With The Help of This Diagram, Try To Describe The Function of These Components of A Typical Network System

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

STARTER With the help of this diagram, try to describe the function of

these components of a typical network system:

1 a file server 5 a LAN


2 a bridge 6 a gateway
3 a router 7 a modem
4 a backbone
Internet
Another Novell LAN Router

Bridge

Fibre-optic
backbone
Bridge Shared hard disk
Shared network printer

Gateway

Unix network
Twisted pair cabling Computers with
network interface cards
Fig 1 Local printer
Components of a typical LAN

Now read these definitions to check your answers. You may


also refer to the Glossary.

A bridge is a hardware and software together. High-speed routers traffic, connecting different
combination used to connect can serve as part of the LANs together.
the same type of networks. Internet backbone.
A LAN is a network contained within
Bridges can also partition a
A gateway is an interface that a small area, for example a
large network into two smaller
enables dissimilar networks to company department.
ones and connect two LANs
communicate, such as two
that are nearby each other. A modem is a device for converting
LANs based on different
digital signals to analogue
A router is a special computer that topologies or network
signals and vice versa to
directs communicating operating systems.
enable a computer to transmit
messages when several
A backbone is the main transmission and receive data using an
networks are connected
path, handling the major data ordinary telephone line.
READING Now study this text and the diagram of a simple home network
setup. Match the diagram key to the components of the network.

The technology needed to set up a player gaming as well as sharing of becomes just one of many features
home network is here today. It is peripherals such as printers. Most accessible throughout the house.
just a matter of connecting a advanced home networks are Tired of working in the study?
number of PCs equipped with likely to have a client/server Pop down to the living room and
Ethernet adapters to a hub using structure, with low-cost terminals, reload it into the terminal there.
twisted-pair cabling which uses or 'thin' clients, connected to a Before you start work, call up the
sockets rather like phone sockets. central server which maintains the hi-fi control program and have
Special isolation adapters can be system's storage capacity and, the music of your choice pumped
fitted to allow existing mains lines depending on whether the through the living room speakers.
to be used instead of twisted-pair terminals are dumb or processor- Computer and entertainment
cabling. Most future home equipped network computers, its networks can be separate but
networks, however, are likely to be processing power. To make the linked by the server to allow
wireless network systems, using most of such a network, it must control of the latter from the
tuned transmitter and receiver become part of an integrated terminals. Future home networks
devices. The simplest networks home entertainment and control are more likely to have the entire
allow basic file-sharing and multi- system. To the user, the desktop system based on a single loop.

KEY TO THE DIAGRAM

Fig 2
Simple home network
74 UNIT 11 Networks

LANGUAGE WORK lative clauses with a participle

Relative clauses with a participle are often 1 The technology needed to set up a home
used in technical descriptions. They allow network.
you to provide a lot of information about a = technology which is needed
noun using as few words as possible. 2 PCs equipped with Ethernet adapters
= PCs which are equipped
Study these examples from the Task 3 text.
1 The technology needed to set up a home We can use an active participle as in
network examples 3 and 4.
2 PCs equipped with Ethernet adapters 3 Network modem allowing clients to access
3 Network modem allowing clients to access the Internet simultaneously
the Internet simultaneously = modem which allows clients to access the
4 Data line linking client to server Internet simultaneously
4 Data line linking client to server
We can use the passive participle as in = data line which links client to server
examples 1 and 2.

Complete these definitions with the correct participle of the


verb given in brackets.
1 A gateway is an interface (enable) dissimilar networks to
communicate.
2 A bridge is a hardware and software combination (use) to
connect the same type of networks.
3 A backbone is a network transmission path (handle) major data
traffic.
4 A router is a special computer (direct) messages when several
networks are linked.
5 A network is a number of computers and peripherals (link)
together.
6 A LAN is a network (connect) computers over a small distance
such as within a company.
7 A server is a powerful computer (store) many programs (share)
by all the clients in the network.
8 A client is a network computer (use) for accessing a service on a
server.
9 A thin client is a simple computer (comprise) a processor and
memory, display, keyboard, mouse and hard drives only.
10 A hub is an electronic device (connect) all the data cabling in a
network.
UNIT 11 Networks 75

Link these statements using a relative clause with a participle.


a The technology is here today.
b It is needed to set up a home network.
a You only need one network printer.
b It is connected to the server.
a Her house has a network.
b It allows basic file-sharing and multi-player gaming.
a There is a line receiver in the living room.
b It delivers home entertainment audio to speakers.
a Eve has designed a site.
b It is dedicated to dance.
a She has built in links.
b They connect her site to other dance sites.
a She created the site using a program called Netscape
Composer.
b It is contained in Netscape Communicator.
a At the centre of France Telecom's home of tomorrow is a
network.
b It is accessed through a Palm Pilot-style control pad.
a The network can simulate the owner's presence.
b This makes sure vital tasks are carried out in her absence.
a The house has an electronic door-keeper.
b It is programmed to recognise you.
c This gives access to family only.

PROBLEM-SOLVING Work in two groups, A and B. Group A, list all the advantages
of a network. Group B, list all the disadvantages. Then together
consider how the disadvantages can be minimised.

Group A Advantages of a network Group B Disadvantages of a network


76 UNIT 11 Networks

SPEAKING Transmission modes Work in pairs, A and B. Explain to your


partner how one mode of transmission between computers operates
with the help of the text provided. Your explanation should allow
your partner to label his/her diagram.

Student A
Your text is on page 186. Your explanation should allow your partner
to label this diagram.

Fig 3
Asynchronous transmission

Student B
Your text is on page 192. Your explanation should allow your partner
to label this diagram.

Fig 4
Synchronous transmission
UNIT 11 Networks 77

WRITING Using the lists you compiled in Task 6, describe the


advantages and disadvantages of networks. Try to link some of the
advantages and disadvantages as in these examples.

Advantages Disadvantages

Allow data to be shared. Permit viruses to spread


quickly.
Users can share software on Server failure means no one
the server. can work.

1 Although networks allow data to be shared, they permit viruses


to spread quickly.
2 Users can share software on the server; however server failure
means that no one can work.

WHEN YOU HAVE FINISHED THE READING SECTION ON THE FOLLOWING PAGES,
COME BACK TO THESE ADDITIONAL EXERCISES

3 Identify which layer attaches the following 4 Fill in the missing words in the following
headers to a network transmission: sentences then put the sentences in the correct
order:
a Specifying the language, the compression
and encryption schemes a The checksum is recalculated by the
b Identifying each segment's checksum and its layer which also reassembles the message
position in the message
c Containing the sequence of packets and the b The message is and by the
address of the receiving computer presentation layer.
d Marking the beginning and end of the c The message is reconverted into by
message and specifying whether the the physical layer.
messages will be sent half-duplex or full- d The session layer then sends the message to
duplex the next
e Identifying the sending and receiving e The application layer converts the bits into
computers characters, and directs the data to
the correct
f The incoming are recounted by the
network layer for and billing
purposes.
g The layer confirms the arrival of the
packets, them in, and calculates the
for each packet.
h The parts of the message are by the
layer until the message is
78 UNIT 11 Networks

IALIST READING
Network
D Find the answers to these questions in the
following text. Communications
Into what units is data subdivided by the The application layer is the only part of a
following layers? communications process that a user sees, and
a transport layer even then, the user doesn't see most of the work
b network layer that the application does to prepare a message
What is the purpose of a transmission for sending over a network. The layer converts a
checksum test? message's data from human-readable form into
How long does the data-link layer keep a bits and attaches a header identifying the
sending and receiving computers.
copy of each packet?
What processes can be carried out at The presentation layer ensures that the
intermediate nodes? message is transmitted in a language that the
Which network communications layer is receiving computer can interpret (often ASCII).
described by each of the following This layer translates the language, if necessary,
statements? and then compresses and perhaps encrypts the
data. It adds another header specifying the
a Makes sure that the message is
language as well as the compression and
transmitted in a language that the encryption schemes.
receiving computer can understand
b Protects the data being sent The session layer opens communications and
c Encodes and sends the packets has the job of keeping straight the
communications among all nodes on the network.
d Supervises the transmission
It sets boundaries (called bracketing) for the
e The part of a communications process
beginning and end of the message, and
that a user sees establishes whether the messages will be sent
f Starts communications and looks after half-duplex, with each computer taking turns
communications among network nodes sending and receiving, or full-duplex, with both
g Chooses a route for the message computers sending and receiving at the same
h Makes backup copies of the data if time. The details of these decisions are placed
required into a session header.
i Confirms the checksum, then addresses The transport layer protects the data being
and duplicates the packets sent. It subdivides the data into segments,
creates checksum tests - mathematical sums
based on the contents of data - that can be used
later to determine if the data was scrambled. It
can also make backup copies of the data. The
transport header identifies each segment's
checksum and its position in the message.
The network layer selects a route for the
message. It forms data into packets, counts them,
and adds a header containing the sequence of
packets and the address of the receiving
computer.
The data-link layer supervises the
transmission. It confirms the checksum, then
addresses and duplicates the packets. This layer
keeps a copy of each packet until it receives
confirmation from the next point along the route
that the packet has arrived undamaged.
UNIT 11 Networks 79

sending computer receiving computer

Re-read the text to find the answers to


B these questions.
1 Match the term in Table A with the
statement in Table B.

Table A
application layer
a Bracketing
header
presentation layer
b Half-duplex
header c Full-duplex
session layer d Checksum
header
transport layer Table B
header i Transmission mode in which each
network layer computer takes turns sending and
header receiving
data-link layer
ii Mathematical calculations based on the
contents of data
physical layer
iii Set boundaries for the beginning and end
of a message
intermediate iv Transmission mode in which both
node
computers send and receive at the same
time
The physical layer encodes the packets into
the medium that will carry them - such as an 2 Mark the following statements as True or
analogue signal, if the message is going across a False:
telephone line - and sends the packets along that a Most of the work that an application does to
medium. prepare a message for sending over a
An intermediate node calculates and verifies network is not seen by the user.
the checksum for each packet. It may also reroute b ASCII is always used to transmit data.
the message to avoid congestion on the network. c The encryption layer compresses the
At the receiving node, the layered process message.
that sent the message on its way is reversed. d The network layer keeps track of how many
The physical layer reconverts the message into packets are in each message.
bits. The data-link layer recalculates the e The network layer keeps a copy of each
checksum, confirms arrival, and logs in the packet until it arrives at the next node
packets. The network layer recounts incoming undamaged.
packets for security and billing purposes. The f Analogue signals are used on ordinary
transport layer recalculates the checksum and telephone lines.
reassembles the message segments. The session
g When a message arrives at its destination, it
layer holds the parts of the message until the
message is complete and sends it to the next passes through the same seven network
layer. The presentation layer expands and communications layers as when it was sent,
decrypts the message. The application layer but in reverse order.
converts the bits into readable characters, and
directs the data to the correct application. Additional exercises on page 77

['How Computers Work' by Ron White and Timothy Edward Downs


(Ziff-Davis Press) - Extract in PC Magazine, February 1993]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy