Q4 How Is A Computer Network Categorised? Discuss The Following in Detail With Diagram
Q4 How Is A Computer Network Categorised? Discuss The Following in Detail With Diagram
Q4 How Is A Computer Network Categorised? Discuss The Following in Detail With Diagram
16
MAN (Metropolitan Area Network)
o A metropolitan area network is a network that covers a larger geographic area
by interconnecting a different LAN to form a larger network.
o Government agencies use MAN to connect to the citizens and private
industries.
o In MAN, various LANs are connected to each other through a telephone
exchange line.
o The most widely used protocols in MAN are RS-232, Frame Relay, ATM,
ISDN, OC-3, ADSL, etc.
o It has a higher range than Local Area Network (LAN).
17
WAN (Wide Area Network)
o A Wide Area Network is a network that extends over a large geographical
area such as states or countries.
o A Wide Area Network is quite bigger network than the LAN.
o A Wide Area Network is not limited to a single location, but it spans over a
large geographical area through a telephone line, fibre optic cable or satellite
links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business, government,
and education.
18
Q5 Difference between LAN, MAN and WAN.
19
Comparison Chart
BASIS OF
LAN MAN WAN
COMPARISON
a small Internet.
geographical
area.
Network Public
maintenance
20
BASIS OF
LAN MAN WAN
COMPARISON
Delay
School, City.
Hospital.
21
Q6 what are the various network connectivity devices? Explain with the
help of diagram.
ANS computer networking devices are units that mediate data in a computer
network and are also called network equipment. Units which are the last receiver
or generate data are called hosts or data terminal equipment.
Hub
Hubs connect computers together in a star topology network. Due to their design,
they increase the chances for collisions. Hubs operate in the physical layer of
the OSI model and have no intelligence. Hubs flood incoming packets to all ports
all the time. For this reason, if a network is connected using hubs, the chances of a
collision increases linearly with the number of computers (assuming equal
bandwidth use). Hubs pose a security risk since all packets are flooded to all ports
all the time. If a user has packet sniffing software, they can extract data from the
network and potentially decode it and use it. Hubs make it easy to "spy" on users
on the same LAN as you.
Repeater
A wireless repeater.
A repeater is an electronic device that receives a signal and retransmits it at a
higher level and/or higher power, or onto the other side of an obstruction, so that
the signal can cover longer distances without degradation. Because repeaters work
with the actual physical signal, and do not attempt to interpret the data being
22
transmitted, they operate on the physical layer, the first layer of the OSI model.
Repeaters are majorly employed in long distance transmission to reduce the effect
of attenuation. It is important to note that repeaters do not amplify the original
signal but simply regenerate it.
Modem
Modem (from modulator-demodulator) is a device that turns the digital 1s and 0s
of a personal computer into sounds that can be transmitted over the telephone lines
of Plain Old Telephone Systems(POTS), and once received on the other side,
converts those sounds back into a form used by a USB, Ethernet, serial, or network
connection. Modems are generally classified by the amount of data they can send
in a given time, normally measured in bits per second, or "bps".
Basic switch
23
Switches are often confused with bridges because they also operate at the data link
layer of the OSI model. Similar to a hub, switches provide a central connection
between two or more computers on a network, but with some intelligence. They
provide traffic control for packets; rather than forwarding data to all the connected
ports, a switch forwards data only to the port on which the destination system is
connected. They use a database of MAC addresses to determine where computers
are located and very efficiently send packets only where they need to go. The
database is created dynamically as computers communicate on the network. The
switch simply watches the incoming packets and memorizes the MAC address and
port a packet arrives on. If a packet arrives with a destination computer that the
switch does not have an address for in its MAC address table, it will flood the
packet out all connected ports. A switch creates separate collision domains for each
physical connection. A switch will only create separate broadcast domains if
separate VLANs (Virtual Local Area Networks) are assigned to different ports on
the switch. Otherwise, a broadcast received on one port will be flooded out all
ports except the one it came in on.
Bridge
Bridges can be identified by the fact that they operate at the data link layer of
the OSI model. Bridges have intelligence and can "bridge" two of their ports
together at very high speed. They use a database of MAC addresses to determine
where computers are located and very efficiently send frames only where they
need to go. The database is created dynamically as computers communicate on the
network. A bridge simply watches the incoming frame and memorizes the MAC
address and port a frame arrives on. It uses this information to locate a computer if
a packet comes in that must be forwarded to it. If a frame arrives at the bridge and
the bridge does not know where to send it, the bridge will flood the frame just like
a hub does. Bridging is often inaccurately called switching.
24
Wireless access point
A typical corporate use involves attaching several WAPs to a wired network and
then providing wireless access to the office Local Area Network. Within the range
of the WAPs, the wireless end user has a full network connection with the benefit
of mobility. In this instance, the WAP functions as a gateway for clients to access
the wired network.
Basic router
Routers operate at the network layer of the OSI model and efficiently route
information between Local Area Networks. Since routers operate in the third layer,
the network layer, they must understand layer 3 addressing... such as TCP/IP. A
router will divide a broadcast domain by not forwarding broadcasts on one
connected network to another connected network. Routers operate in two different
25
planes: the control plane, in which the router learns the outgoing interface that is
most appropriate for forwarding specific packets to specific destinations, and the
forwarding plane, which is responsible for the actual process of sending a packet
received on a logical interface to an outbound logical interface.
Basic firewall
26