Sunday, September 21, 2014

Network Media Types

Network Media Types

Network media:  In the networked world, networking media is some sort of physical cable, and electromagnetic radiation also with wireless networking. 



Network media is the actual path over which an electrical signal travels as it moves from one component to another. This chapter describes the common types of network media, including twisted-pair cable, coaxial cable, fiber-optic cable, and wireless.

Network Media Types

          1. Twisted-Pair Cable
          2. Coaxial Cable
          3. Wireless Communication
          4. Comparing Media Types

    1. Twisted-Pair Cable: Twisted-pair cable is a type of cabling that is used for telephone communications and most modern Ethernet networks. A pair of wires forms a circuit that can transmit data. The pairs are twisted to provide protection against crosstalk, the noise generated by adjacent pairs. When electrical current flows through a wire, it creates a small, circular magnetic field around the wire. When two wires in an electrical circuit are placed close together, their magnetic fields are the exact opposite of each other. Thus, the two magnetic fields cancel each other out. They also cancel out any outside magnetic fields. Twisting the wires can enhance this cancellation effect.   Using cancellation together with twisting the wires, cable designers can effectively provide self-shielding for wire pairs within the network media. Two basic types of twisted-pair cable exist: unshielded twisted pair (UTP) and shielded twisted pair (STP). The following sections discuss UTP and STP cable in more detail.


UTP Cable

UTP cable is a medium that is composed of pairs of wires. UTP cable is used in a variety of networks. Each of the eight individual copper wires in UTP cable \is covered by an insulating material. In addition, the wires in each pair are twisted around each other.

UTP cable relies solely on the cancellation effect produced by the twisted wire pairs to limit signal degradation caused by electromagnetic interference (EMI) and radio frequency interference (RFI). To further reduce crosstalk between the pairs in UTP cable, the number of twists in the wire pairs varies. UTP cable must follow precise specifications governing how many twists or braids are permitted per meter (3.28 feet) of cable.

Figure 1.1  Unshielded Twisted-Pair Cable

UTP cable often is installed using a Registered Jack 45 (RJ-45) connector. The RJ-45 is an eight-wire connector used commonly to connect computers onto a local-area network (LAN), especially Ethernets.

When used as a networking medium, UTP cable has four pairs of either 22- or 24-gauge copper wire. UTP used as a networking medium has an impedance of 100 ohms; this differentiates it from other types of twisted-pair wiring such as that used for telephone wiring, which has impedance of 600 ohms.
UTP cable offers many advantages. Because UTP has an external diameter of approximately 0.43 cm (0.17 inches), its small size can be advantageous during installation. 

Figure 1.2  RJ-45 Connectors

Because it has such a small external diameter, UTP does not fill up wiring ducts as rapidly as other types of cable. This can be an extremely important factor to consider, particularly when installing a network in an older building. UTP cable is easy to install and is less expensive than other types of networking media. In fact, UTP costs less per meter than any other type of LAN cabling. And because UTP can be used with most of the major networking architectures, it continues to grow in popularity.

Disadvantages also are involved in using twisted-pair cabling, however. UTP cable is more prone to electrical noise and interference than other types of networking media, and the distance between signal boosts is shorter for UTP than it is for coaxial and fiber-optic cables.

Although UTP was once considered to be slower at transmitting data than other types of cable, this is no longer true. In fact, UTP is considered the fastest copper-based medium today. The following summarizes the features of UTP cable:

  • Speed and throughput—10 to 1000 Mbps
  • Average cost per node—Least expensive
  • Media and connector size—Small
  • Maximum cable length—100 m (short)
Commonly used types of UTP cabling are as follows:
  • Category 1—Used for telephone communications. Not suitable for transmitting data.
  • Category 2—Capable of transmitting data at speeds up to 4 megabits per second (Mbps).
  • Category 3—Used in 10BASE-T networks. Can transmit data at speeds up to 10 Mbps.
  • Category 4—Used in Token Ring networks. Can transmit data at speeds up to 16 Mbps.
  • Category 5—Can transmit data at speeds up to 100 Mbps.
  • Category 5e —Used in networks running at speeds up to 1000 Mbps (1 gigabit per second [Gbps]).
  • Category 6—Typically, Category 6 cable consists of four pairs of 24 American Wire Gauge (AWG) copper wires. Category 6 cable is currently the fastest standard for UTP.

Shielded Twisted-Pair Cable

Shielded twisted-pair (STP) cable combines the techniques of shielding, cancellation, and wire twisting. Each pair of wires is wrapped in a metallic foil. The four pairs of wires then are wrapped in an overall metallic braid or foil, usually 150-ohm cable. As specified for use in Ethernet network installations, STP reduces electrical noise both within the cable (pair-to-pair coupling, or crosstalk) and from outside the cable (EMI and RFI). STP usually is installed with STP data connector, which is created especially for the STP cable. However, STP cabling also can use the same RJ connectors that UTP uses.

Although STP prevents interference better than UTP, it is more expensive and difficult to install. In addition, the metallic shielding must be grounded at both ends. If it is improperly grounded, the shield acts like an antenna and picks up unwanted signals. Because of its cost and difficulty with termination, STP is rarely used in Ethernet networks. STP is primarily used in Europe.

Figure 1.3 Shielded Twisted-Pair Cable

The following summarizes the features of STP cable:
  • Speed and throughput—10 to 100 Mbps
  • Average cost per node—Moderately expensive
  • Media and connector size—Medium to large
  • Maximum cable length—100 m (short)
When comparing UTP and STP, keep the following points in mind:
  • The speed of both types of cable is usually satisfactory for local-area distances.
  • These are the least-expensive media for data communication. UTP is less expensive than STP.
  • Because most buildings are already wired with UTP, many transmission standards are adapted to use it, to avoid costly rewiring with an alternative cable type.

Wednesday, September 17, 2014

Network Devices

I'm posting another discussion of network devices. This will may make sense all about network devices

Network Devices

Computer network devices also known as communication devices and they constitute a data communication network. These devices are routers, switches, hubs, LAN cards, gateway, modems, hardware firewall, CSU/DSU, ISDN terminals and transceivers.  In an Ethernet or WAN network, the data communication cannot be performed without these devices.  We must have the good understanding of these devices. Much of the information will serve as a review if we have studied the CompTIA Network+.


Video: Networking Basics Introduction

1.1 Network Interface:

Network interfaces connect clients, servers, and peripherals to the network. Most network interfaces consist of a small circuit board that you insert into one of your computer's internal slots. Alternatively, modern computers sometimes include the network interface as part of their main circuit boards (motherboards). Each network interface is associated with a unique address called its media access control (MAC) address. The MAC address helps route information within your local area network and is used by switches and bridges. The MAC address is just one of several network addresses assigned to each networked client, server, or peripheral. Another network address is the device’s Internet, or TCP/IP, address. This address helps route information between networks. Every networked device maintains multiple, simultaneous network addresses which are used for different purposes.

Practical advice

  • Make sure that the network interfaces on all computers are compatible with the physical and data link protocol you have chosen. For example, if you are running a 10BaseT Ethernet network, then all network interfaces must also use this protocol.


  • Make sure that the network interface is compatible with the slot into which it will be inserted. Slots provide places on your computer's main circuit board (motherboard) where you can insert daughter circuit boards that add functionality to your computer (for example, network interfaces, modems, and so forth). Common slot types include PCI (Peripheral Component Interconnect), ISA (Industry Standard Architecture), EISA (Extended Industry Standard Architecture), among others. Each slot type specifies the speed, number of data bits used in the signal, and the number and position of wires on the motherboard used for communication inside the computer. PCI is the newest and fastest of the slots, although EISA and ISA slots are sufficient for most common network interface cards such as those for 10BaseT Ethernet. Most computers include slots of several different types. Before you order a network interface, check your computer to determine which slots are available, and then check your motherboard manual to ascertain the slot type. Order a card appropriate for your slot.
  • Purchase network interfaces from a known manufacturer whose support you trust. Make sure the manufacturer provides a competitive warranty.
  • Macintosh computers usually come with network interfaces as part of their main circuit boards. Some Windows PCs, however, still require that you purchase a network interface (for new PCs, your vendor may install the interface for you).

Common Network Devices

1.2 Hubs

A hub connects individual devices on an Ethernet network so that they can communicate with one another. The hub operates by gathering the signals from individual network devices, optionally amplifying the signals, and then sending them onto all other connected devices. You should use a hub or a switch on your Ethernet network if the network includes more than two clients, servers, or peripherals. You can see a diagram of a network containing hub.



Figures #1.2:  HUB diagram network


Video: Understanding HUB

While connect dozens of clients, peripherals, and servers via hubs, network performance may degrade if too many devices try to communicate within one area of the network. To improve performance by adding switches, bridges, or routers to the network. Each switch port, bridge port, or router port regulates traffic so that devices on the port are protected from the interfering signals of devices on other ports. Most hubs operate by examining incoming or outgoing signals for information at OSI level 1, the physical level.


Practical advice
  • Like network interfaces, your hubs must be compatible with your physical and data link level protocols. If you are running a 10BaseT Ethernet network, then you must purchase 10BaseT hubs. Some hubs, called multiprotocol hubs, can accommodate more than one physical and data link level protocol. For example, modern hubs may accommodate both 10BaseT and 100BaseTX protocols.
  • If you purchase a multiprotocol hub, then make sure that it automatically senses which protocol is being used on each port. Autosensing hubs ensure that you can connect any part of the network to any hub port. 
  • Make sure that your hub includes an AUI port (connector). (AUI is an abbreviation for attachment unit interface.) AUI ports are intended to connect with a kind of cabling called thick coaxial cable (like that used for cable TV). While this cable is no longer used frequently for Ethernet networks, AUI ports are versatile in the sense that they can be fitted with adapters to connect to many different kinds of cable (for example, thin coaxial cable or fiber).
  • Make sure that your hub includes a crossover port. Unlike regular hub ports, which connect hubs to clients, servers, or peripherals, a crossover port connects one hub to another. In order to understand this distinction, you must consider how network devices use the Ethernet cable to send and receive information. All devices on 10BaseT or 100BaseTX Ethernet networks send their information over one particular pair of wires within the cable. This particular pair of wires is called the transmit pair. Similarly, all devices receive information from a different pair of wires, called the receive pair. The location of each pair of wires within the cable is specified by the wiring standard—for example, T568B—that was selected when your network was installed. All devices on your network conform to the same standard. When regular ports on hubs receive incoming information, they transfer it from the transmit pair of the sending device to the receive pair of the destination device. Crossover ports work in a different manner than regular ports. When crossover ports on hubs receive information, they simply pass it on without transferring it between transmit and receive pairs. By refraining from any change of pairs, crossover ports ensure that the next hub on the connection receives the original information intact.
  • Some hubs can be stacked. Stackable hubs look like one, giant hub to the network. That is to say, the Ethernet restriction on the number of hubs that can be traversed in a single network does not apply to stacked hubs.
  • Purchase hubs from a known manufacturer whose support you trust. Make sure the manufacturer provides a competitive warranty. 
  • Install your hubs in a room that is cool and free of dust, if possible. Additionally, plug your hubs into an uninterrupted power supply (UPS) to ensure that they receive clean power. 

1.3 Switches

Like a hub, a switch is a device that connects individual devices on an Ethernet network so that they can communicate with one another. But a switch also has an additional capability; it momentarily connects the sending and receiving devices so that they can use the entire bandwidth of the network without interference. If you use switches properly, they can improve the performance of your network by reducing network interference.

Switches have two benefits: 
  • Switches provide each pair of communicating devices with a fast connection; and 
  • Switches segregate the communication so that it does not enter other portions of the network. (Hubs, in contrast, broadcast all data on the network to every other device on the network.) 
These benefits are particularly useful if your network is congested and traffic pools in particular areas. However, if your network is not congested or if your traffic patterns do not create pools of local traffic, then switches may cause your network performance to deteriorate. This performance degradation occurs because switches examine the information inside each signal on your network (to determine the addresses of the sender and receiver) and therefore process network information more slowly than hubs (which do not examine the signal contents). Most switches operate by examining incoming or outgoing signals for information at OSI level 2, the data link level.

Figure #1.3: Switch diagram network



Figure #1.3.1: Cisco 2960 Switch

Figure #1.3.2: Switch Interface Types


Switches, however, are more powerful than hubs and can substantially increase network performance. In order to understand how they perform this magic, it is necessary to understand first how they work. Most common switches operate by learning the MAC addresses of all connected clients, servers, and peripherals, and associating each address with one of its ports. When a switch receives an incoming signal, it creates a temporary circuit between the sender and receiver. The temporary circuit provides two important benefits.
  • First, the circuit allows the sender and receiver momentarily to exchange information without intrusion from other devices on the network. That is, each pair of communicating devices utilizes the full bandwidth (data carrying capacity) of the network instead of sharing that bandwidth, as they do in unswitched Ethernet networks. To say this another way, each switch port defines a collision domain containing only a small number of devices and thereby helps provide maximum performance for Ethernet networks.
  • Second, the circuit ensures that information travels directly between the communicating computers. This behavior differs markedly from un-switched Ethernet networks. In unswitched networks, data from a transmitting computer is sent by the nearest hub to all connected devices (not just to the recipient) and therefore congests parts of the network needlessly.

Like all network equipment, switches benefit your network only if they are deployed in the proper manner. If your network is congested and if traffic pools in certain areas, then you can improve network performance by replacing hubs with switches, or by connecting hubs to switches in a hierarchical manner. 


Practical advice

  • Your switches must be compatible with your physical and data link level protocols. If you are running a 10BaseT Ethernet network, then you must purchase a 10BaseT switch.
  • Some switches can accommodate more than one physical or data link level protocol. For example, modern switches accommodate both 10BaseT and 100BaseTX protocols. It is wise to purchase a switch with at least one 100BaseTX port, since you can interconnect your switches via their high speed ports to improve network performance even if the remainder of your network uses 10BaseT.
  • If you purchase a switch that accommodates more than one protocol, then make sure that it automatically senses which protocol is being used on each port. Autosensing switches ensure that you can connect any part of the network to any switch port. Older switches required that you attach each segment of the network to a port compatible with its physical and data link level protocol. Keeping the segments and ports straight presents a management headache.
  • Purchase switches from a known manufacturer whose support you trust. Make sure the manufacturer provides a competitive warranty.
  • Install your switches in a room that is cool and free of dust, if possible. Additionally, plug your switches into an uninterrupted power supply (UPS) to ensure that they receive clean power.

1.4 Bridges



A bridge is a device that connects two or more local area networks, or two or more segments of the same network. For example, suppose that your network includes both 10BaseT Ethernet and LocalTalk connections. You can use a bridge to connect these two networks so that they can share information with each other. In addition to connecting networks, bridges perform an additional, important function. They filter information so that network traffic intended for one portion of the network does not congest the rest of the network. (You may remember from the previous section that switches also perform


Like switches, bridges learn the MAC addresses of all connected clients, servers, and peripherals, and associate each address with a bridge port (network connection). When a bridge (or switch) receives an incoming frame, it opens and reads its destination MAC address. If the port that will receive the frame is different from the port connected to the sender, then the bridge forwards the frame to the destination port. If the port that will receive the frame is the same as the port connected to the sender, the bridge drops the frame. (Since the bridge is by definition at the end of the network segment, the receiving computer presumably intercepted a copy of the frame on its way to the bridge.) If the bridge cannot determine which port is associated with a destination address, it passes the frame along to all ports.

Bridges are relatively simple and efficient traffic regulators. However, in some networks they have been replaced by their more powerful cousins—hubs, switches, and routers. Each of these traffic regulators brings a unique set of strengths and weaknesses to its work:
  • Hubs, switches, bridges, and routers can interconnect two different kinds of networks such as 10BaseT Ethernet and 100BaseTX.
  • Hubs (unlike switches, bridges, and routers) do not filter traffic between the two networks.
  • Switches have the unique capability to enable communicating devices momentarily to utilize the full bandwidth (data carrying capacity) of the network.
  • However, switches (and hubs) cannot accommodate the variety of protocols and cabling types that bridges can.
  • Routers are much more expensive and much more difficult to install and manage than hubs, switches, or bridges, but they can filter and route information much more precisely.
Practical advice
  • Before you decide on your purchase, take a moment to clarify what you wish to achieve . Then work with your technical staff, or with manufacturers and consultants, to determine your options. You can often use a hub, switch, or router in the same places that you can use a bridge. Each device brings its unique set of strengths and weaknesses to the job.
  • Make sure that the bridge is compatible with your physical and data link protocols.
  • Purchase bridges from a known manufacturer whose support you trust. Make sure the manufacturer provides a competitive warranty.
  • Install your bridges in a room that is cool and free of dust, if possible. Additionally, plug your bridges into an uninterrupted power supply (UPS) to ensure that they receive clean power.
1.5 Routers
Like bridges, routers connect two or more networks. However, routers are much more powerful than bridges. Routers can filter traffic so that only authorized personnel can enter restricted areas. They can permit or deny network communications with a particular Web site. They can recommend the best route for information to travel. As network traffic changes during the day, routers can redirect information to take less congested routes.

If your school is connected to the Internet, then you will most likely use a router to make that connection. Routers ensure that your local area network traffic remains local, while passing onto the Internet all your electronic mail, Web surfing connections, and other requests for Internet resources.

Figure #1.5: Modular Cisco Router with a Blank Slot to the Right

Routers are generally expensive to purchase and difficult to configure and maintain. Be sure that your staff have the resources necessary to manage them well. Routers quickly become critical components of your network. If they fail, your network services will be significantly impaired. As part of your network plan, you should consider how you might
deal with the failure of key routers on your network. Many sites include redundant connections—additional routers and network cable connections—configured to take over if one router or connection fails. Most routers operate by examining incoming or outgoing signals for information at OSI level 3, the network addressing level.

Routers operate primarily by examining incoming data for its network routing and transport information—for example, information carried within the TCP/IP, IPX/SPX, or AppleTalk portions of the network signal. This information includes the source and destination network routing addresses. (Remember that every client, server, and peripheral on the network maintains multiple addresses, including both a data link and network routing addresses. Among other things, the network routing address provides information on which routers base traffic management decisions.) However, most routers also include the same functionality as bridges. That is, they can inspect the data link level portions of the network signals for such information as the Ethernet or LocalTalk destination address. 

Based on complex, internal tables of network information that it compiles, a router then determines whether or not it knows how to forward the data packet towards its destination. If the router has been configured with sufficient information to know which of its ports is en route to the destination, it transmits the packet. If the router has not been so configured, it typically drops the packet. Dropping unknown packets provides an important service to your network by eliminating restricted, wayward, or damaged information from your network. Bridges lack this capability they forward unknown packets to all ports and the misinformation they forward often creates extra network traffic. 

Routers can be programmed to prevent information from being sent to or received from certain networks or computers based on all or part of their network routing addresses. If you have sensitive student records on a server, for example, you can use a router to filter packets headed for the server so that only authorized personnel—for example, personnel whose network addresses match a specified list—can connect to it.

Since routers play a key role in connecting networks, they can cause significant problems if they malfunction. As part of your network plan, you should consider how you might deal with the failure of key routers on your network. Many sites include redundant connections—additional routers and network cable connections—configured to take over if one router or connection fails.  Because routers depend upon network routing addresses, we say in the parlance of the OSI model that they are level 3 devices level 3 manages routing information between different networks.

Practical advice
  • It is best to purchase all routers from a single manufacturer. Purchasing routers from a single manufacturer ensures that the software you use to configure and manage the routers via the network will be compatible across devices. Additionally, your staff will find it easier to learn about and operate devices that are relatively uniform because they come from a single source. Make sure that your router manufacturer offers a wide variety of routers, including models for local area networks, dial-up connections, and wide area networks so that you can continue to purchase from the same manufacturer as your network grows. Consult with other educators to see which router manufacturers they have used and liked.
  • Before you purchase a router, you should draw a picture of your network, including the place where intend to put your router. Then label the segments on either side of the router with the kind of cable used as well as with the protocols that will travel across the router to/from each segment. Your router must accommodate the cable types on all adjacent segments. In addition, the router must be compatible with protocols that appear on both sides of the router.
  • Work with your router manufacturer or network integrator to choose the router model(s) that you need. Be sure that you can describe to your manufacturer/integrator not only the protocols in use, but also the kind of information that will be exchanged on the attached network, the kinds of information that may be restricted, the number of users, and their patterns of usage. You must match your router's capabilities to your particular network needs.
  • Routers are often expensive. Your router should be easily upgraded so that you need not replace the entire device as your network incorporates additional kinds of cable or protocols. Ask your manufacturer about the particular expansion modules they offer, and what is involved in purchasing, installing, and maintaining them.
  • Some managers plan to deliver multimedia applications over the Internet. These applications require a fast, steady stream of data to function properly. To deliver this increased performance, Internet standards organizations have defined options that allow routers and other network devices to reserve the bandwidth they need on the Internet. Such equipment is assures quality of service, or QoS, for specified purposes. Not all routers are capable of providing QoS services. If you are planning for multimedia delivery over the Internet, you may wish to make sure that your router does so.
  • Price should not be the determining factor in purchasing a router. Routers, like servers, are key components of your network. It is far better to purchase durable equipment from premium manufacturers than to suffer equipment breakdowns or malfunctions.
1.6 Firewalls and proxy servers


A firewall is a device that prevents unauthorized electronic access to your entire network. The term firewall is generic, and includes many different kinds of protective hardware and software devices. Routers, discussed in the previous section, comprise one kind of firewall. Most firewalls operate by examining incoming or outgoing packets for information at OSI level 3, the network addressing level.



Firewalls can be divided into 3 general categories: packet-screening firewalls, proxy servers (or application-level gateways), and stateful inspection proxies.

Packet-screening firewalls examine incoming and outgoing packets for their network address information. You can use packet-screening firewalls to restrict access to specific Web sites, or to permit access to your network only from specific Internet sites.

Figure #1.6: Firewall
Proxy servers (also called application-level gateways) operate by examining incoming or
outgoing packets not only for their source or destination addresses but also for information carried within the data area of each network packet. The data area contains information written by the application program that created the packet—for example, your Web browser, FTP, or TELNET program. Because the proxy server knows how to examine this application-specific portion of the packet, you can permit or restrict the behavior of individual programs.

Stateful inspection proxies monitor network signals to ensure that they are part of a legitimate ongoing conversation (rather than malicious insertions).

Besides firewalls, other types of security software may also be useful. For example, intrusion detection software monitors your network for particular kinds of malicious activity (attempts to steal passwords, for example). Filtering software maintains lists of Web sites that are permitted or restricted for students, and enforces those restrictions.


Many schools combine one or more of these solutions to create their network security system. Each solution has strengths and weaknesses. In order to choose a solution, you should begin by defining your security policy (the resources you wish to share or restrict, and the personnel who will have access to each resource). Then work with your manufacturer to ensure that your security
solution meets your needs.


Practical advice

Firewalls (packet-screening, proxy, and stateful inspection) provide logs of traffic which you should monitor frequently. Logs indicate the people and resources that are active on your network. Also, the firewall should contain two network interfaces—one connected to the outside world and the other connected to your private network; the firewall operates by controlling the flow of information between the two.

Firewalls provide logs of traffic which you should monitor frequently. Logs indicate the people and resources that are active on your network. Also, the firewall should contain two network interfaces—one connected to the outside world and the other connected to your private network; the firewall operates by controlling the flow of information between the two.



When you add a firewall to your network, you must situate the firewall equipment so that it is the single point of access to all those resources on your network that you consider private. To visualize such a configuration, you can examine a picture of typical firewall and network at


When the firewall forms a single point of access, it can review all inbound network traffic to determine whether it should reach private data, and it can review all outbound traffic to determine whether it is bound for an acceptable destination.

Computers that contain public information, such as Web servers, are not usually protected by firewalls. While it is relatively straightforward to define which outsiders should access your private information and to configure your firewall appropriately, it is very hard to define which outsiders should be excluded from your public information. In order to protect Web servers, you generally approach the problem from an entirely different point of view. You try to ensure that no one can add information to your server unless they have specific privilege to do so, and that malicious users cannot disrupt its activities. To enforce these restrictions, you configure the Web server operating system,
Web server software, and associated software. These topics are beyond the scope of this Primer, but you can find an excellent discussion at the World Wide Web Consortium,

You should avoid mixing security products from different manufacturers. Incompatibilities among equipment can cause unnecessary work and security risks. Security is a very complex topic, and you must understand the possible solutions in order to make a good selection of hardware and software. There are many possible types of equipment, network configurations, and manufacturers. Take your time and research the area thoroughly before you purchase. 
Video: Common Network Components

Monday, September 15, 2014

Common Network

Common Network Devices


 Introduction
Computer networking devices are units that mediate data in a computer network and are also called network equipment. Units which are the last receiver or generate data are called hosts or data terminal equipment. All but the most basic of networks require devices to provide connectivity and functionality. Understanding how these networking devices operate and identifying the functions they perform are essential skills for any network administrator and requirements for a Network. This chapter introduces commonly used networking devices, and, although it is true that you are not likely to encounter all of the devices mentioned.

Common Network Devices
ü  Hubs
ü  Switches
ü  Bridges
ü  Routers
ü  Gateways
ü  CSU/DSU (Channel Service Unit/Data Service Unit)
ü  NICs (Network Interface Card)
ü  ISDN (Integrated Services Digital Network) adapters
ü  WAPs (Wireless Access Point)
ü  Modems
ü  Transceivers (media converters)
ü  Firewalls

HUBS:
At the bottom of the networking food chain, so to speak, are hubs. Hubs are used in networks that use twisted-pair cabling to connect devices. Hubs can also be joined together to create larger networks. Hubs are simple devices that direct data packets to all devices connected to the hub, regardless of whether the data package is destined for the device. This makes them inefficient devices and can create a performance bottleneck on busy networks. In its most basic form, a hub does nothing except provide a pathway for the electrical signals to travel along. Such a device is called a passive hub.
Far more common nowadays is an active hub, which, as well as providing a path for the data signals, regenerates the signal before it forwards it to all of the connected devices. A hub does not perform any processing on the data that it forwards, nor does it perform any error checking. Hubs come in a variety of shapes and sizes.Hubs don’t perform any processing, they do little except enable communication between connected devices. For today’s high-demand network applications switches come in.

SWITCHES:
Like hubs, switches are the connectivity points of an Ethernet network. Devices connect to switches via twisted-pair cabling, one cable for each device. The difference between hubs and switches is in how the devices deal with the data that they receive. Whereas a hub forwards the data it receives to all of the ports on the device, a switch forwards it only to the port that connects to the destination device. It does this by learning the MAC address of the devices attached to it, and then by matching the destination MAC address in the data it receives. 

Figure#1 – Cisco 2960 Switch

By forwarding data only to the connection that should receive it, the switch can improve network performance in two ways. 

First by creating a direct path between two devices and controlling their communication, it can greatly reduce the number of collisions on the network. Collisions occur on Ethernet networks when two devices attempt to transmit at exactly the same time. In addition, the lack of collisions enables switches to communicate with devices in full-duplex mode. In a full-duplex configuration, devices can send and receive data from the switch at the same time. Contrast this with half-duplex communication, in which communication can occur in only one direction at a time. The net result of these measures is that switches can offer significant performance improvements over hub-based networks, particularly when network use is high.

HUB & SWITCH Cabling
In addition to acting as a connection point for network devices, hubs and switches can also be connected to create larger networks. This connection can be achieved through standard ports with a special cable or by using special ports with a standard cable. The ports on a hub to which computer systems are attached are called Medium Dependent Interface-Crossed (MDI-X). The crossed designation is derived from the fact that two of the wires within the connection are crossed so that the send signal wire on one device becomes the receive signal of the other. Because the ports are crossed internally, a standard or straight-through cable can be used to connect devices. Another type of port, called a Medium Dependent Interface (MDI) port, is often included on a hub or switch to facilitate the connection of two switches or hubs. Because the hubs or switches are designed to see each other as simply an extension of the network, there is no need for the signal to be crossed. If a hub or switch does not have an MDI port, hubs or switches can be connected by using a crossover cable between two MDI-X ports. The crossover cable serves to uncross the internal crossing. You can see diagrams of the cable pinouts for both a straight-through and crossover cable.


Figure#2: Straight Through Cable

Figure#3: Crossover Cable

Figure#4: Straight Through & Crossover Cable

BRIDGES:
Bridges are used to divide larger networks into smaller sections. They do this by sitting between two physical network segments and managing the flow of data between the two. By looking at the MAC address of the devices connected to each segment, bridges can elect to forward the data (if they believe that the destination address is on another interface), or block it from crossing (if they can verify that it is on the interface from which it came). Figure-5 shows how a bridge can be used to segregate a network.



 Figure#5: Bridge Network

When bridges were introduced, the MAC addresses of the devices on the connected networks had to be entered manually, a time-consuming process that had plenty of opportunity for error. Today, almost all bridges can build a list of the MAC addresses on an interface by watching the traffic on the network. Such devices are called learning bridges because of this functionality.

Routers
In a common configuration, routers are used to create larger networks by joining two network segments. CISCO router used to connect user to the Internet. A router can be a dedicated hardware device or a computer system with more than one network interface and the appropriate routing software. All modern network operating systems include the functionality to act as a router.
Figure#6: CISCO Router
A router derives its name from the fact that it can route data it receives from one network onto another. When a router receives a packet of data, it reads the header of the packet to determine the destination address. Once it has determined the address, it looks in its routing table to determine whether it knows how to reach the destination and, if it does, it forwards the packet to the next hop on the route. The next hop might be the final destination, or it might be another router.

Gateways
Any device that translates one data format to another is called a gateway. Some examples of gateways include a router that translates data from one network protocol to another, a bridge that converts between two networking systems, and a software application that converts between two dissimilar formats. The key point about a gateway is that only the data format is translated, not the data itself. In many cases, the gateway functionality is incorporated into another device.

Network Cards (NIC)
Network cards, also called Network Interface Cards, are devices that enable computers to connect to the network. When specifying or installing a NIC, you must consider the following issues:

Figure#7: Network Card
System bus compatibility—If the network interface you are installing is an internal device, bus compatibility must be verified. The most common bus system in use is the Peripheral Component Interconnect (PCI) bus, but some older systems might still use Industry Standard Architecture (ISA) expansion cards.

System resources—Network cards, like other devices, need IRQ and memory I/O addresses. If the network card does not operate correctly after installation, there might be a device conflict.

Media compatibility—Today, the assumption is that networks use twisted-pair cabling, so if you need a card for coaxial or fiber-optic connections, you must specify this. Wireless network cards are also available. Even more than the assumption you are using twisted-pair cabling is that the networking system being used is Ethernet. If you require a card for another networking system such as Token Ring, this must be specified when you order.

Figure#8: Wireless Network Card
To install or configure a network interface, you will need drivers of the device, and might need to configure it, although many devices are now plug and play. Most network cards are now software configured. Many of these software configuration utilities also include testing capabilities. The drivers and software configuration utilities supplied with the cards are often not the latest available, so it is best practice to log on to the Internet and download the latest drivers and associated software.

Wireless Access Points
Wireless access points (APs) are a transmitter and receiver (transceiver) device used to create a wirelessLAN (WLAN). APs are typically a separate network device with a built-in antenna, transmitter, and adapter. APs use the wireless infrastructure network mode to provide a connection point between WLANs and a wired Ethernet LAN. APs also typically have several ports allowing a way to expand the network to support additional clients.

Figure#9: CISCO Wireless Access Points
Depending on the size of the network, one or more APs might be required. Additional APs are used to allow access to more wireless clients and to expand the range of the wireless network. Each AP is limited by a transmissions range—the distance a client can be from an AP and still get a usable signal. The actual distance depends on the wireless standard being used and the obstructions and environmental conditions between the client and the AP.

Saying that an AP is used to extend a wired LAN to wireless clients doesn’t give you the complete picture. A wireless AP today can provide different services in addition to just an access point. Today, the APs might provide many ports that can be used to easily increase the size of the network. Systems can be added and removed from the network with no affect on other systems on the network. Also, many APs provide firewall capabilities and DHCP service. When they are hooked up, they will provide client systems with a private IP address and then prevent Internet traffic from accessing client systems. So in effect, the AP is a switch, a DHCP Server, router, and a firewall. APs come in all different shapes and sizes. Many are cheaper and designed strictly for home or small office use. Such APs have low powered antennas and limited expansion ports. Higher end APs used for commercial purposes have very high powered antennas enabling them to extend the range that the wireless signal can travel.

Modems
A modem, short for modulator/demodulator, is a device that converts the digital signals generated by a computer into analog signals that can travel over conventional phone lines. The modem at the receiving end converts the signal back into a format the computer can understand. Modems can be used as a means to connect to an ISP or as a mechanism for dialing up to a LAN. Modems can be internal add-in expansion cards, external devices that connect to the serial or USB port of a system, PCMCIA cards designed for use in laptops, or proprietary devices designed for use on other devices such as portables and handhelds. The configuration of a modem depends on whether it is an internal or external device. For internal devices, the modem must be configured with an interrupt request (IRQ) and a memory I/O address. It is common practice, when installing an internal modem, to disable the built-in serial interfaces and assign the modem the resources of one of those (typically COM2). Table-1 shows the resources associated with serial (COM) port assignments.

Table#1: Common Serial (COM) Port Resource Assignments
Port ID
IRQ
I/O
Address Associated Serial I/F Number
COM1
4
03F8
1
COM2
3
02F8
2
COM3
4
03E8
1
COM4
3
02E8
2
Table#1

For external modems, you need not concern yourself directly with these port assignments, as the modem connects to the serial port and uses the resources assigned to it. This is a much more straightforward approach and one favored by those who work with modems on a regular basis. For PCMCIA and USB modems, the plug-and-play nature of these devices makes them simple to configure, and no manual resource assignment is required. Once the modem is installed and recognized by the system, drivers must be configured to enable use of the device. Two factors directly affect the speed of the modem connection—the speed of the modem itself and the speed of the Universal Asynchronous Receiver/Transmitter (UART) chip in the computer that is connected to the modem. The UART chip controls the serial communication of a computer, and although modern systems have UART chips that can accommodate far greater speeds than the modem is capable of, older systems should be checked to make sure that the UART chip is of sufficient speed to support the modem speed. The UART chip installed in the system can normally be determined by looking at the documentation that comes with the system. Table 2 shows the maximum speed of the commonly used UART chip types.

Table#2: UART Chip Speeds
UART Chip
Speed (Kbps)
8250
9600
16450
9600
16550
115,200
16650
430,800
16750
921,600
16950
921,600
Table#2: UART Chip Speeds

Transceivers (Media Converters)
The term transceiver does describe a separate network device, but it can also be technology built and embedded in devices such as network cards and modems. In a network environment, a transceiver gets its name from being both a transmitter and a receiver of signals—thus the name transceivers. Technically, on a LAN, the transceiver is responsible for placing signals onto the network media and also detecting incoming signals traveling through the same wire. Given the description of the function of a transceiver, it makes sense that that technology would be found with network cards. Although transceivers are found in network cards, they can be external devices as well. As far as networking is concerned, transceivers can ship as a module or chip type. Chip transceivers are small and are inserted into a system board or wired directly on a circuit board. Module transceivers are external to the network and are installed and function similarly to other computer peripherals, or they can function as standalone devices. There are many types of transceivers—RF transceivers, fiber optic transceivers, Ethernet transceivers, wireless (WAP) transceivers, and more. Though each of these media types is different, the function of the transceiver remains the same. Each type of the transceiver used has different characteristics, such as the number of ports available to connect to the network and whether full-duplex communication is supported.
Listed with transceivers in the CompTIA objectives are media converters. Media converters are a technology that allows administrators to interconnect different media types—for example, twisted pair, fiber, and Thin or thick coax—within an existing network. Using a media converter, it is possible to connect newer 100Mbps, Gigabit Ethernet, or ATM equipment to existing networks such as 10BASE-T or 100BASE-T. They can also be used in pairs to insert a fiber segment into copper networks to increase cabling distances and enhance immunity to electromagnetic interference (EMI).
Firewalls
A firewall is a networking device, either hardware or software based, that controls access to your organization’s network. This controlled access is designed to protect data and resources from an outside threat. To do this, firewalls are typically placed at entry/exit points of a network—for example, placing a firewall between an internal network and the Internet. Once there, it can control access in and out of that point.

Figure#8: Firewall

Although firewalls typically protect internal networks from public networks, they are also used to control access between specific network segments within a network—for example, placing a firewall between the Accounts and the Sales departments. As mentioned, firewalls can be implemented through software or through a dedicated hardware device. Organizations implement software firewalls through network operating systems (NOS) such as Linux/UNIX, Windows servers, and Mac OS servers. The firewall is configured on the server to allow or permit certain types of network traffic. In small offices and for regular home use, a firewall is commonly installed on the local system and configured
to control traffic. Many third-party firewalls are available. Hardware firewalls are used in networks of all sizes today. Hardware firewalls are often dedicated network devices that can be implemented with very little configuration and protect all systems behind the firewall from outside sources. Hardware firewalls are readily available and often combined with other devices today. For example, many broadband routers and wireless access points have firewall functionality built in. In such case, the router or WAP might have a number of ports available to plug systems in to.

MAC Addresses
A MAC address is a unique 6-byte address that is burned into each network interface or more specifically, directly into the PROM chip on the NIC. The number must be unique, as the MAC address is the basis by which almost all network communication takes place. No matter which networking protocol is being used, the MAC address is still the means by which the network interface is identified on the network. Notice that I say network interface. That’s very important, as a system that has more than one network card in it will have more than one MAC address. MAC addresses are expressed in six hexadecimal values. In some instances, the six values are separated by colons (:); in others, hyphens (-) are used; and in still others, a space is simply inserted between the values. In any case, because the six values are hexadecimal, they can only be numbers 0–9 and the letters A–F. So, a valid MAC address might be 00-D0-56-F2-B5-12 or 00-26-DD-14-C4-EE. 

There is a way of finding out whether a MAC address exists through the IEEE, which is responsible for managing MAC address assignment. The IEEE has a system in place that lets you identify the manufacturer of the network interface by looking at the MAC address. For example, in the MAC address 00-80-C8-E3-4C-BD, the 00-80-C8 portion identifies the manufacturer and the E3-4C-BD portion is assigned by the manufacturer to make the address unique. The IEEE is the body that assigns manufacturers their IDs, called Organizationally Unique Identifiers, and the manufacturer then assigns the second half, called the Universal LAN MAC address. From the IEEE’s perspective, leaving the actual assignment of The method by which you can discover the MAC address of the network interfaces in your equipment depends on which operating system is being used. Table 3.5 shows you how to obtain the MAC address on some of the more common platforms.
Table 3.4 Network Devices Summary (continued)
Table#3 Commands to Obtain MAC Addresses

Platform
Method
Windows 95/98/Me
Run the winipcfg utility.
Windows NT/2000
Run ipconfig /all from a command prompt.
Linux/Some UNIX
Run the ifconfig -a command.
Novell NetWare
Run the config command.
Cisco Router
Run the sh int <interface name> command.

save tiger save sundorban

বুদ্ধিভিত্তিক প্রতারক

বুদ্ধিভিত্তিক প্রতারক বনাম সুন্দরবন। ছবির উপরের বাম পাশ হইতে বয়ান শুরু করিলাম ১ম ও ২য় জন আন্দোলনের সাথে ফাকিস্তানি আতাত নয়, ফ...