SlideShare a Scribd company logo
1 of 60
Download to read offline
Chapter 13
Networks
anjan.mahanta@satreephuketipc.com
Cambridge A Level IT
13.01 Network Components
13.1 Network components
Data Packet
● An Internet Protocol (IP) data packet will include header information and the data that is
being sent.
● With the header information will be the source address, destination address, IP version
being used (e.g. IP V4), the length of the data packet and an identification number to
enable packets to be sequenced.
● The source and destination addresses will both be 32 bit IP addresses (IP V4) for
example 212.35.0.89 and they don’t change during transmission.
https://www.youtube.com/watch?v=nomyRJehhnM
2
SWITCH
● Switches are used to join computers and other
devices together in a network.
● Switches are able to inspect packets of data so that
they are forwarded appropriately to the correct
computer.
● Because a switch sends a packet of data only to the
computer it is intended for, it reduces the amount
of data on the network, thus speeding up the
network.
3
HUB
● A hub is a simple device that does not manage
any of the data traffic through it.
● lt is simply used to enable computers on the
network to share files and hardware such as
scanners and printers.
● Data is transferred through networks in
packets. A hub contains multiple ports
(connection points).
● A hub can also be classed as a multi-port
repeater. 4
HUB
● When a packet arrives at one port, it is
transferred to the other ports so that all
network devices of the LAN can see all
packets.
● Every device on the network will receive the
packet of data,which it will inspect to see if it
is intended for that device or not.
5
Wireless access point
● A wireless access point connects Wi-Fi (wireless)
enabled devices to a network.
● It uses radio waves at frequencies of 2.4 GHz or 5
GHz to transmit data.
● A wireless access point is usually connected to a
switch by a cable, although it is possible in the
home to have a combined wireless access
point/switch/router.
6
Network Interface Card (NIC)
● Before a computer can be connected to a
network, it will need to have a network
interface card.
● Most modern computers have these when you
buy the computer. These cards connect directly
to the motherboard of the computer and have
external sockets so that the computer can be
connected to a network via cables.
7
Network Interface Card (NIC)
Basically a NIC does the following:
● lt prepares the data for sending.
● lt sends the data.
● lt controls the flow of data from the computer
to the transmission media (metal wire, optical
fibre, etc.).
8
Wireless Network Interface Card (WNIC)
● A wireless NIC (WNIC) makes a device “wireless
enabled” meaning that it can connect to a
network wirelessly through a wireless access
point.
● It is most often part of the motherboard circuitry
of a laptop, printer, tablet or smartphone.
● However, it is also possible to to add a wireless
NIC to a non-wireless enabled device.
9
Routers
● Each computer linked to the internet is given a
number which is called its lP(Internet Protocol)
address.
● An lP address looks like this: 123.456.1.98 and is
unique for each device while linked to the internet.
10
Routers
● When data is transferred from one network to another the data is put into
packets.
● The packets contain details of the destination address of the network it is
intended for.
● Computers on the same network all have the same first part of the Internet
Protocol address and this is used to locate a particular network.
11
Routers
● Routers are hardware devices that read the
address information to determine the final
destination of the packet.
● From details stored in a table in the router,
the router can direct the packet onto the
next network on its journey.
● The data packet is then received by routers
on other networks and sent on its way until
finally ending up at the final destination
network.
12
Repeater
● A repeater is another name for an active
hub. It boosts the signals along a network
cable.
● This is necessary when long cable lengths are
required (typically over 100 m) and the
signal won’t be strong enough to reach the
destination.
13
Gateway
● A gateway connects two networks of a different type. It is typically used as a
router to connect a LAN to a WAN.
● When data leaves one network to move onto another network, it must pass
through the gateway. 14
BRIDGES
15
BRIDGES
● Bridges are used to connect LANs together. When one of the LANs sends a
message, all the devices on the LAN receive the message.
● This increases the amount of data flowing on the LAN. Often a large LAN is
divided into a series of smaller LANs. If a message is sent from one computer in a
LAN to another computer in a different LAN then the message needs to pass
between the LANs using a bridge.
● The advantage in subdividing a larger network is that it reduces the total network
traffic as only traffic with a different LAN as its destination will cross over the
bridge. A bridge therefore usually has only two ports in order to connect one LAN
to another LAN. 16
FIREWALL
● A firewall prevents external users gaining unauthorised
access to a computer system. It is usually positioned at
the gateway to a network and will examine all incoming
data to determine if it should be allowed.
● Data that is not allowed will be prevented from gaining
access to the network.
● A firewall is often configured as part of a router but it
can also be software that is installed on a proxy server
or individual computers.
17
SERVERS
● A server is a computer on a network which provides
resources that can be used by client devices.
● Individual servers or group of servers can perform a
variety of functions depending on how they are
configured.
● A file server’s role is to male files available for users
on the network. Depending on the permissions given
to each user or group of users, files can be created,
read, modified or deleted.
18
SERVERS
19
Print server
● A print server deals with all the print
jobs on a network.
● Each time a client computer sends a
request for printing, it will be added to
the queue on the print server.
● The print server will then deliver each
print job in turn to the printer.
20
Mail server
● A mail server receives and sends all
emails for an organization.
● The mail server can be the part of a
LAN or WAN.
● Incoming emails are checked for
viruses, phishing or spam and then
sent to the user’s mailbox.
21
Application server
● An application server delivers
software to client computers.
● This can be done by the clients
accessing the software direct from the
server or by the server managing the
installation of the software onto each
client computer.
22
Proxy server
● A proxy server deals with all requests to the internet.
● It sits between the LAN and the gateway. It will check that each request is allowed
and filter out any undesirable requests such as pornographic websites.
● It will also store webpage in a cache which will speed up the time it takes for a user to
receive a webpage. It often includes firewall software.
23
Bandwidth and bit rate
24
Bandwidth and bit rate
● Bandwidth measures the range of frequencies available on a communication
channel. This defines its capacity.
● Bandwidth is measured as a frequency range in kilohertz (kHz) or as a transmission
rate in bits per second (bps).
● Although the bandwidth is often thought of as a speed, it’s actually the number of
bits per second the line is capable of transmitting.
● It is therefore the maximum possible speed to data transfer. The transmission speed
is often referred to as the bit rate.
25
Bit streaming
● A bit stream is a series of bits which represent a stream of data transmitted at one
time.
● In networking, streaming takes place when video or audio files are sent to a
receiving device for viewing or listening to without downloading a file to save in
storage.
● With a video, the first few seconds consisting of several frames will be sent to fill a
buffer (a temporary area of storage) which can then be watched at the receiving
device.
● As the frames with the buffer are viewed, they are removed so that more frames can
be added to the buffer to keep it full.
26
Bit streaming
● A buffer is used to keep the video running smoothly.
● Without a buffer, any data congestion would be
noticed by the video pausing, missing out frames or
pixelating until the full transmission rate was
available again.
● Data congestion can be caused by devices on the
same network using up so much bandwidth that there
isn’t enough left for the full video transmission.
27
The importance of bandwidth and bit rate
when transmitting data
There are two main scenarios when bandwidth is important:
● accessing content within a time limit
○ If a user needs to download a 50Mb high quality photograph but doesn’t need to view it until several
minutes later, then bandwidth may not be a major issue.
● accessing content in real time
○ When a user needs to access streamed or live content in real time, it is essential that there is
sufficient bandwidth to stream the content without the buffer emptying at any point.
○ If the buffer empties due to the content not being streamed quickly enough, then the user will
experience pauses, pixelation or missing the video or sound.
28
The importance of bandwidth and bit rate
when transmitting data
29
Different types of communication/
transmission media govern bandwidth
Cables
● Copper cables are the main method used for connecting
devices in a LAN.
● The most common form of copper cable is unshielded
twisted pair (UTP) which is also known as an Ethernet cable.
● The cables consists of four twisted pairs of cables and are
protected by plastic tubes, but there is no earth wire, which
can result in the lost data packets at high frequencies.
30
Different types of communication/
transmission media govern bandwidth
Cables
● Copper cables are suitable over distances up to 100 meters
but beyond that the signals weakens.
● The bandwidth available is governed by the the frequencies
that the copper cable can accommodate, and electrical
interference which can result in lost data packets that will
affect the transmission rate.
● When the higher bandwidths are required, shielded twisted
pair (STP) cables can be used. They include a metal shield
around each twisted pair and an earth wire. 31
Different types of communication/
transmission media govern bandwidth
Wireless
● Less frequencies are available to wireless communication methods than to copper
cable, which means there is less bandwidth available.
● Wireless transmission is also susceptible to interference from other wireless
devices and wireless access points.
● This interference causes lost data packets which reduces the transmission rate.
● Obstacles such as walls and ceilings can reduce the strength of a wireless signal,
which means there is even less bandwidth available the further away a device is
from a wireless access point. 32
Different types of communication/
transmission media govern bandwidth
Optical
● As fibre optics are not susceptible to electrical interference, it is far less likely that
data packets will be lost.
● So, the total bandwidth available is considerably higher than with copper cables.
33
Circuit switching
● Traditional voice telephone calls using the Public Switched Telephone Network
(PSTN) are transmitted using circuit switching.
● This method of data communication sets up physical network path from the sender
to the receiver before any communication starts.
● All the data is then transmitted using this single path.
● While the circuit is open, no other devices can transmit data using that path.
34
Packet switching
● This method of data communication splits the
data to be transmitted into packets, which are
groups of bits.
● Packets will include header data which identifies
the source and destination, some of the data and
error control bits.
● Each packet can take its own route from source to
destination.
● As each packet is received by a network node,
such as a switch or router, it will be routed to the
next node. 35
Message switching
● Message switching transmits the whole set of data together from source to destination.
● It doesn’t have a predefined route. The data is sent to one network node at a time and is
temporarily stored there before being passed to the next node. This is known as store and
forward.
● Each message includes a header which contains the source and destination.
● This method is quite slow because it depends processing taking place at each node and also
requires network nodes with adequate storage capacity. 36
Optical communication method
● Optical communication method make use of light to transmit
data. The big advantage of this is that the speed of light is far
faster than any other method.
● Light travels at 300 million m/s. That means it can travel
around the whole earth 7.5 times every second or that it only
takes 0.065 seconds to travel halfway around the world.
● This means that there is negligible latency (delay) between
sending and receiving data, which makes it suitable for
real-time applications.
37
Infrared
● Infrared is the communication method used by most remote
control devices.
● It is cheap to produce and a well-recognised standard method
of transmitting simple commands.
● It works by transmitting electromagnetic radiation that is just
past the red end of the visible light spectrum, so it can’t be
seen by the human eye.
● It does not have a very high bandwidth and so is only suitable
for transmitting small amounts of data.
● Infrared will only work for short distances.
38
Fibre optic
● Fibre optics are fine strands of glass that transmit data as
light.
● As the strands are very fine, a large number can be fitted into
a small space, meaning that it is possible to transmit a lot of
data at once.
● The fine strands are also flexible, which means that the cables
can be used in buildings and around corners.
● Fibre optic have very large bandwidths. A single fibre optic
strand used in an internal network can easily carry 1 Gbps of
data.
● Security is another advantage of fibre optics.
39
Fibre optic
● The main disadvantages of fibre optics are that if they are
broken they can be complicated to repair, especially if there
are several hundred strands to fix, and they are more costly to
produce than copper cables.
● Because they suffer hardly any degradation of signal, they can
be used over large distances, including in LANs where copper
cable limits are typically 100m.
● They are also used in aircraft where weight is an important
factor, because they are lighter than copper cables.
● ISPs often use a method called fibre to the cabinet (FTTC) to
provide internet connectivity to homes. 40
Laser
● Laser is an intense beam of light that can be used to transmit
data.
● Like infrared, line of sight is necessary, but, unlike infrared,
laser beams can cover large distances.
● Laser still travels at the speed of light, but it doesn’t require a
physical connection like fibre optics.
● Lasers can be used to connect LANs between buildings. They
are suitable for this because very few data packets are lost as
there is little interference in normal atmospheric conditions.
● It is quick to set up and can be portable, making them suitable
for live events such as sports and music concerts.
41
Wireless communication/transmission
methods
Bluetooth
● Bluetooth is a wireless communication method used for the transfer of data between
devices.
● It uses wireless frequencies between 2402 and 2480 MHz.
● It splits transmission of data into packets which can be transmitted on 1 to 70 channels,
each with a bandwidth of 1 MHz.
● It is typically used with mobile phone devices to connect to a range of equipments -
headsets, smartwatch, transferring files between phones, etc.
● It requires very less power to operate. 42
Wi-Fi
● Wi-Fi enables computers and other devices to communicate wirelessly with
each other. It operates in the 2.4 GHz and 5 GHz frequencies.
● Areas where the internet can be accessed wirelessly using Wi-Fi are called
access points or hotspots and they can be found in many public places, such as
coffee bars, hotels, airports, etc.
● The range of a Wi-Fi depends on the type of wireless router being used and also
if there are obstacles such as walls in the way of the signal.
● For a home network, the range of Wi-Fi are typically 50m indoors and lOOm
outdoors.
43
Wi-Fi
● There have been many Wi-Fi standards
that have evolved over the years and they
are all referred by the number 802.11
followed by a letter.
● The 802.11ac standard supports speeds
of upto 1.3 Gbps, compared to just 450
Mbps (0.45 Gbps) on the previous
802.11n standard.
● The 2.4 GHz spectrum in 802.11n was
too crowded reducing connection speed. 44
Wi-Fi
45
Wi-Fi
Wi-Fi is used in a range of applications including:
● Connection to portable devices such as laptops, tablets and mobile phones to a
network, which could be a corporate LAN, a home LAN or a wireless hotspot.
● “Smart” televisions which use services from the internet and so require a
connection to a LAN that is connected to the internet.
● Printers that can be located anywhere in a room, without having to run
additional cables.
● ‘Casting’ of a devices screen to another device wirelessly.
● Smart home devices. 46
Radio
● Bluetooth and Wi-Fi both use radio waves.
● Another transmission method that uses radio waves is
radio-frequency identification (RFID).
● RFID uses electromagnetic fields to identify and track small RFID
chips.
● One use of RFID is to monitor the location of parcels from a
distribution warehouse to the delivery point. Each parcel can have a
RFID tag that is unique to the parcel. As it moves through the tag is
read by the RFID reader and the location gets updated in the
database. 47
Radio
● Another use of RFID is for wireless key cards that are used to
unlock doors.
● These close proximity RFID chips are known as near field
communication (NFC).
● NFC is also used by mobile phones to emulate a NFC tag on a
credit or debit card and make contactless payments.
● The mobile phone can also read NFC tags, which can be used
to activate an application, change phone settings or open a
web page.
48
Task
49
Protocol
● A communication protocol is a set of rules that ensure data is transmitted
between devices correctly.
● These rules are required so that a variety of devices and applications can
communicate together successfully.
● A protocol defines
○ the method of addressing to use
○ type of error checking to be used
○ how sending devices will indicate the start and end of a message
○ how a receiving device will confirm it has received a message
○ any data compression methods to be used
50
Types of protocol
The International Organization of
Standardardization (ISO)
published a layered model in
1983 known as Open System
Interconnection (OSI) model.
51
Abstraction layers
The Open System Interconnection (OSI) model is a framework that put protocols into seven
different layers with each layer being an abstraction of communication.
1. The physical layer of communication deals with electrical and mechanical operations.
2. The data link layer deals with data packets.
3. The network layer deals with how data is switched, routed and addressed.
4. The transport layer ensures data flows correctly without errors.
5. The session layer defines protocols between applications during a communication session.
6. The presentation layer ensures that data is in a format that can be recognized such as
types of image, types of video file and the text encoding method to use.
7. The application layer deals with specific types of communication application such as file
transfer or email. 52
POP
● Post office protocol (POP) defines the rules for email client software to retrieve emails.
● The main method that is applied is to connect to an email server, download all messages
and store them on the client computer and then delete the messages from the server.
● POP also supports encrypted transmission of emails.
● POP is a part of the application layer of the OSI model.
53
IMAP
● Internet message access protocol (IMAP) is an
alternative method for email client software to
retrieve emails.
● Instead of downloading the email and then deleting it
from the server, its default mode is to leave the email
on the server and download a copy to the client.
● This means the emails can still be accessed from a
remote location. IMAP also supports multiple folders
on a server whereas POP only supports a single folder
on the server.
● IMAP is part of the application layer of the OSI model.
54
TCP/IP
● Transmission Control Protocol / Internet Protocol (TCP/IP) is the basic communication
protocol used on the Internet and in most LANs and WANs.
● TCP/IP consists of two layers.
● TCP deals with breaking a message down into small data packets that are transmitted and
then reassembled at the receiving end.
● IP deals with the address to ensure that each packet reaches the correct destination.
● The address will be checked each time a packet reaches a gateway and routed towards the
destination.
● The IP protocol uses addresses which consist of four numbers between 0 and 255 separated
by dots. e.g. 212.58.246.90. There are approximately 4 billion of these IP addresses.
● In 2011 a new version of IP v6 was introduced which has 3.4 x 10 ^ 38 addresses.
55
FTP
● File transfer protocol (FTP) is part of the TCP/IP suite
and is used to define how computer files should be
transferred from one location to another.
● FTP allows for users to be authenticated by username
and password but also has an option for anonymous
connectivity.
● This protocol sets the rule for how a server should
respond using ASCII codes, the data format to use and
the mode of data transfer (stream, block or
compressed).
● FTP is the part of the application layer of the OSI model.
56
HTTP
● Hypertext transfer protocol (HTTP) is also part of
TCP/IP suite and is used by web browsers to send
requests to a web browser to view a web page.
● When the request is received by the web server it sends
the web page information back to the web browser.
● HTTP is insecure and so HTTPS is a secure version that
encrypts the transmission.
● HTTP is part of the transport layer of the OSI model.
57
BitTorrent Protocol
● The BitTorrent protocol specifies how multiple
downloads can take place from the same file source
concurrently.
● Several clients (peers) download portions of the file.
The peers that connect to each other directly to send
and receive those portions of the file between
themselves.
● This reduces the bandwidth required by the original
host of the file and can increase download speeds for
clients downloading large files.
● The protocol only works effectively if there are lots of
peers downloading the same file, as without lots of
peers there are less opportunities to receive portions
of the file. 58
https://skerritt.blog/bit-torrent/
BitTorrent Protocol
● A torrent is a metadata file which identifies the locations
(Uniform Resource Locators (URLs)) or trackers which
coordinate communication between the peers that are
downloading parts of the file and uploading parts for each
other to download on a peer-to-peer basis.
● When a peer wants to start downloading a file, it
announces that it wants to join the swarm.
● Peers will periodically report information on the tracker
regarding their download status and receive in exchange
information about other peers to which they can connect.
● Peers will eventually become seeders, which are clients
that have a full download of the torrent and are still making
it available to upload to other peers.
59
https://www.youtube.com/watch?v=MMnsBJeb0IQ
60

More Related Content

What's hot

Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionalityAmzadKhn
 
distributed memory architecture/ Non Shared MIMD Architecture
 distributed memory architecture/ Non Shared MIMD Architecture distributed memory architecture/ Non Shared MIMD Architecture
distributed memory architecture/ Non Shared MIMD ArchitectureHBukhary
 
Serial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmissionSerial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmissionRohanMistry15
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and TopologiesChristopher Brown
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokePranoti Doke
 

What's hot (20)

Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
networking devices
networking devicesnetworking devices
networking devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
 
distributed memory architecture/ Non Shared MIMD Architecture
 distributed memory architecture/ Non Shared MIMD Architecture distributed memory architecture/ Non Shared MIMD Architecture
distributed memory architecture/ Non Shared MIMD Architecture
 
Serial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmissionSerial vs Parallel communication & Synchronous and Asynchronous transmission
Serial vs Parallel communication & Synchronous and Asynchronous transmission
 
network Switch
 network Switch network Switch
network Switch
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
Data Communication Basics
Data Communication BasicsData Communication Basics
Data Communication Basics
 
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICESCOMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Bridge
BridgeBridge
Bridge
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Unit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti dokeUnit 2 cnd_22634_pranoti doke
Unit 2 cnd_22634_pranoti doke
 
Switch
SwitchSwitch
Switch
 
Network switch
Network switchNetwork switch
Network switch
 

Similar to 13.01 Network Components

Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using themAnjan Mahanta
 
Computer networks
Computer networks Computer networks
Computer networks ABUBAKAR270
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptxSankalpThaware
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)howare
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1Roman Brovko
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network ComponentsJyoti Akhter
 
homenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptxhomenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptxReyEvangelista2
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksamudha arul
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 

Similar to 13.01 Network Components (20)

Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
Final isp
Final ispFinal isp
Final isp
 
Computer networks
Computer networks Computer networks
Computer networks
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
 
Network devices
Network devicesNetwork devices
Network devices
 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
 
Network devices
Network devicesNetwork devices
Network devices
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 
ILL
ILLILL
ILL
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
 
Networking essentials lect1
Networking essentials lect1Networking essentials lect1
Networking essentials lect1
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
homenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptxhomenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptx
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
05-Networks-Devices.pdf
05-Networks-Devices.pdf05-Networks-Devices.pdf
05-Networks-Devices.pdf
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 

More from Anjan Mahanta

Paper 2 – Exam Revision Notes.pdf
Paper 2 – Exam Revision Notes.pdfPaper 2 – Exam Revision Notes.pdf
Paper 2 – Exam Revision Notes.pdfAnjan Mahanta
 
Project management part 2
Project management part 2Project management part 2
Project management part 2Anjan Mahanta
 
Project management part 1
Project management part 1Project management part 1
Project management part 1Anjan Mahanta
 
13.03 - Satellite communication systems
13.03 - Satellite communication systems13.03 - Satellite communication systems
13.03 - Satellite communication systemsAnjan Mahanta
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network SecurityAnjan Mahanta
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in societyAnjan Mahanta
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging TechnologiesAnjan Mahanta
 
Conditional statistical functions
Conditional statistical functionsConditional statistical functions
Conditional statistical functionsAnjan Mahanta
 
Spreadsheet if and nested if function
Spreadsheet if and nested if functionSpreadsheet if and nested if function
Spreadsheet if and nested if functionAnjan Mahanta
 
Spreadsheet lookup functions
Spreadsheet lookup functionsSpreadsheet lookup functions
Spreadsheet lookup functionsAnjan Mahanta
 
Spreadsheet text functions
Spreadsheet text functionsSpreadsheet text functions
Spreadsheet text functionsAnjan Mahanta
 
Spreadsheet Date & Time Functions
Spreadsheet Date & Time FunctionsSpreadsheet Date & Time Functions
Spreadsheet Date & Time FunctionsAnjan Mahanta
 
Storage devices and media
Storage devices and mediaStorage devices and media
Storage devices and mediaAnjan Mahanta
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
Chapter 3 Monitoring and Control
Chapter 3 Monitoring and ControlChapter 3 Monitoring and Control
Chapter 3 Monitoring and ControlAnjan Mahanta
 
Chapter 2 Hardware and Software
Chapter 2 Hardware and SoftwareChapter 2 Hardware and Software
Chapter 2 Hardware and SoftwareAnjan Mahanta
 

More from Anjan Mahanta (20)

Paper 2 – Exam Revision Notes.pdf
Paper 2 – Exam Revision Notes.pdfPaper 2 – Exam Revision Notes.pdf
Paper 2 – Exam Revision Notes.pdf
 
Project management part 2
Project management part 2Project management part 2
Project management part 2
 
Project management part 1
Project management part 1Project management part 1
Project management part 1
 
13.03 - Satellite communication systems
13.03 - Satellite communication systems13.03 - Satellite communication systems
13.03 - Satellite communication systems
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network Security
 
The role and impact of IT in society
The role and impact of IT in societyThe role and impact of IT in society
The role and impact of IT in society
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Conditional statistical functions
Conditional statistical functionsConditional statistical functions
Conditional statistical functions
 
Spreadsheet if and nested if function
Spreadsheet if and nested if functionSpreadsheet if and nested if function
Spreadsheet if and nested if function
 
Spreadsheet lookup functions
Spreadsheet lookup functionsSpreadsheet lookup functions
Spreadsheet lookup functions
 
Spreadsheet text functions
Spreadsheet text functionsSpreadsheet text functions
Spreadsheet text functions
 
Spreadsheet Date & Time Functions
Spreadsheet Date & Time FunctionsSpreadsheet Date & Time Functions
Spreadsheet Date & Time Functions
 
Scratch Animation
Scratch AnimationScratch Animation
Scratch Animation
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Storage devices and media
Storage devices and mediaStorage devices and media
Storage devices and media
 
Using Network
Using NetworkUsing Network
Using Network
 
The Digital Divide
The Digital DivideThe Digital Divide
The Digital Divide
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Chapter 3 Monitoring and Control
Chapter 3 Monitoring and ControlChapter 3 Monitoring and Control
Chapter 3 Monitoring and Control
 
Chapter 2 Hardware and Software
Chapter 2 Hardware and SoftwareChapter 2 Hardware and Software
Chapter 2 Hardware and Software
 

Recently uploaded

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 

13.01 Network Components

  • 2. 13.1 Network components Data Packet ● An Internet Protocol (IP) data packet will include header information and the data that is being sent. ● With the header information will be the source address, destination address, IP version being used (e.g. IP V4), the length of the data packet and an identification number to enable packets to be sequenced. ● The source and destination addresses will both be 32 bit IP addresses (IP V4) for example 212.35.0.89 and they don’t change during transmission. https://www.youtube.com/watch?v=nomyRJehhnM 2
  • 3. SWITCH ● Switches are used to join computers and other devices together in a network. ● Switches are able to inspect packets of data so that they are forwarded appropriately to the correct computer. ● Because a switch sends a packet of data only to the computer it is intended for, it reduces the amount of data on the network, thus speeding up the network. 3
  • 4. HUB ● A hub is a simple device that does not manage any of the data traffic through it. ● lt is simply used to enable computers on the network to share files and hardware such as scanners and printers. ● Data is transferred through networks in packets. A hub contains multiple ports (connection points). ● A hub can also be classed as a multi-port repeater. 4
  • 5. HUB ● When a packet arrives at one port, it is transferred to the other ports so that all network devices of the LAN can see all packets. ● Every device on the network will receive the packet of data,which it will inspect to see if it is intended for that device or not. 5
  • 6. Wireless access point ● A wireless access point connects Wi-Fi (wireless) enabled devices to a network. ● It uses radio waves at frequencies of 2.4 GHz or 5 GHz to transmit data. ● A wireless access point is usually connected to a switch by a cable, although it is possible in the home to have a combined wireless access point/switch/router. 6
  • 7. Network Interface Card (NIC) ● Before a computer can be connected to a network, it will need to have a network interface card. ● Most modern computers have these when you buy the computer. These cards connect directly to the motherboard of the computer and have external sockets so that the computer can be connected to a network via cables. 7
  • 8. Network Interface Card (NIC) Basically a NIC does the following: ● lt prepares the data for sending. ● lt sends the data. ● lt controls the flow of data from the computer to the transmission media (metal wire, optical fibre, etc.). 8
  • 9. Wireless Network Interface Card (WNIC) ● A wireless NIC (WNIC) makes a device “wireless enabled” meaning that it can connect to a network wirelessly through a wireless access point. ● It is most often part of the motherboard circuitry of a laptop, printer, tablet or smartphone. ● However, it is also possible to to add a wireless NIC to a non-wireless enabled device. 9
  • 10. Routers ● Each computer linked to the internet is given a number which is called its lP(Internet Protocol) address. ● An lP address looks like this: 123.456.1.98 and is unique for each device while linked to the internet. 10
  • 11. Routers ● When data is transferred from one network to another the data is put into packets. ● The packets contain details of the destination address of the network it is intended for. ● Computers on the same network all have the same first part of the Internet Protocol address and this is used to locate a particular network. 11
  • 12. Routers ● Routers are hardware devices that read the address information to determine the final destination of the packet. ● From details stored in a table in the router, the router can direct the packet onto the next network on its journey. ● The data packet is then received by routers on other networks and sent on its way until finally ending up at the final destination network. 12
  • 13. Repeater ● A repeater is another name for an active hub. It boosts the signals along a network cable. ● This is necessary when long cable lengths are required (typically over 100 m) and the signal won’t be strong enough to reach the destination. 13
  • 14. Gateway ● A gateway connects two networks of a different type. It is typically used as a router to connect a LAN to a WAN. ● When data leaves one network to move onto another network, it must pass through the gateway. 14
  • 16. BRIDGES ● Bridges are used to connect LANs together. When one of the LANs sends a message, all the devices on the LAN receive the message. ● This increases the amount of data flowing on the LAN. Often a large LAN is divided into a series of smaller LANs. If a message is sent from one computer in a LAN to another computer in a different LAN then the message needs to pass between the LANs using a bridge. ● The advantage in subdividing a larger network is that it reduces the total network traffic as only traffic with a different LAN as its destination will cross over the bridge. A bridge therefore usually has only two ports in order to connect one LAN to another LAN. 16
  • 17. FIREWALL ● A firewall prevents external users gaining unauthorised access to a computer system. It is usually positioned at the gateway to a network and will examine all incoming data to determine if it should be allowed. ● Data that is not allowed will be prevented from gaining access to the network. ● A firewall is often configured as part of a router but it can also be software that is installed on a proxy server or individual computers. 17
  • 18. SERVERS ● A server is a computer on a network which provides resources that can be used by client devices. ● Individual servers or group of servers can perform a variety of functions depending on how they are configured. ● A file server’s role is to male files available for users on the network. Depending on the permissions given to each user or group of users, files can be created, read, modified or deleted. 18
  • 20. Print server ● A print server deals with all the print jobs on a network. ● Each time a client computer sends a request for printing, it will be added to the queue on the print server. ● The print server will then deliver each print job in turn to the printer. 20
  • 21. Mail server ● A mail server receives and sends all emails for an organization. ● The mail server can be the part of a LAN or WAN. ● Incoming emails are checked for viruses, phishing or spam and then sent to the user’s mailbox. 21
  • 22. Application server ● An application server delivers software to client computers. ● This can be done by the clients accessing the software direct from the server or by the server managing the installation of the software onto each client computer. 22
  • 23. Proxy server ● A proxy server deals with all requests to the internet. ● It sits between the LAN and the gateway. It will check that each request is allowed and filter out any undesirable requests such as pornographic websites. ● It will also store webpage in a cache which will speed up the time it takes for a user to receive a webpage. It often includes firewall software. 23
  • 24. Bandwidth and bit rate 24
  • 25. Bandwidth and bit rate ● Bandwidth measures the range of frequencies available on a communication channel. This defines its capacity. ● Bandwidth is measured as a frequency range in kilohertz (kHz) or as a transmission rate in bits per second (bps). ● Although the bandwidth is often thought of as a speed, it’s actually the number of bits per second the line is capable of transmitting. ● It is therefore the maximum possible speed to data transfer. The transmission speed is often referred to as the bit rate. 25
  • 26. Bit streaming ● A bit stream is a series of bits which represent a stream of data transmitted at one time. ● In networking, streaming takes place when video or audio files are sent to a receiving device for viewing or listening to without downloading a file to save in storage. ● With a video, the first few seconds consisting of several frames will be sent to fill a buffer (a temporary area of storage) which can then be watched at the receiving device. ● As the frames with the buffer are viewed, they are removed so that more frames can be added to the buffer to keep it full. 26
  • 27. Bit streaming ● A buffer is used to keep the video running smoothly. ● Without a buffer, any data congestion would be noticed by the video pausing, missing out frames or pixelating until the full transmission rate was available again. ● Data congestion can be caused by devices on the same network using up so much bandwidth that there isn’t enough left for the full video transmission. 27
  • 28. The importance of bandwidth and bit rate when transmitting data There are two main scenarios when bandwidth is important: ● accessing content within a time limit ○ If a user needs to download a 50Mb high quality photograph but doesn’t need to view it until several minutes later, then bandwidth may not be a major issue. ● accessing content in real time ○ When a user needs to access streamed or live content in real time, it is essential that there is sufficient bandwidth to stream the content without the buffer emptying at any point. ○ If the buffer empties due to the content not being streamed quickly enough, then the user will experience pauses, pixelation or missing the video or sound. 28
  • 29. The importance of bandwidth and bit rate when transmitting data 29
  • 30. Different types of communication/ transmission media govern bandwidth Cables ● Copper cables are the main method used for connecting devices in a LAN. ● The most common form of copper cable is unshielded twisted pair (UTP) which is also known as an Ethernet cable. ● The cables consists of four twisted pairs of cables and are protected by plastic tubes, but there is no earth wire, which can result in the lost data packets at high frequencies. 30
  • 31. Different types of communication/ transmission media govern bandwidth Cables ● Copper cables are suitable over distances up to 100 meters but beyond that the signals weakens. ● The bandwidth available is governed by the the frequencies that the copper cable can accommodate, and electrical interference which can result in lost data packets that will affect the transmission rate. ● When the higher bandwidths are required, shielded twisted pair (STP) cables can be used. They include a metal shield around each twisted pair and an earth wire. 31
  • 32. Different types of communication/ transmission media govern bandwidth Wireless ● Less frequencies are available to wireless communication methods than to copper cable, which means there is less bandwidth available. ● Wireless transmission is also susceptible to interference from other wireless devices and wireless access points. ● This interference causes lost data packets which reduces the transmission rate. ● Obstacles such as walls and ceilings can reduce the strength of a wireless signal, which means there is even less bandwidth available the further away a device is from a wireless access point. 32
  • 33. Different types of communication/ transmission media govern bandwidth Optical ● As fibre optics are not susceptible to electrical interference, it is far less likely that data packets will be lost. ● So, the total bandwidth available is considerably higher than with copper cables. 33
  • 34. Circuit switching ● Traditional voice telephone calls using the Public Switched Telephone Network (PSTN) are transmitted using circuit switching. ● This method of data communication sets up physical network path from the sender to the receiver before any communication starts. ● All the data is then transmitted using this single path. ● While the circuit is open, no other devices can transmit data using that path. 34
  • 35. Packet switching ● This method of data communication splits the data to be transmitted into packets, which are groups of bits. ● Packets will include header data which identifies the source and destination, some of the data and error control bits. ● Each packet can take its own route from source to destination. ● As each packet is received by a network node, such as a switch or router, it will be routed to the next node. 35
  • 36. Message switching ● Message switching transmits the whole set of data together from source to destination. ● It doesn’t have a predefined route. The data is sent to one network node at a time and is temporarily stored there before being passed to the next node. This is known as store and forward. ● Each message includes a header which contains the source and destination. ● This method is quite slow because it depends processing taking place at each node and also requires network nodes with adequate storage capacity. 36
  • 37. Optical communication method ● Optical communication method make use of light to transmit data. The big advantage of this is that the speed of light is far faster than any other method. ● Light travels at 300 million m/s. That means it can travel around the whole earth 7.5 times every second or that it only takes 0.065 seconds to travel halfway around the world. ● This means that there is negligible latency (delay) between sending and receiving data, which makes it suitable for real-time applications. 37
  • 38. Infrared ● Infrared is the communication method used by most remote control devices. ● It is cheap to produce and a well-recognised standard method of transmitting simple commands. ● It works by transmitting electromagnetic radiation that is just past the red end of the visible light spectrum, so it can’t be seen by the human eye. ● It does not have a very high bandwidth and so is only suitable for transmitting small amounts of data. ● Infrared will only work for short distances. 38
  • 39. Fibre optic ● Fibre optics are fine strands of glass that transmit data as light. ● As the strands are very fine, a large number can be fitted into a small space, meaning that it is possible to transmit a lot of data at once. ● The fine strands are also flexible, which means that the cables can be used in buildings and around corners. ● Fibre optic have very large bandwidths. A single fibre optic strand used in an internal network can easily carry 1 Gbps of data. ● Security is another advantage of fibre optics. 39
  • 40. Fibre optic ● The main disadvantages of fibre optics are that if they are broken they can be complicated to repair, especially if there are several hundred strands to fix, and they are more costly to produce than copper cables. ● Because they suffer hardly any degradation of signal, they can be used over large distances, including in LANs where copper cable limits are typically 100m. ● They are also used in aircraft where weight is an important factor, because they are lighter than copper cables. ● ISPs often use a method called fibre to the cabinet (FTTC) to provide internet connectivity to homes. 40
  • 41. Laser ● Laser is an intense beam of light that can be used to transmit data. ● Like infrared, line of sight is necessary, but, unlike infrared, laser beams can cover large distances. ● Laser still travels at the speed of light, but it doesn’t require a physical connection like fibre optics. ● Lasers can be used to connect LANs between buildings. They are suitable for this because very few data packets are lost as there is little interference in normal atmospheric conditions. ● It is quick to set up and can be portable, making them suitable for live events such as sports and music concerts. 41
  • 42. Wireless communication/transmission methods Bluetooth ● Bluetooth is a wireless communication method used for the transfer of data between devices. ● It uses wireless frequencies between 2402 and 2480 MHz. ● It splits transmission of data into packets which can be transmitted on 1 to 70 channels, each with a bandwidth of 1 MHz. ● It is typically used with mobile phone devices to connect to a range of equipments - headsets, smartwatch, transferring files between phones, etc. ● It requires very less power to operate. 42
  • 43. Wi-Fi ● Wi-Fi enables computers and other devices to communicate wirelessly with each other. It operates in the 2.4 GHz and 5 GHz frequencies. ● Areas where the internet can be accessed wirelessly using Wi-Fi are called access points or hotspots and they can be found in many public places, such as coffee bars, hotels, airports, etc. ● The range of a Wi-Fi depends on the type of wireless router being used and also if there are obstacles such as walls in the way of the signal. ● For a home network, the range of Wi-Fi are typically 50m indoors and lOOm outdoors. 43
  • 44. Wi-Fi ● There have been many Wi-Fi standards that have evolved over the years and they are all referred by the number 802.11 followed by a letter. ● The 802.11ac standard supports speeds of upto 1.3 Gbps, compared to just 450 Mbps (0.45 Gbps) on the previous 802.11n standard. ● The 2.4 GHz spectrum in 802.11n was too crowded reducing connection speed. 44
  • 46. Wi-Fi Wi-Fi is used in a range of applications including: ● Connection to portable devices such as laptops, tablets and mobile phones to a network, which could be a corporate LAN, a home LAN or a wireless hotspot. ● “Smart” televisions which use services from the internet and so require a connection to a LAN that is connected to the internet. ● Printers that can be located anywhere in a room, without having to run additional cables. ● ‘Casting’ of a devices screen to another device wirelessly. ● Smart home devices. 46
  • 47. Radio ● Bluetooth and Wi-Fi both use radio waves. ● Another transmission method that uses radio waves is radio-frequency identification (RFID). ● RFID uses electromagnetic fields to identify and track small RFID chips. ● One use of RFID is to monitor the location of parcels from a distribution warehouse to the delivery point. Each parcel can have a RFID tag that is unique to the parcel. As it moves through the tag is read by the RFID reader and the location gets updated in the database. 47
  • 48. Radio ● Another use of RFID is for wireless key cards that are used to unlock doors. ● These close proximity RFID chips are known as near field communication (NFC). ● NFC is also used by mobile phones to emulate a NFC tag on a credit or debit card and make contactless payments. ● The mobile phone can also read NFC tags, which can be used to activate an application, change phone settings or open a web page. 48
  • 50. Protocol ● A communication protocol is a set of rules that ensure data is transmitted between devices correctly. ● These rules are required so that a variety of devices and applications can communicate together successfully. ● A protocol defines ○ the method of addressing to use ○ type of error checking to be used ○ how sending devices will indicate the start and end of a message ○ how a receiving device will confirm it has received a message ○ any data compression methods to be used 50
  • 51. Types of protocol The International Organization of Standardardization (ISO) published a layered model in 1983 known as Open System Interconnection (OSI) model. 51
  • 52. Abstraction layers The Open System Interconnection (OSI) model is a framework that put protocols into seven different layers with each layer being an abstraction of communication. 1. The physical layer of communication deals with electrical and mechanical operations. 2. The data link layer deals with data packets. 3. The network layer deals with how data is switched, routed and addressed. 4. The transport layer ensures data flows correctly without errors. 5. The session layer defines protocols between applications during a communication session. 6. The presentation layer ensures that data is in a format that can be recognized such as types of image, types of video file and the text encoding method to use. 7. The application layer deals with specific types of communication application such as file transfer or email. 52
  • 53. POP ● Post office protocol (POP) defines the rules for email client software to retrieve emails. ● The main method that is applied is to connect to an email server, download all messages and store them on the client computer and then delete the messages from the server. ● POP also supports encrypted transmission of emails. ● POP is a part of the application layer of the OSI model. 53
  • 54. IMAP ● Internet message access protocol (IMAP) is an alternative method for email client software to retrieve emails. ● Instead of downloading the email and then deleting it from the server, its default mode is to leave the email on the server and download a copy to the client. ● This means the emails can still be accessed from a remote location. IMAP also supports multiple folders on a server whereas POP only supports a single folder on the server. ● IMAP is part of the application layer of the OSI model. 54
  • 55. TCP/IP ● Transmission Control Protocol / Internet Protocol (TCP/IP) is the basic communication protocol used on the Internet and in most LANs and WANs. ● TCP/IP consists of two layers. ● TCP deals with breaking a message down into small data packets that are transmitted and then reassembled at the receiving end. ● IP deals with the address to ensure that each packet reaches the correct destination. ● The address will be checked each time a packet reaches a gateway and routed towards the destination. ● The IP protocol uses addresses which consist of four numbers between 0 and 255 separated by dots. e.g. 212.58.246.90. There are approximately 4 billion of these IP addresses. ● In 2011 a new version of IP v6 was introduced which has 3.4 x 10 ^ 38 addresses. 55
  • 56. FTP ● File transfer protocol (FTP) is part of the TCP/IP suite and is used to define how computer files should be transferred from one location to another. ● FTP allows for users to be authenticated by username and password but also has an option for anonymous connectivity. ● This protocol sets the rule for how a server should respond using ASCII codes, the data format to use and the mode of data transfer (stream, block or compressed). ● FTP is the part of the application layer of the OSI model. 56
  • 57. HTTP ● Hypertext transfer protocol (HTTP) is also part of TCP/IP suite and is used by web browsers to send requests to a web browser to view a web page. ● When the request is received by the web server it sends the web page information back to the web browser. ● HTTP is insecure and so HTTPS is a secure version that encrypts the transmission. ● HTTP is part of the transport layer of the OSI model. 57
  • 58. BitTorrent Protocol ● The BitTorrent protocol specifies how multiple downloads can take place from the same file source concurrently. ● Several clients (peers) download portions of the file. The peers that connect to each other directly to send and receive those portions of the file between themselves. ● This reduces the bandwidth required by the original host of the file and can increase download speeds for clients downloading large files. ● The protocol only works effectively if there are lots of peers downloading the same file, as without lots of peers there are less opportunities to receive portions of the file. 58 https://skerritt.blog/bit-torrent/
  • 59. BitTorrent Protocol ● A torrent is a metadata file which identifies the locations (Uniform Resource Locators (URLs)) or trackers which coordinate communication between the peers that are downloading parts of the file and uploading parts for each other to download on a peer-to-peer basis. ● When a peer wants to start downloading a file, it announces that it wants to join the swarm. ● Peers will periodically report information on the tracker regarding their download status and receive in exchange information about other peers to which they can connect. ● Peers will eventually become seeders, which are clients that have a full download of the torrent and are still making it available to upload to other peers. 59 https://www.youtube.com/watch?v=MMnsBJeb0IQ
  • 60. 60