Experiment No 1 PDF
Experiment No 1 PDF
Experiment No 1 PDF
1.1. Client
Any computer that is the part of a common network other than the Server is called as
client. The division is based on the storage capacity and responsibility of the computer.
For example a Server has a large storage area and its responsibilities are pretty different
than client computers.
1.2. Server
A server is just like any other computer of the network however it can be
distinguished with its large storage capacity and the role that is assigned to it. This is the
1.5. Protocols
Generally any set of rules is a Protocol. A Network Protocol is usually an agreed-
upon or standardized set of rules used for transmitting data and/or establishing
communication between them. Just as two people need to have a common language
between them to exchange their views, so computers need to have a common language so
as to share information and the Protocol is something that offers that platform.
1.7. Users
Any individual that uses client computers in a particular computer network is called
as User.
2. Cables
Cable is the medium through which information usually moves from one network
device to another. There are several types of cable which are commonly used with LANs.
In some cases, a network will utilize only one type of cable, other networks will use a
variety of cable types. The type of cable chosen for a network is related to the network's
topology, protocol, and size. Understanding the characteristics of different types of cable
and how they relate to other aspects of a network is necessary for the development of a
successful network.
The following sections discuss the types of cables used in networks and other related
topics.
The quality of UTP may vary from telephone-grade wire to extremely high-speed
cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a
different number of twists per inch to help eliminate interference from adjacent pairs and
other electrical devices. The tighter the twisting, the higher the supported transmission
rate and the greater the cost per foot. The EIA/TIA (Electronic Industry
Association/Telecommunication Industry Association) has established standards of UTP
and rated six categories of wire (additional categories are emerging).
There are two common types of fiber cables -- single mode and multimode.
Multimode cable has a larger diameter; however, both cables provide high bandwidth at
high speeds. Single mode can provide more distance, but it is more expensive.
3.1. Workstations
Computers that humans use are broadly categorized as workstations. A typical
workstation is a computer that is configured with a network interface card, networking
software, and the appropriate cables. Workstations do not necessarily need large storage
hard drives, because files can be saved on the file server. Almost any computer can serve
as a network workstation.
Laptops and other mobile devices are becoming more and more common. These
devices typically have modest internal storage, but enough power to serve as a
workstation for users on the go. These machines nearly always have a wireless adapter to
allow quick network connections without cumbersome cabling. In a school environment
with good wireless coverage, a mobile device user can move about the campus freely,
and remain continuously connected to the network.
Ethernet cards are usually included with a computer, although additional Ethernet
cards can be purchased and installed on most computers,. Ethernet cards can contain
connections for either coaxial or twisted pair cables (or both) (See fig. 7). If it is designed
for coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will
have a RJ-45 connection. Some Ethernet cards also contain an AUI connector. This can
be used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card. When this
method is used there is always an external transceiver attached to the workstation. Only
the RJ-45 connector is found on most modern Ethernet cards (See the Cabling section for
more information on connectors.)
3.4. Repeaters
Since a signal loses strength as it passes along a cable, it is often necessary to boost
the signal with a device called a repeater. The repeater electrically amplifies the signal it
receives and rebroadcasts it. Repeaters can be separate devices or they can be
incorporated into a concentrator. They are used when the total length of your network
cable exceeds the standards set for the type of cable being used.
A good example of the use of repeaters would be in a local area network using a star
topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-
pair cable is 100 meters. The most common configuration is for each workstation to be
connected by twisted-pair cable to a multi-port active concentrator. The concentrator
amplifies all the signals that pass through it allowing for the total length of cable on the
network to exceed the 100 meter limit.
Advantages
Makes it easy to expand a network over a large distance.
Connection between various types of media [e.g. fiber optic, UTF, coaxial cable]
is possible.
Disadvantages
Traffic cannot be filtered to ease congestion.
A repeater cannot work across multiple network architectures.
3.5. Bridges
A bridge is a device that allows you to segment a large network into two smaller,
more efficient networks. If you are adding to an older wiring scheme and want the new
network to be up-to-date, a bridge can connect the two.
A bridge monitors the information traffic on both sides of the network so that it can
pass packets of information to the correct location. Most bridges can "listen" to the
network and automatically figure out the address of each computer on both sides of the
bridge. The bridge can inspect each message and, if necessary, broadcast it on the other
side of the network.
The bridge manages the traffic to maintain optimum performance on both sides of the
network. You might say that the bridge is like a traffic cop at a busy intersection during
rush hour. It keeps information flowing on both sides of the network, but it does not
allow unnecessary traffic through. Bridges can be used to connect different types of
cabling, or physical topologies. They must, however, be used between networks with the
same protocol.
3.9. Firewalls
Firewalls are an essential part of a network’s design. A firewall is a networking
device, either hardware or software based, that controls access to your organization’s
network. This controlled access is designed to protect data and resources from outside