StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway - Assignment Example

Cite this document
Summary
The author of the paper compares and contrasts the functioning of the components of the repeater, bridge, network routers, and gateway. Then the author of the paper examines the sharing and transmitting of the data files to some other attached LAN network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway
Read Text Preview

Extract of sample "Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway"

Networking Task 1 (a & b) Compare and a contrast the functioning of the following components: &: (b) For each component, give an example of a situation in which it would be used and the protocol(s) that the component would use in that situation, and explain why it is the preferred component for that situation. Repeater A repeater is a device that performs operation only in the physical layer. A repeater is used to refresh the signals because signals that bring information are able to move a fixed distance inside a network prior to attenuation affects the data integrity. In this scenario, a repeater accepts the signal, before it turns out to be weaker or corrupted and then redevelop the original bit pattern after that repeater transfers the refreshed signal to desired location. In this way, a repeater can expand the area of a LAN (Forouzan & Fegan, 2003, p.446). In a network a repeater is used to join two segments. It regenerates and retimes the signals to appropriate amplitudes as well as transmits them to the further segments. However, in case of Ethernet topology, we are almost using a repeater. Since, repeaters need a small amount of time to renew the signal (Tech Interviews, 2004). Figure 1- Network Repeater [Source: http://www.tutorialsweb.com/networking/repeaters-routers-bridges-gateways.htm] Outline of Repeater: (Forouzan & Fegan, 2003) A repeater is used to connect the segments of a LAN A repeater transmits every frame without filtering it, since it has n filtering capability A repeater can renew signals but can’t amplify the signals Bridge A bridge can perform function in both data link layer as well as physical layer. As a physical layer device, it creates the signals it receives on the other hand in data link layer; it verifies MAC addresses contained in the frame (Forouzan & Fegan, 2003, p.449). A bridge examines the outermost part of data on the data packet, to inform where the message is reaching. It minimizes the traffic on other segments of the network, as it does not transmit the entire of the data packets. Bridges is able to program to refuse packets from specific networks. The bridge is able to read the Ethernet data that offers the hardware address of the target address, not the network IP address. Bridges promote the entire broadcast messages. Simply a particular bridge is known as Translation Bridge that permits two networks of dissimilar architectures to be linked. Bridges do not generally permit link of networks through dissimilar architectures. The hardware address is as well known as the media access control (or MAC) address. To verify the network segment a media access control address fits in, bridges employs one of (Tutorials Web, n.d) & (YBET IT , 2007): Source route bridging: The source computer offers path information within the network data packet. This is employed on token ring communication networks Transparent Bridging - They construct a bridging table (also known as table of addresses) as they take delivery of packets. If the packet address that is received is not in the bridging table, the received packet is forwarded to the entire network segments other than the one that transmit it. However, this kind of bridge is employed on Ethernet communication networks (YBET IT , 2007). Bridges can (Tutorials Web, n.d; Forouzan & Fegan, 2003): Enlarge the distance of a segment Offer an augmented amount of computers on the network Decrease traffic blockages resultant as of an excessive quantity of attached computers A bridge contains a table that is used in filtering decisions Figure 2- Network Bridging [Source: http://www.tutorialsweb.com/networking/repeaters-routers-bridges-gateways.htm] Network Router A router is the unit in a computer network, which is in charge for routing messages. However, a router can be a special purpose device or a host computer having routing software (Silberschatz et al., 2004, p.555). A router is employed to route data packets among two networks. It interprets the information in every packet to inform where a message has to be delivered. If it is directed to an instant network then it has to access the network. Then it will strip the outer packet, in this scenario it will readdress the packet to the appropriate Ethernet address, as well as transmit it on that target network. If it is intended for some other network and have to be transmitted to another router. Here it will re-package the outer packet that will be delivered to the subsequent router and transmit it to the next router. Routing happens at the OSI model’s network layer. They are able to attach networks with dissimilar architectures like that Ethernet and Token Ring. Though they are able to change information at the data link level, in this scenario routers are not able to transform information from one data format like that TCP/IP to a further format such as IPX/SPX. Routers do not launch corrupted packets or broadcast packets. If the routing table does not point to the appropriate address of a network data packet, that particular network packet is discarded (Tutorials Web, n.d). Moreover, the routers do not observe the target node address; they simply appear at the network address. In addition, the Routers will simply overtake the network information if the network address is recognized. The capability of controlling the network data in the course of the router diminishes the amount of traffic among networks and permits routers to make use of these links more powerfully than bridges (YBET IT , 2007). Gateway A gateway establishes a connection between the internet and telephone network. Normally, a gateway is a five-layer device that is able to interpret a message from one protocol stack to another (Forouzan & Fegan, 2003, p.923). In a network a gateway is able to translate information among dissimilar network architectures or network data formats. It is able to translate AppleTalk to TCP/IP consequently computers supporting TCP/IP are able to communicate with Apple brand computers. The majority gateways perform operation at the OSI model’s application layer; however it can operate at the session or network layer of the OSI model. Gateways establish at the lower level as well as strip information. It obtains the necessary level as well as repackages the information and work through its technique back in the direction of the hardware layer of the OSI model (Tech Interviews, 2004; Forouzan & Fegan, 2003) Figure Network Gateway, Source: http://1.bp.blogspot.com/_szsM-EakoOE/R7cuKwLsOiI/AAAAAAAABHE/hpH2u1vkF2c/s400/network_gateway190x225.gif A gateway attaches two systems that do not utilize the same (Tutorials Web, n.d): Data formatting structures Communication protocols  Architecture Languages Task 2 A (i) For sharing and transmitting the data files to some other attached LAN network we need to share our data. In this case we need to place our data in specific location of the system, after that we need to share that data for transmission or sharing. In this case having all our files separately on our desktop (or separately on your USB stick) is not a good idea because some time we are not sitting on our system and we need to access our data that is placed on desktop. In a LAN structure we will require some authorizations for accessing intended files. However, by placing these data files on the common data drive we would be able to get better access to our intended data. Moreover, from the security point of view if our data is placed on the desktop and someone sits on our computer then he will straightly access our data. On the other hand, if we store our data into USB device, and we lost our USB drive then someone can be able to access that data and use that data for some wrong intentions. (ii) In case of accessing, Horrid Henry will require to have login base access to Windows XP system. After that for opening the TopSecret.odt file, Horrid Henry will require opening the ‘C’ drive, then he will need to open the MySecretFiles folder. In that folder he will require opening the main TopSecret.odt file. B Horrid Henry will need to take print out of the TopSecret.odt file that he wants to send to Rude Ralph’s computer. In present situation Horrid Henry’s Mum and Dad have confiscated his printer. Now he will need to attach a new printer for printing the Rude Ralph document. In this case he will require configuring the new printer. This will involve attaching a new printer that is installed to offer specific services. After that printer will be configured to the LAN so that any user on that LAN could be able to use the printer. C The actual email communication is done through message transfer agents. For instance, to forward an email message, a system makes use of client MTA, and to get email, a system makes use of a server MTA. Moreover, Simple Mail Transfer Protocol (SMTP) is the formal protocol that describes the MTA client and server in the internet (Forouzan & Fegan, 2003, p.834). Thus, the SMTP (Simple Mail Transfer Protocol) is the protocol that will be used for the message distribution at Horrid Henry’s LAN, through the Internet, and finally through Rude Ralph’s LAN. The majority e-mail systems that transmit mail messages over the internet by making use of SMTP to transmit messages from one server to some other. As well, SMTP is normally employed to transmit messages from a mail client to a mail server. This is why we require identifying both the IMAP or POP server as well as the SMTP server when we configure our e-mail application. Simple Mail Transfer Protocol was made to send e-mail messages in the course of Internet. In the OSI model, Simple Mail Transfer Protocol is an application layer protocol that makes use of TCP as the transport protocol to broadcast mail to a target mail exchanger, stating in another way, SMTP is employed to broadcast mail to a mail server. Message could be transmitted through a client to the mail exchanger server, or from mail exchanger to mail exchanger. In addition, the message sent through SMTP is typically sent from one mail exchanger to some other, straightly (InetDaemon, n.d) & (Bernstein, 2001). D In case of message transfer from Horrid Henry to Rude Ralph’s computer the message based mail will be transferred through the Horrid Henry account. After sending the data is encoded with account based details. This message also holds the detonation account. After reaching the message the user needs to login from its account to read the message and access the file. At that time on basis of the correct user name and password the message will be decoded for the appropriate recipient. However to access message in this way is not possible for neither Perfect Peter nor Moody Margaret. Bibliography Bernstein, D.J., 2001. SMTP: Simple Mail Transfer Protocol. [Online] Available at: http://cr.yp.to/smtp.html [Accessed 10 april 2010]. Forouzan, B.A. & Fegan, S.C., 2003. Data Communications and Networking. New York: McGraw-Hill. InetDaemon, n.d. Simple Mail Transfer Protocol. [Online] Available at: http://www.inetdaemon.com/tutorials/internet/smtp/ [Accessed 10 April 2010]. Silberschatz, A., Galvin, P.B. & Gagne, G., 2004. Operating System Concepts (7th Edition). New York: Wiley. Tech Interviews, 2004. Interview questions for network engineer. [Online] Available at: http://www.techinterviews.com/interview-questions-for-network-engineer [Accessed 10 April 2010]. Tutorials Web, n.d. 4.0 Repeaters, Bridges, Routers, and Gateways: A comparative study. [Online] Available at: http://www.tutorialsweb.com/networking/repeaters-routers-bridges-gateways.htm [Accessed 10 April 2010]. YBET IT , 2007. 5. Hub, switch, network router. [Online] Available at: http://www.ybet.be/en-hardware-2-05/hub-switch.htm [Accessed 10 April 2010]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Network: Comparison of the Components Functioning of the Assignment”, n.d.)
Retrieved de https://studentshare.org/information-technology/1564872-computer-network
(Computer Network: Comparison of the Components Functioning of the Assignment)
https://studentshare.org/information-technology/1564872-computer-network.
“Computer Network: Comparison of the Components Functioning of the Assignment”, n.d. https://studentshare.org/information-technology/1564872-computer-network.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Network: Comparison of the Components Functioning of the Repeater, Bridge, Network routers, and Gateway

Setting up a Home Network

The paper "Setting up a Home network" tells us about a system through which two or more computers are linked with each other so that resources like printers, files can be shared between them.... hellip; Computers in a network may be linked with each other through cables, telephone lines, infrared beams, or satellites.... There are three basic types of network: Local Area network (LAN), Wide Area network (WAN), and Metropolitan Area network (MAN) (FCIT, n....
10 Pages (2500 words) Essay

Importance of a Network Design

This essay "network Design" provides assistance on the phone for various companies.... The company has decided to deploy a data communication network to support their business functions.... du' which says “Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.... a scope) configured for a given network” (What is DHCP?...
6 Pages (1500 words) Essay

Basic Design Issues of an Ethernet Network

(‘IEEE Ethernet' 2011) defines all the configuration rules laying down a network and also defines the networked devices' interaction with one another. The distance between So, we use repeaters and hubs (as shown in Figure 1).... So, networks are designed to avoid collisions while ensuring efficient utilization of bandwidth, providing good network throughput.... For avoiding collisions, the network traffic needs to be isolated.... For each incoming frame the bridge/switch checks the destination MAC address....
4 Pages (1000 words) Essay

Computer and Network Hardware

Layer 3 refers to the gateway through which the data transmitted in a network operates and this mainly takes place in OSI model.... routers make use of Internet Protocol commonly known as IP address to pass data across the network.... routers are common in Local Area Networks (LAN) (Lammle, 2008).... LAN segmentation makes of bridges, network switches and routers in configuring the required network.... The use of switches in a network is necessary for effective control of the network....
1 Pages (250 words) Assignment

Top-Down Network Applications Design

The author of this paper "Top-Down network Applications Design" discusses the way to comprehend every specific aspect that is necessary for establishing an effective centralized network for Fiction Corporation.... The paper focuses on the establishment of an appropriate network.... hellip; In the current phase, the entire network of Fiction Corporation is in a scattered manner.... As a matter of fact, the data processing capabilities of these outlets might vary depending on the store size, customer access, and type of network hardware used....
12 Pages (3000 words) Coursework

Network Security System

Filtering routers serve as alerts in case any malware interferes with the network (Mansfield-Devine, 2009).... This case study "network Security System" evaluates the network topology in the institution in terms of efficiency and safety and provides the best alternative or option for maintaining the security apparatus.... It specifically outlines the installation of a Perimeter network Security system.... hellip; A network topology is crucial to the operations of large institutions such an s a university....
8 Pages (2000 words) Case Study

Computer Network Design Issues

… (UNIVERSITY)IntroductionComputer networking is the communication of two or more computers that are in a network.... This process is very important as it enables the computers that are in the network share resources such as printers, files or data.... We (UNIVERSITY)IntroductionComputer networking is the communication of two or more computers that are in a network.... This process is very important as it enables the computers that are in the network share resources such as printers, files or data....
7 Pages (1750 words) Assignment

Growth of Electronic Connectivity

network Requirements The company's large computing requirements require very sophisticated networking equipments.... Item DescriptionQuantity Required 1Siemon cat 6e networking cable 500 meters 2RJ 45 Clips 100 pieces 3Wireless print servers 5 units 448 port networking switches 8 units 5Wireless internet router3 units 6Wireless internet radio 2 units 7Servers 4 units 8Client workstations (personal computers)35 units 9Wireless Access point 5 units10 Firewall 3 units Equipments used Siemon cat 6 e network cabling media Here we are proposing to use Siemon Z-MAX 6A UTP cabling technology....
15 Pages (3750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us