Thursday, December 29, 2005

 

Report for CS 144: DataCom

What is the difference between hubs, switch, bridges and routers? How are they implemented?

Hubs

A hub connects individual devices on an Ethernet network so that they can communicate with one another. The hub operates by gathering the signals from individual network devices, optionally amplifying the signals, and then sending them onto all other connected devices. You should use a hub or a switch on your Ethernet network if the network includes more than two clients, servers, or peripherals.

Switches

Like a hub, a switch is a device that connects individual devices on an Ethernet network so that they can communicate with one another. But a switch also has an additional capability; it momentarily connects the sending and receiving devices so that they can use the entire bandwidth of the network without interference. If you use switches properly, they can improve the performance of your network by reducing network interference.

Switches have two benefits:
  1. they provide each pair of communicating devices with a fast connection; and
  2. they segregate the communication so that it does not enter other portions of the network.

(Hubs, in contrast, broadcast all data on the network to every other device on the
network.)

Bridges

A bridge connects two or more networks, or segments of the same network. These networks may use different physical and data link protocols. For example, you can install a bridge to connect a small lab of Macintosh computers using LocalTalk to the school's main Ethernet network. Bridges filter network traffic. They examine each set of data, transmitting only appropriate data to each connected segment. (Hubs, by contrast, broadcast all information to each connected computer, whether or not that computer is the intended recipient.) In this manner, bridges help reduce overall network traffic.

Bridges are relatively simple and efficient traffic regulators. However, in most networks they have been replaced by their less expensive or more powerful cousins—hubs, switches, and routers.

Most bridges operate by examining incoming or outgoing signals for information at OSI level 2, the data link level.

(OSI Level 2:At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sublayers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. Source: Webopedia.com)


Routers

Like bridges, routers connect two or more networks. However, routers are much more powerful than bridges. Routers can filter traffic so that only authorized personnel can enter restricted areas. They can permit or deny network communications with a particular Web site. They can recommend the best route for information to travel. As network traffic changes during the day, routers can redirect information to take less congested routes.

If your school is connected to the Internet, then you will most likely use a router to make that connection. Routers ensure that your local area network traffic remains local, while passing onto the Internet all your electronic mail, Web surfing connections, and other requests for Internet resources.

Routers are generally expensive to purchase and difficult to configure and maintain. Be sure that your staff have the resources necessary to manage them well.
Routers quickly become critical components of your network. If they fail, your network services will be significantly impaired. As part of your network plan, you should consider how you might deal with the failure of key routers on your network. Many sites include redundant connections— additional routers and network cable connections—configured to take over if one router or connection fails.

Most routers operate by examining incoming or outgoing signals for information at OSI level 3, the network addressing level.

(OSI Level 3: This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. Source: Webopedia.com)

Source: EDC.org


What are the different multiplexing techniques?


Multiplexing (also muxing or MUXing)- In telecommunications, is the combining of two or more information channels onto a common transmission medium using hardware called a multiplexer or (MUX). The reverse of this is known as inverse multiplexing, demultiplexing, or demuxing. George O. Squier (1863–1934) invented the principle in 1910 using a carrier frequency to combine multiple telephone signals on one telephone line.

In electrical communications, the two basic forms of multiplexing are time-division multiplexing(TDM) and frequency-division multiplexing (FDM). In optical communications, FDM is referred to as wavelength division multiplexing (WDM).


(Source:Wikipedia.org)

Wednesday, December 21, 2005

 

Ten Commandments of Computer Ethics

Created by the Computer Ethics Institute
(Source:Computer Ethics Institute)

1. Thou Shalt Not Use A Computer To Harm Other People.
2. Thou Shalt Not Interfere With Other People’s Computer Work.
3. Thou Shalt Not Snoop Around In Other People’s Computer Files.
4. Thou Shalt Not Use A Computer To Steal.
5. Thou Shalt Not Use A Computer To Bear False Witness.
6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid.
7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation.
8. Thou Shalt Not Appropriate Other People’s Intellectual Output.
9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing.
10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans.

This page is powered by Blogger. Isn't yours?