LESSON 4 NETWORK ADAPTOR CARD and NETWORK STANDARDS

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

LESSON FOUR;

NETWORK ADAPTER CARD

4.1 What is a Network Adapter card ?.


 A network interface controller (also known as a network interface card(NIC), network
adapter, LAN adapter and by similar terms) is a computer hardware component that
connects a computer system to a computer network.

 A network adapter card acts as an interface between the computer and the network cable.
The card is Inserted in an expansion slot of each computer of the network. The function
of the network card is to manage the flow of network information to and from the
computer in which it resides.

 Before the data is sent over the network the network adapter card converts it into a form that
can travel over a network cable. This is accomplished through the translation of the
computer's digital signals into electrical and optical signals that can travel on the network
cable. For example, toen ring adapters want to receive a token transmitting and release the
token after transmitting.

 A network card is the physical interface between the computer and cable. It converts the
data sent by the computer into a form which can be used by the network cable, transfers that
data to another computer and controls the dataflow between the computer and cable. It also
translates the data coming from the cable into bytes so that the computer's CPU can read it.
This is why a network card is an expansion card inserted into an expansion slot.

4.2 What is the role of the Network adapter card ?.

For any computer, a NIC performs following crucial tasks:

1. It establishes and manages the computer’s network connection.

2. it translates digital data( of source computer) into signals (appropriate for the
networking medium) for outgoing messages, and translates from signals into digital
computer data for incoming messages.

BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @ JAN - APRIL 2024 1
3. Converts serial incoming data via cable into parallel data to for CPU, and vice versa.

4. It has some memory, which acts as a holding tank or buffer. It buffers the data to
control the data flow.

4.3 Types of Network Interface Cards.

Network interface cards, referred to as NICs, are PC integrate cards that give inter-networking
capabilities for a particular computing solution. There are many types of NICs that are utilized in
changeable situations. The biggest variation between cards is depending upon their connective
medium and speed capabilities.

To a lesser extent, NICs can be distinguished by their type of connectivity to PC.

1. 10/100 Ethernet

These are networking cards that are utilized often in home or small office setting. As name
implies, they are able of speeds up to 10 or 100 megabits per second, not to be confused with
megabytes per second. These cards generally attach to PC using a PCI, PCIe or ISA motherboard
interface slot. These cards are setup to utilize category 5 or 6 networking cables.

The variation between category 5 and 6 networking cables is addition of more shielding in
category 6 cable to decrease "cross-talk" that slows network transfer speeds.

2. Gigabit Ethernet

Gigabit Ethernet NICs give network transfer speeds of up to one Gigabit per second. These cards
attach to PC using same means as before mentioned, though, they are much more likely to be
formed for PCIe slots. These NICs can use Category 5, 5e, 6, and 7 cabling, with a preference for
latter. Though, these NICs are more frequently created to use fiber optic cables for utilize in

BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @ JAN - APRIL 2024 2
enterprise solutions like web servers or data storage centers.

3. Fiber Optics.

Main network infrastructures like tier 1 and 2 Internet backbones need more controlling NICs.
Fiber optic NICs consume fiber optic cabling to achieve speeds of 10 gigabits per second, with a
requirement below review to push this limit to 100 gigabits per second. These NICs are
frequently, though not always, exterior devices that attach to servers or workstations by an inter-
networking plane which gives a lower connective speed to individual devices like 100 Mb/s.
These NICs are a significant financial investment and need much service and maintenance.

4. Wireless NICs

Wireless NICs give similar networking capabilities as wired counterparts, though they have their
own transfer capabilities. Speeds of 54 Mb/s are usually available to wireless NICs without
teaming some NICs together to mix bandwidths. These NICs, though give for wireless
networking that permits for freedom in PC topology and installation.

5. Wireless Dongles

There is a wireless networking device utilized by individual machines that have access to a main
PC that is attached to a wireless router. This wireless router permits user to install wireless
dongles rather than whole routers with every extra machine on network. These devices attach by
ether connectors to a standard Ethernet card; though, they are common in a USB compatible
connective specification. This connectivity through USB permits for real time plug and play
installation without financial load of buying many wireless routers per machine.

BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @ JAN - APRIL 2024 3
NETWORKING STANDARDS.
4.4 What is a Network Standards ?.
 The importance of standards in the field of communication cannot be overstressed. Standards
enable equipment from different vendors and with different operating characteristics to
become components of the same network. Standards also enable different networks in
different geographical locations (e.g., different countries and continents) to be
interconnected. From a customer’s point of view, standards mean real cost savings: the same
end-user device can be used for access to a variety of networks and services.
 Standards are developed by national and international organizations established for this exact
purpose.

4.5 Types of Standards


Standards are of two types
 De facto − These are the standards that are followed without any formal plan or approval
by any organization. They have come into existence due to traditions or facts. For
example, the HTTP had started as a de facto standard.

 De jure − These standards are the ones which have been adopted through legislation by
any officially recognized standards organization. Most of the communication standards
that are used today are de jure standards.

There are a number of important standards developed by various organizations, including


the following:
a) The International Standards Organization (ISO) has already been mentioned. This is a
voluntary organization with representations from national standards organizations of
member countries (e.g., ANSI), major vendors, and end-users. ISO is active in many area
of science and technology, including information technology. ISO standards are
published as ISO serial-no (e.g., ISO 8632).
b) The Consultative Committee for International Telegraph and Telephone (CCITT) is
a standards organization devoted to data and telecommunication, with representations
from governments, major vendors, telecommunication 14 Communication Networks
Copyright © 2005 PragSoft carriers, and the scientific community. CCITT standards are

BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @ JAN - APRIL 2024 4
published as Recommendation L.serial-no, where L is a letter of the alphabet (e.g., I.440).
These are revised and republished every four years. CCITT standards are very influential
in the field of telecommunications and are adhered to by most vendors and carriers.
c) The Institute of Electrical and Electronic Engineers (IEEE) is a US standards
organization with members throughout the world. IEEE is active in many electric and
electronic-related areas. The IEEE standards for local area networks are widely adopted
and will be discussed in Chapter 9. IEEE standards are published as IEEE serial-no (e.g.,
IEEE 908).
d) The Electronic Industries Association (EIA) is a US trade association best known for
its EIA-232 standard, which will be discussed in the next chapter.
e) The European Computer Manufacturers Association (ECMA) is a standards
organization involved in the area of computer engineering and related technologies.
ECMA directly cooperates with ISO and CCITT.

In addition to these organizations, and because of their global market influence, large vendors
occasionally succeed in establishing their products as de facto standards.

Reasons for having networking standards

 This is to produce equipments and networks by comparing which are compatible.


 These set of standards minimizes rate of creating network that use equipment from different
vendors who may follow different protocol.
 Designing a network with equipment that compiles with a set of standards.
 It helps users of these networks can share information helps sources and over different
network schemes.
 The use of standards in network design and installation helps in managing system by
creating common management processes characterized according to how computer
determines that a message has been received and all its data is correct. The different type of
sync protocol are character type of sync protocol are character type, byte content type and
bit type.

BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @ JAN - APRIL 2024 5
CLASS EXERCISE 4

1. All of them are the role of NIC except for one.


a) To prepare data from the computer for the network cable
b) Send the data to another computer
c) Control the flow of the data between the computer and the cabling system
d) Provides the computer with a dedicated, full-time connection to a network

2. What radio frequency does 802.11b use?


A.) 1.2 GHz
B.) 2.4 GHz
C.) 3.6 GHz
D.) 4.8 GHz

3. Which 802.11 standard can be affected by microwave ovens, cordless phones, and other
appliances?
A.) 802.11a
B.) 802.11b
C.) 802.11g
D.) 802.11n

4. You can make telephone calls over the Internet using a technology called…
o A. Intertel
o B. Telenet
o C. VoIP
o D. Skynet

5. A computer must have an IP address when… (Select all correct answers )


o A. Connecting to a home network router
o B. Connecting to a Wi-Fi hotspot
o C. Communicating with another computer using TCP
o D. Playing media from the hard drive

BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @ JAN - APRIL 2024 6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy