment length.
MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187
CNW 101 ASSIGNMENT INFORMATICS Page 6
DISADVANTAGES OF BRIDGE
 Does not limit the scope of broadcasts.
 Does not scale to extremely large networks.
 Buffering introduces store and forward delays - on average traffic destined for
bridge will be related to the number of stations on the rest of the LAN.
 Bridging of different MAC protocols introduces errors.
 Because bridges do more than repeaters by viewing MAC addresses, the extra
processing makes them slower than repeaters.
 Bridges are more expensive than repeaters.
FUNCTIONS OF BRIDGE
Collision
A network connects a number of computers together with one cable. The data passed
over the cable is an electronic pulse that travels the length of the wire. More than one
message pulsing on the cable would merge and interfere with each other. Only one device
can transmit at any one time. If a network connects a large number of computers, each
would have to wait a long time to get a turn applying data to the line. The main reason for
segmenting networks is to reduce the number of devices connected to the same wire and
thus reduce the wait time for transmission. A network bridge unites these segments.
Installation
Bridges operate with MAC addresses. On being introduced to a network, the bridge
learns the MAC addresses of the devices on each segment to which it connects. It then
keeps a table of these locations. The MAC address is the physical address of a computer
and is hard-coded onto the computer's network adapter.
Operation
Once the bridge has compiled its filtering table it operates by listening to the data packets
traveling on each segment. If it receives a data packet where the source and destination
addresses are on the same segment, it ignores it. This is called ''filtering." If the source
and destination of the packet are on different segments, it passes the packet through to the
segment containing the destination computer.
MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187
CNW 101 ASSIGNMENT INFORMATICS Page 7
GATEWAY
A gateway is a device used to connect networks using different protocols. Gateways
operate at the network layer of the OSI model. In order to communicate with a host on
another network, an IP host must be configured with a route to the destination network. If
a configuration route is not found, the host uses the gateway (default IP router) to
transmit the traffic to the destination host.
FUNCTIONS OF GATEWAY
 A gateway can be implemented in software, hardware and some time as a
mixture of together. There are lots of equipment’s and techniques which
are being processed such as voice and data communication.
 The gateways are the best option to achieve the multimedia
communications between dissimilar networks because every network has
different protocol and characteristics.
 Gateways are also a key mechanism of any telephony communications.
Gateway is offering bridge between telephone network and internet.
 For real time communication gateway supporting audio conversion and
carry out extinction and call setup. Gateway also controls the processing
information across the network which contains information about to set up
the actual end to end call.
 A network gateway work like a firewall and filters packets. It also
separates corporate network as intranet from a public network.
 A gateway may also install on a stand-alone device. A gateway performs
as the interface between local and wide area protocols such as TCP/IP on
the Internet.
 A gateway supervises its client devices, gather their data and execute other
task. Gateway devices allow net client to access a variety of computer
networks.
MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187
CNW 101 ASSIGNMENT INFORMATICS Page 8
 Gateway is also offering on-line services exclusive of having a preceding
service agreement or a continuing association with the service supplier.
ADVANTAGES OF GATE WAY
 Low maintenance and installing cost.
 Reliable routing experience.
 Multiple numbers of connections is possible unlike usage of general purpose
computers.
DISADVANATAGES OF GATEWAY
 Troubleshooting is hard.
 Easily be overload and slow down communication.
References
MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187
CNW 101 ASSIGNMENT INFORMATICS Page 9
 James, F.K., Keith, W.R.(2010),Computer Networking A Top-Down
Approach, Pearson Education Inc., U S A.
 Peterson, L.L., Davie, B.S., (2007), Computer Networks A systems Approach,
Elsevier, Inc., California, USA.
 Groth, D., (2002), Network+, Sybex, Inc., Alameda, California, USA.
 Sosinsky, B., (2009), Networking Bible, Wiley Publishing, Inc., Indianapolis,
Indiana, USA.
 Gallo, M.A., Hancock, W.M.,(2002), Networking Explained, Butterworth-
Heinemann, Woburn, Massachusetts, USA.
 wikipedia.com, google.com, time.com, bbc.com, twitter.com.

More Related Content

What's hot

Ccna
CcnaCcna
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
PSK Technolgies Pvt. Ltd. IT Company Nagpur
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
Kristof De Brouwer
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
projectteach
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
Ashok Panwar
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ankur Kumar
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
Kathirvel Ayyaswamy
 
Computer Network - Unit 2
Computer Network - Unit 2Computer Network - Unit 2
Computer Network - Unit 2
Chandan Gupta Bhagat
 
Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)
Jatin Singh
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
Mohd Arif
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
Diwakar Singh
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
NavleshKumar singh
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
Salahuddin Jokhio
 
Wan Technologies
Wan TechnologiesWan Technologies
Wan Technologies
AKLI
 
Wireless WANs
Wireless WANsWireless WANs
Wireless WANs
Aram
 
Wireless repeaters
Wireless repeatersWireless repeaters
Wireless repeaters
Lou Tenoso
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
Pallepati Vasavi
 
CCNA - Cisco
CCNA - CiscoCCNA - Cisco
CCNA - Cisco
mohannadalhanahnah
 
Lan wan
Lan wanLan wan
Lan wan
Nur Islam
 

What's hot (20)

Ccna
CcnaCcna
Ccna
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
Networking Brief Overview
Networking Brief OverviewNetworking Brief Overview
Networking Brief Overview
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Computer Network - Unit 2
Computer Network - Unit 2Computer Network - Unit 2
Computer Network - Unit 2
 
Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)Implementation of intelligent wide area network(wan)
Implementation of intelligent wide area network(wan)
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Wan Technologies
Wan TechnologiesWan Technologies
Wan Technologies
 
Wireless WANs
Wireless WANsWireless WANs
Wireless WANs
 
Wireless repeaters
Wireless repeatersWireless repeaters
Wireless repeaters
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
CCNA - Cisco
CCNA - CiscoCCNA - Cisco
CCNA - Cisco
 
Lan wan
Lan wanLan wan
Lan wan
 

Viewers also liked

Informatika 6 3_ismayilova terane
Informatika 6 3_ismayilova teraneInformatika 6 3_ismayilova terane
Informatika 6 3_ismayilova teranemimio_azerbaijan
 
Whatpolicy
WhatpolicyWhatpolicy
Whatpolicy
smoreland
 
Perimetra sa de cv
Perimetra sa de cvPerimetra sa de cv
Perimetra sa de cv
Ilyanna
 
Krt umass 2011
Krt umass 2011Krt umass 2011
Krt umass 2011
St.Germain Collins
 
Serangan Dari Dalam Jaringan
Serangan Dari Dalam JaringanSerangan Dari Dalam Jaringan
Serangan Dari Dalam Jaringan
Dita Tri Utami
 
Boletin Devocional 2
Boletin Devocional 2Boletin Devocional 2
Boletin Devocional 2
tommyswindow02
 
Descripcion zscaler technology
Descripcion   zscaler technologyDescripcion   zscaler technology
Descripcion zscaler technology
Ilyanna
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
michaelbasoah
 
Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014
Philippe Boivineau
 

Viewers also liked (9)

Informatika 6 3_ismayilova terane
Informatika 6 3_ismayilova teraneInformatika 6 3_ismayilova terane
Informatika 6 3_ismayilova terane
 
Whatpolicy
WhatpolicyWhatpolicy
Whatpolicy
 
Perimetra sa de cv
Perimetra sa de cvPerimetra sa de cv
Perimetra sa de cv
 
Krt umass 2011
Krt umass 2011Krt umass 2011
Krt umass 2011
 
Serangan Dari Dalam Jaringan
Serangan Dari Dalam JaringanSerangan Dari Dalam Jaringan
Serangan Dari Dalam Jaringan
 
Boletin Devocional 2
Boletin Devocional 2Boletin Devocional 2
Boletin Devocional 2
 
Descripcion zscaler technology
Descripcion   zscaler technologyDescripcion   zscaler technology
Descripcion zscaler technology
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014Gartner verizon zscaler hybrid newsletter may 2014
Gartner verizon zscaler hybrid newsletter may 2014
 

Similar to Nwk assignment body copy

Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
Siddique Ibrahim
 
Computer Networking - Complete Resume Guide
Computer Networking - Complete Resume GuideComputer Networking - Complete Resume Guide
Computer Networking - Complete Resume Guide
zcorpio
 
05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt
ssuserf7cd2b
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
Gayan Geethanjana
 
Network connecting device
Network connecting device Network connecting device
Network connecting device
SufiyanSurveahmed
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
FranzLawrenzDeTorres1
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
Raj vardhan
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
jaba kumar
 
Lan Switching[1]
Lan Switching[1]Lan Switching[1]
Lan Switching[1]
sarvodaya2001
 
Network protocol
Network protocolNetwork protocol
Network protocol
QadarAhmed1
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
ssuser2276e6
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
MDAminulIslam712665
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
Arumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
Saagar Shetage
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
CeoTranDang
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .ppt
PawanKayande1
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...
ssuser036308
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
sherinjoyson
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
ssuseree2ffc
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
DhruvilSTATUS
 

Similar to Nwk assignment body copy (20)

Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Computer Networking - Complete Resume Guide
Computer Networking - Complete Resume GuideComputer Networking - Complete Resume Guide
Computer Networking - Complete Resume Guide
 
05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
 
Network connecting device
Network connecting device Network connecting device
Network connecting device
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Lan Switching[1]
Lan Switching[1]Lan Switching[1]
Lan Switching[1]
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .ppt
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 

Recently uploaded

New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
Safe Software
 

Recently uploaded (20)

New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
 

Nwk assignment body copy

  • 1. MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187 CNW 101 ASSIGNMENT INFORMATICS Page 1 ROUTER Routers are networking devices used to extend or segment networks by forwarding packets from one logical network to another. Routers are most often used in large internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet using dedicated leased lines. ADVANTAGES OF ROUTER  Routers have advanced features that allow you to implement quality of services using querying or traffic shaping, filtering traffic using access control lists (ACLs), or protecting traffic using encryption.  A router contains broadcasts and multicasts, when a broadcast or multicast is received on an interface, it is not forwarded to another interface, by default.  Routers are better at connecting different layers to technologies together such Ethernet and token ring or FDDI and serial, without any conversion issues.  Router can change packets on the same interface using virtual LANs (VLANS).  Routers are commonly used to solve broadcast problems. DISADVANTAGES OF ROUTER  Router is more expensive than Hub, Bridge & Switch.  Router only work with routable protocol.  Routing updates consume bandwidth. Increase latency due to greater degree of packet filtering.  Router is one cannot configure a particular port.
  • 2. MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187 CNW 101 ASSIGNMENT INFORMATICS Page 2 FUNCTIONS OF ROUTER The function of a router is to manage the paths along which information is forwarded within a network. They are necessary to facilitate communication between computers and the Internet. Internet data is transferred through the TCP/IP networking protocols that are designed to communicate data. When it is transmitted, the data is split into fragments called packets. A router is designed to direct these packets to the correct destination along the best possible route, hence the name, router. Routers range in size from the small ones we have in our homes and that are available from computer shops and from Internet Service Providers, to absolutely huge models that manage huge flows of data between computer networks and throughout the Internet. The smaller, home-based models make it possible to share one Internet connection between a few computers on the network, and this enables more than one person to use it, whereas the larger ones are far more intricate and have many multi-function routing devices. Routers come in two basic types: Dynamic and static. The dynamic comes already programmed to manage data traffic across the network, which is managed by a routing protocol, whereas a static router needs to be manually configured by a network administrator who programs all of the necessary routes that are needed for data packets. Essential services and utilities can be integrated into a network so that it is more secure and responds more efficiently. For example, a router can be made to incorporate a security feature such as a firewall for added protection against viruses and other nastiest that have the ability to destroy computers and enable hackers to gather our personal information. It is also possible to increase network function by integrating services such as IP voice, or video capability. SWITCH Switches are a special type of hub that offers an additional layer of intelligence to basic, physical-layer repeater hubs. A switch must be able to read the MAC address of each frame it receives.
  • 3. MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187 CNW 101 ASSIGNMENT INFORMATICS Page 3 ADVANTAGES OF SWITCH  Reduces the number of Broadcast domains.  Supports VLAN's which can help in Logical segmentation ports physical ports splitting up the broadcast domain.  Intelligent device compared to Hub's which can make use of CAM table for Port to MAC mapping  Compared to Bridges, Switches are more H/w oriented therefore operations are less CPU intense Basic operations.  The cost to number of ports ratio is best for a cheaper cost you get switches with more number of ports available than Routers. DISADVANTAGES OF SWITCH  Not as good as a router in limiting Broadcasts  Communication between VLAN's need inter VLAN routing Router, but these days there are a number of Multilayer switches available in the market.  Handling Multicast packets needs quite a bit of configuration & proper designing.  At times switches when in Promiscuous mode is a opening for Security attacks spoofing ip address or capturing Ethernet Frames using ethereal. FUNCTIONS OF SWITCH LEARNING FUNCTIONS Learning is the process of obtaining the MAC address of connected devices. When a frame reaches into the port of a switch, the switch reads the MAC address of the source device from frame and compares it to its MAC address table also known as CAM Content Addressable Memory table). If the switch cannot find a corresponding entry in MAC address table, the switch will add the address to the table with the port number via the frame arrived. FORWARDING FUNCTION Forwarding is the process of passing network traffic a device connected to one port of a Network Switch to another device connected to another port on the switch. When a Layer 2 frame reaches a port on the Network Switch the switch reads the source MAC address of the frame as a part of learning function, and it also reads the destination MAC
  • 4. MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187 CNW 101 ASSIGNMENT INFORMATICS Page 4 address also as a part of forwarding function. The destination MAC address is important to determine the port number which the destination device is connected. PREVENTING LAYER 2 SWITCHING LOOP In practical Local Area Networking, redundant links are created to avoid complete network failure in an event of failure in one link. Redundant links can cause layer 2 switching loops and broadcast storms. It is the function of a network switch to prevent layer 2 switching loops and broadcast storms. REPEATER A digital device that amplifies, reshapes, retimes, or performs a combination of any of these functions on a digital input signal for retransmission. ADVANTAGE OF REPEATER  Makes it easy to expand a network over a large distance.  Connection between various types of media example fibre optic, UTF, coaxial cable is possible. DISADVANTAGE OF REPEATER  Traffic cannot be filtered to ease congestion.  A repeater cannot work across multiple network architectures. FUNCTIONS OF REPEATER A repeater is used to amplify signals carried by a network. The function of a repeater is to receive incoming signals or a packet of data, regenerate the signals to their original strength and retransmit them. When a repeater amplifies the electric signals in a network,
  • 5. MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187 CNW 101 ASSIGNMENT INFORMATICS Page 5 they allow transmissions to travel a greater distance. For a repeater to work, both network segments must be identical. Repeaters are used to lengthen individual network segments to form a large extended network. Repeaters are used to boost signals in coaxial and twisted pair cable and in optical fiber lines. An electrical signal in a cable gets weaker the further it travels, due to energy dissipated in conductor resistance and dielectric losses. Similarly a light signal traveling through an optical fiber suffers attenuation due to scattering and absorption. In long cable runs, repeaters are used to periodically regenerate and strengthen the signal. BRIDGE BRIDGE: This is device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments. ADAVANTAGES OF BRIDGE  Bridges are self configuring.  Primitive bridges are often inexpensive.  Reduce size of collision domain by micro segmentation in non switched networks.  Transparent to protocols above the MAC layer.  Allows the introduction of management performance information and access control.  LANs interconnected are separate and physical constraints such as number of stations, repeaters and segment length.
  • 6. MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187 CNW 101 ASSIGNMENT INFORMATICS Page 6 DISADVANTAGES OF BRIDGE  Does not limit the scope of broadcasts.  Does not scale to extremely large networks.  Buffering introduces store and forward delays - on average traffic destined for bridge will be related to the number of stations on the rest of the LAN.  Bridging of different MAC protocols introduces errors.  Because bridges do more than repeaters by viewing MAC addresses, the extra processing makes them slower than repeaters.  Bridges are more expensive than repeaters. FUNCTIONS OF BRIDGE Collision A network connects a number of computers together with one cable. The data passed over the cable is an electronic pulse that travels the length of the wire. More than one message pulsing on the cable would merge and interfere with each other. Only one device can transmit at any one time. If a network connects a large number of computers, each would have to wait a long time to get a turn applying data to the line. The main reason for segmenting networks is to reduce the number of devices connected to the same wire and thus reduce the wait time for transmission. A network bridge unites these segments. Installation Bridges operate with MAC addresses. On being introduced to a network, the bridge learns the MAC addresses of the devices on each segment to which it connects. It then keeps a table of these locations. The MAC address is the physical address of a computer and is hard-coded onto the computer's network adapter. Operation Once the bridge has compiled its filtering table it operates by listening to the data packets traveling on each segment. If it receives a data packet where the source and destination addresses are on the same segment, it ignores it. This is called ''filtering." If the source and destination of the packet are on different segments, it passes the packet through to the segment containing the destination computer.
  • 7. MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187 CNW 101 ASSIGNMENT INFORMATICS Page 7 GATEWAY A gateway is a device used to connect networks using different protocols. Gateways operate at the network layer of the OSI model. In order to communicate with a host on another network, an IP host must be configured with a route to the destination network. If a configuration route is not found, the host uses the gateway (default IP router) to transmit the traffic to the destination host. FUNCTIONS OF GATEWAY  A gateway can be implemented in software, hardware and some time as a mixture of together. There are lots of equipment’s and techniques which are being processed such as voice and data communication.  The gateways are the best option to achieve the multimedia communications between dissimilar networks because every network has different protocol and characteristics.  Gateways are also a key mechanism of any telephony communications. Gateway is offering bridge between telephone network and internet.  For real time communication gateway supporting audio conversion and carry out extinction and call setup. Gateway also controls the processing information across the network which contains information about to set up the actual end to end call.  A network gateway work like a firewall and filters packets. It also separates corporate network as intranet from a public network.  A gateway may also install on a stand-alone device. A gateway performs as the interface between local and wide area protocols such as TCP/IP on the Internet.  A gateway supervises its client devices, gather their data and execute other task. Gateway devices allow net client to access a variety of computer networks.
  • 8. MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187 CNW 101 ASSIGNMENT INFORMATICS Page 8  Gateway is also offering on-line services exclusive of having a preceding service agreement or a continuing association with the service supplier. ADVANTAGES OF GATE WAY  Low maintenance and installing cost.  Reliable routing experience.  Multiple numbers of connections is possible unlike usage of general purpose computers. DISADVANATAGES OF GATEWAY  Troubleshooting is hard.  Easily be overload and slow down communication. References
  • 9. MICHAEL ANTHONY ANYEBE GROUP 4 2308-1203-0187 CNW 101 ASSIGNMENT INFORMATICS Page 9  James, F.K., Keith, W.R.(2010),Computer Networking A Top-Down Approach, Pearson Education Inc., U S A.  Peterson, L.L., Davie, B.S., (2007), Computer Networks A systems Approach, Elsevier, Inc., California, USA.  Groth, D., (2002), Network+, Sybex, Inc., Alameda, California, USA.  Sosinsky, B., (2009), Networking Bible, Wiley Publishing, Inc., Indianapolis, Indiana, USA.  Gallo, M.A., Hancock, W.M.,(2002), Networking Explained, Butterworth- Heinemann, Woburn, Massachusetts, USA.  wikipedia.com, google.com, time.com, bbc.com, twitter.com.
  翻译: