Networking Components
Hardware and Software Components
Networking Components (Hardware)
• Client- the term client refers to a device that an end user uses to
access a network. E.g laptop, desktop workstation, smartphone etc.
• Server- it servers-up resources to a network. i.e it provides the
various resources that are needed in a network. There are several
types of servers depending on the resources that they provide.
• This includes; DHCP server, DNS server, database Server, Application Server,
web server, file server etc.
• Media- it is the channel through which data travels from the sender
to the receiver. It can either be physical media or wireless media.
Networking components (Hardware) Cont.
• Network Interface cards (NICs): are also called Network Interface
Controller, Network adapter, LAN adapter, and Physical Network
interface.
• NIC cards are hardware components used to connect computers with
networks. Without NIC a computer cannot be connected to the
network
• It is installed in a computer circuit board
• Due to the popularity and low cost of Ethernet standards, the
network interface is built directly into the motherboard in almost all
new computers.
Types of NIC
• Internal Network Card (Wired NIC)- In internal network cards, the
motherboard has a slot for the network card where it can be inserted.
It requires a network cable to provide network access. There are two
types of internal network cards.
• The first type uses Peripheral Component Interconnect (PCI) connections,
• second type uses Industry Standard Architecture (ISA).
• External Network Card (Wireless NIC)-The external NIC is used by
desktops and laptops that do not have an internal NIC.
• External network cards are of two types wireless and USB-based:
• Wireless network cards are required to be inserted into the motherboard.
• The USB based are used to connect to a laptop when traveling or accessing
wireless signals.
Cont.
• Internal NIC • External NIC
Networking components (Hardware) Cont.
• Hub- It is an older technology that interconnects network components such as
clients and servers.
• When a computer requests information from one network or from a specific
computer, then it sends the request to the hub through a cable.
• The hub then receives that request and broadcasts it to the entire network.
• Then each device connected to the hub checks if the broadcasted requested was
targeted at them.
• If a device finds that the request was not targeted at it drops the request.
• If a device finds that the request is targeted at it, then it services the request.
• However, such network components nowadays are very less in circulation and
have been replaced by more advanced communication devices such as Routers
and Switches.
• The hub is basically a multiport repeater.
Networking components (Hardware) Cont.
• Switch- like a hub a switch interconnects network component and they are
available with a variety of port densities.
• A switch has more advanced features than a hub. It doesn’t broadcast
entire data on the network like a hub.
• A switch is a layer 2 device in the OSI model therefore it uses Ethernet protocol. i.e
the MAC address of the NIC to make forwarding decision
• The Ethernet protocol supplies the destination and source MAC address to the
Switch.
• Therefore, When a traffic comes in a switch port, the switch interrogates the traffic
to see where it is destined.
• Then based on what the switch has learnt, the switch then forwards the
traffic out to the appropriate port.
• Therefore a switch is more intelligent compared to a hub
Mac Address Tables
• We have seen MAC address is
critical in switching. Now take the
figure on the left.
• We have four devices named H1 to
H4. Each device has a hypothetical
MAC address. E.g Device H1 has
the MAC as AA-AA.
• The cable connecting each device
to the router has a number e.g for
device H1 the cable number is
FA0/1 which means Fast Ethernet
01.
• Now assume H1 wants to send a
message to H4 what will happen?
Mac Address Tables Cont.
• The switch will receive the message sent by the NIC of H1 through cable FA0/1.
• The switch will then check if the MAC address of the transmitting device is
already registered in its MAC table. If not, the switch will add it to the MAC table.
• The switch will then interrogate the Ethernet protocol and determine the
destination address. If the address is not yet registered the switch will the
forward to the frame to all ports except the source port and each NIC will check if
their MAC address matches the destination MAC address.
• Note that a MAC table is only built using the source MAC address
• This process is repeated for every new transmission until the table is fully
populated.
• Therefore, the MAC table will have the cable number and the MAC address of the NIC/device
which connects to the switch using that cable.
• Switches are considered intelligent since after the table is fully populated no more
broadcasting happens.
Fully Populated MAC address Table
Cont.
The figure shows a 16 port TP-Link
The figures shows a Cisco Switch Switch
• It has 16 slots to plug ethernet cables so it can only
connect to 16 devices using a cable
Networking components (Hardware) Cont.
• Router- it uses logical addresses to make forwarding decisions based
on logical network addresses. Most modern Networks uses Internet
Protocol (IP) as their logical addressing scheme.
• Routers operate at the network layer of the OSI (Open system
interconnection) reference model, using them to send packets over
the network using a logical address.
• The Router receives such Packet data and forwards it to the
Destination Device after analyzing hidden information in the Data
Packet.
• This Networking Device is used to connect different networks either
wired or wireless. Routers are mainly seen in house or offices as Wi–
Fi from which anyone can access the Internet.
Cont.
• Modern routers also act as DHCP
servers in a network
• This is to mean they assign
dynamic Ip addresses to devices
that connect to a network that
router services.
• The figure below shows a TP-
Link AC1200 router
Types of Router
Routers can be broadly grouped into either wireless and wired routers
• Wired Routers- Wired routers share data over cables and create
wired local area networks. They are less scalable since the number of
devices that connect to it is limited by number of ethernet ports.
• They are more secure from eavesdropping compared to wireless
routers
• Wireless router- Wireless Router are very popular and useful. They
are used more at home, Office, College etc.
• This router makes the internet connection wireless from which anyone can
use the internet directly with their computers, tablets, mobile phones
through a wireless signal.
Other types of routers
• Edge routers - This is a wired or wireless router that distributes data
packets between one or more networks but not within a network.
• As their name indicates, edge routers are placed at the edge or
boundary of networks, and typically connect to Internet service
providers (ISPs) or other organizations’ networks.
• Their job is to keep your network communicating smoothly with other
networks.
• Core routers -These wired or wireless routers that distribute data
packets within networks, but not between multiple networks.
• They’re designed to become the backbone of your network and do
the heavy lifting of data transfer, which is why they’re usually high-
performance.
Types of Routers Cont.
• Virtual routers - Unlike physical routers, virtual routers are pieces of
software that allow computers and servers to operate like routers.
They share data packets just as physical routers do.
• They can offer more flexibility than physical devices since they can be
scaled as the business grows; they can also help get remote offices up
and running on your network more quickly.
Networking components (Hardware) Cont.
• Wifi Access Point: An access point is a device that creates a wireless
local area network, or WLAN, usually in an office or large building.
• An access point connects to a wired router, switch, or hub via an
Ethernet cable, and projects a WiFi signal to a designated area.
• For example, if you want to enable WiFi access in your company's
reception area but don’t have a router within range, you can install an
access point near the front desk and run an Ethernet cable through
the ceiling back to the server room.
• Its main role is just to provide access to Wifi
Cont.
• Figure below shows wifi access points from different vendors
Networking components (Hardware) Cont.
• Modem- The full form of the modem is ‘Modulator/Demodulator’. These
components allow a computer device, such as a router or switch, to
connect to the Internet.
• It converts or “Demodulates” an analog signal from a telephone or cable
wire into a digital signal that a router or switch can easily recognize the
data.
• The process of converting an analog signal into a digital signal is called
demodulation.
• Similarly, when it converts outgoing digital data into an analog signal in a
computer device such conversion is called modulation.
• The speed of transfer is measured in bytes per second (bps) rate. The faster
its speed, the faster one can send and receive information.
Cont.
• The figure below shows a modem.
Types of Modems
• External Modem-
It is connected to the serial port of the computer by a cable located
outside the computer. Another wire connects the modem to the
telephone line.
• Internal Modem-
This system is a plug-in circuit board located within the unit. This
modem is connected to the telephone line by a telephone cable.
• Wireless Modem-
As the name suggests it doesn’t need any wire. It sends and receives
signals through the air (wirelessly).
Networking components (Hardware) Cont.
• Repeater- A repeater is a network device that repeats a signal from
one port onto the other ports to which it is connected
• As signals travel through a transmission media they loose strength.
This is known as attenuation.
• Each media type, therefore, has a maximum range within which it can
reliably carry data.
• The purpose of a repeater is to extend the maximum range for the
transmission media thus eliminating attenuation.
• Port- A network port is a process-specific or an application specific
software construct serving as a communication end-point.
Commonly used ports
Port Number Usage
20 File Transfer Protocol (FTP) Data Transfer
21 File Transfer Protocol (FTP) Command Control
22 Secure Shell (SSH)
23 Telnet - Remote login service, unencrypted text messages
25 Simple Mail Transfer Protocol (SMTP) E-mail Routing
53 Domain Name System (DNS) service
80 Hypertext Transfer Protocol (HTTP) used in World Wide Web
110 Post Office Protocol (POP3) used by e-mail clients to retrieve e-
mail from a server
Commonly used ports Cont.
Port Number Usage
119 Network News Transfer Protocol (NNTP)
123 Network Time Protocol (NTP)
143 Internet Message Access Protocol (IMAP) Management
of Digital Mail
161 Simple Network Management Protocol (SNMP)
194 Internet Relay Chat (IRC)
443 HTTP Secure (HTTPS) HTTP over TLS/SSL
Networking components (Hardware) Cont.
• Bridge- A network bridge joins two separate computer networks. The
network bridge enables communication between the two networks
and provides a way for them to work as a single network.
• Bridges extend local area networks to cover a larger physical area
than the LAN can reach.
• Bridges are similar to — but more intelligent than — simple repeaters, which
also extend signal range.
• Bridge devices inspect incoming network traffic and determine
whether to forward or discard the traffic according to its intended
destination.
Networking components (Hardware) Cont.
• Gateway- A network gateway joins two networks that have different
transmission protocols for purposes of communication.
• A protocol is an established set of rules that determine how data is
transmitted in a network.
• Gateways serve as an entry and exit point for a network as all data
must pass through or communicate with the gateway prior to being
routed.
• In most IP-based networks, the only traffic that does not go through
at least one gateway is traffic flowing among nodes on the same local
area network (LAN) segment.
• Therefore, without gateways, you couldn't be able to access the
internet, communicate and send data back and forth.
Gateways cont.
• Gateways are located at the boundary of a network and manages all data
that inflows or outflows from that network.
• A gateway operates as a protocol converter, providing compatibility
between the different protocols used in the two different networks.
• The feature that differentiates a gateway from other network devices is
that it can operate at any layer of the OSI model.
• It also stores information about the routing paths of the communicating
networks.
• When used in enterprise scenario, a gateway node may be supplemented as proxy
server or firewall.
• A gateway can be implemented completely in software, hardware, or a
combination of both.
• E.g modern routers have the gateway installed in them thus in this case its both
hardware and software.
Cont.
• Example of a gateway between a
LAN and Internet.
• In this case in links the devices in
the LAN to the internet.
• Thus it filters the data packets
that passes through it and
performs protocol conversions
Networking Components (Software) cont.
• Firewall: A firewall is a network security device that monitors
incoming and outgoing network traffic and decides whether to allow
or block specific traffic based on a defined set of security rules.
• Firewalls have been a first line of defense in network security for over
25 years.
• They establish a barrier between secured and controlled internal
networks that can be trusted and untrusted outside networks, such as
the Internet.
• A firewall can be hardware, software, software-as-a service (SaaS),
public cloud, or private cloud (virtual).
cont.
• Diagrammatic representation of firewalls.
• This firewall has filtered the traffic from the internet and established
that its good traffic
Networking Components (Software)
a) Network Operating systems-
• Network Operating System runs on a server and gives the server the
capability to manage data, users, groups, security, applications, and
other networking functions.
• The basic purpose of the network operating system is to allow shared
files and resource sharing in a computer network.
• Unlike ordinary operating systems, such as Windows, that are
designed for single users to control one computer, network operating
systems (NOS) coordinate the activities of multiple computers across
a network.
Cont.
• The network operating system acts as a director to keep the network
running smoothly.
• Some examples of network operating systems include Microsoft
Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux,
Mac OS X, Novell NetWare, and BSD.
Types of Network Operating System
• Peer-to-peer network operating systems- allow users to share
network resources saved in a common, accessible network location.
• In this architecture, all devices are treated equally in terms of
functionality.
• Peer-to-peer usually works best for small to medium networks and is cheaper
to set up.
• Client/server network operating systems- provide users with access
to resources through a server.
• In this architecture, all functions and applications are unified under
one file server that can be used to execute individual client actions
regardless of physical location.
Components of Network Operating System
• The support component: Network operating systems provide support
for the multiple processors, applications, and hardware devices that
make up a network.
• The systems support the users accessing the network as well as process
requests for specific documents and usage of hardware.
• The security component: NOSs manage the authorization and
authentication of users, computer workstations, and other devices
accessing a network.
• If an intruder tries to access a network, the NOS blocks the
unauthorized user/computer and logs the intrusion attempt within its
log files.
• The NOS also manages software and hardware installations to keep
users from installing unauthorized software and devices.
Components of Network Operating System cont.
• The user setup component: Used to create user accounts and manage
the users logging into and out of the network.
• The systems also manages what file and directory services a specific
user has access to, manages users accessing the network remotely,
and how the network graphical interface looks to specific users.
• The email component: manages electronic mail, also known as email,
for the entire network, including users accessing the NOS remotely
and from the Internet.
• The NOS email component blocks SPAM and other problematic emails
and sends/receives the email, as well as lets users, create additional
email accounts.
Components of Network Operating System cont.
• The printing and file services component: Like other operating
systems, network operating systems manage all printing, storage,
backup, and duplication services for computers and users accessing a
network.
• NOS filters documents and files through the printing/file services
immediately.
• More than one user can send documents and files through the
network for printing, backing up, or other types of processing.
Modes of Transmission in a Network
• Transmission refers to movement of data from the sending node to
the recipient.
• There are three modes of transmission:
• Simplex.
• Half duplex.
• Full duplex.
• Simplex transmission:
• This is where communication is only in one direction (as in radio or
television broadcast). The listener or viewer cannot communicate
back through the radio or television receiver back to the broadcaster.
Modes of transmission Cont.
• Half duplex transmission: This refers to communication in both
directions, but one direction at a time.
• A sender must first send the data before the recipient can reply, e.g.,
if two police officers are communicating using a ‘walkie talkie’ radio,
one has to say “over” to mark the end of every statement in order for
the other to respond.
• Full duplex transmission: This is where communication occurs in both
directions simultaneously (as in computers that are sending &
receiving data on a network), e.g modern mobile phones, the receiver
can talk while the caller is still talking.
Quiz
• Explain how the internet works.
• Explain why some regions have faster internet access while others
have slow internet access.
• Highlight the importance of computer networks
The End
Thank You