Thursday, April 10, 2014

PARTS OF COMPUTER


Parts of a computer


If you use a desktop computer, you might already know that there isn't any single part called the "computer." A computer is really a system of many parts working together. The physical parts, which you can see and touch, are collectively calledhardware. (Software, on the other hand, refers to the instructions, or programs, that tell the hardware what to do.)
The following illustration shows the most common hardware in a desktop computer system. Your system might look a little different, but it probably has most of these parts. A laptop computer has similar parts but combines them into a single, notebook-sized package.
Picture of a desktop computer system
Desktop computer system
Let's take a look at each of these parts.

System unit

The system unit is the core of a computer system. Usually it's a rectangular box placed on or underneath your desk. Inside this box are many electronic components that process information. The most important of these components is the central processing unit (CPU), or microprocessor, which acts as the "brain" of your computer. Another component is random access memory (RAM), which temporarily stores information that the CPU uses while the computer is on. The information stored in RAM is erased when the computer is turned off.
Almost every other part of your computer connects to the system unit using cables. The cables plug into specific ports(openings), typically on the back of the system unit. Hardware that is not part of the system unit is sometimes called aperipheral device or device.
Picture of a system unit
System unit

Storage

Your computer has one or more disk drives—devices that store information on a metal or plastic disk. The disk preserves the information even when your computer is turned off.

Hard disk drive

Your computer's hard disk drive stores information on a hard disk—a rigid platter or stack of platters with a magnetic surface. Because hard disks can hold massive amounts of information, they usually serve as your computer's primary means of storage, holding almost all of your programs and files. The hard disk drive is normally located inside the system unit.
Picture of a hard disk drive
Hard disk drive

CD and DVD drives

Nearly all computers today come equipped with a CD or DVD drive, usually located on the front of the system unit. CD drives use lasers to read (retrieve) data from a CD; many CD drives can also write (record) data onto CDs. If you have a recordable disk drive, you can store copies of your files on blank CDs. You can also use a CD drive to play music CDs on your computer.
Picture of a CD
CD
DVD drives can do everything that CD drives can, plus read DVDs. If you have a DVD drive, you can watch movies on your computer. Many DVD drives can record data onto blank DVDs.

Tip

  • If you have a recordable CD or DVD drive, periodically back up (copy) your important files to CDs or DVDs. That way, if your hard disk ever fails, you won't lose your data.

Floppy disk drive

Floppy disk drives store information on floppy disks, also called floppies or diskettes. Compared to CDs and DVDs, floppy disks can store only a small amount of data. They also retrieve information more slowly and are more prone to damage. For these reasons, floppy disk drives are less popular than they used to be, although some computers still include them.
Picture of a floppy disk
Floppy disk
Why are these disks called "floppy" disks? The outside is made of hard plastic, but that's just the sleeve. The disk inside is made of a thin, flexible vinyl material.

Mouse

A mouse is a small device used to point to and select items on your computer screen. Although mice come in many shapes, the typical mouse does look a bit like an actual mouse. It's small, oblong, and connected to the system unit by a long wire that resembles a tail. Some newer mice are wireless.
Picture of a computer mouse
Mouse
A mouse usually has two buttons: A primary button (usually the left button) and a secondary button. Many mice also have a wheel between the two buttons, which allows you to scroll smoothly through screens of information.
Picture of mouse pointers
Mouse pointers
When you move the mouse with your hand, a pointer on your screen moves in the same direction. (The pointer's appearance might change depending on where it's positioned on your screen.) When you want to select an item, you point to the item and then click (press and release) the primary button. Pointing and clicking with your mouse is the main way to interact with your computer. For more information, see Using your mouse.

Keyboard

A keyboard is used mainly for typing text into your computer. Like the keyboard on a typewriter, it has keys for letters and numbers, but it also has special keys:
  • The function keys, found on the top row, perform different functions depending on where they are used.
  • The numeric keypad, located on the right side of most keyboards, allows you to enter numbers quickly.
  • The navigation keys, such as the arrow keys, allow you to move your position within a document or webpage.
Picture of a keyboard
Keyboard
You can also use your keyboard to perform many of the same tasks you can perform with a mouse. For more information, seeUsing your keyboard.

Monitor

monitor displays information in visual form, using text and graphics. The portion of the monitor that displays the information is called the screen. Like a television screen, a computer screen can show still or moving pictures.
There are two basic types of monitors: CRT (cathode ray tube) monitors and the newer LCD (liquid crystal display) monitors. Both types produce sharp images, but LCD monitors have the advantage of being much thinner and lighter.
Picture of an LCD monitor and a CRT monitor
LCD monitor (left); CRT monitor (right)

Printer

A printer transfers data from a computer onto paper. You don't need a printer to use your computer, but having one allows you to print e‑mail, cards, invitations, announcements, and other material. Many people also like being able to print their own photos at home.
The two main types of printers are inkjet printers and laser printers. Inkjet printers are the most popular printers for the home. They can print in black and white or in full color and can produce high-quality photographs when used with special paper. Laser printers are faster and generally better able to handle heavy use.
Picture of an inkjet printer and a laser printer
Inkjet printer (left); laser printer (right)

Speakers

Speakers are used to play sound. They can be built into the system unit or connected with cables. Speakers allow you to listen to music and hear sound effects from your computer.
Picture of computer speakers
Computer speakers

Modem

To connect your computer to the Internet, you need a modem. A modem is a device that sends and receives computer information over a telephone line or high-speed cable. Modems are sometimes built into the system unit, but higher-speed modems are usually separate components.
Picture of a cable modem
Cable modem



Random-access memory (RAM) -- Even the fastest processor needs a buffer to store information while it's being processed. The RAM is to the CPU as a countertop is to a cook: It serves as the place where the ingredients and tools you're working with wait until you need to pick up and use them. Both a fast CPU and an ample amount of RAM are necessary for a speedy PC. Each PC has a maximum amount of RAM it can handle, and slots on the motherboard indicate the type of RAM the PC requires.
Drives -- A drive is a device intended to store data when it's not in use. A hard drive or solid state drive stores a PC's operating system and software, which we'll look at more closely later. This category also includes optical drives such as those used for reading and writing CD, DVD and Blu-ray media. A drive connects to the motherboard based on the type of drive controller technology it uses, including the older IDE standard and the newer SATA standard.
Cooling devices -- The more your computer processes, the more heat it generates. The CPU and other components can handle a certain amount of heat. However, if a PC isn't cooled properly, it can overheat, causing costly damage to its components and circuitry. Fans are the most common device used to cool a PC. In addition, the CPU is covered by a metallic block called a heat sink, which draws heat away from the CPU. Some serious computer users, such as gamers, sometimes have more expensive heat management solutions, like a water-cooled system, designed to deal with more intense cooling demands.
Cables -- All the components we've mentioned so far are connected by some combination of cables. These cables are designed to carry data, power or both. PCs should be constructed so that the cables fold neatly within the case and do not block air flow throughout it.
A PC is typically much more than these core components. Next, we'll look at the ports and peripherals that let you interact with the computer and how you can add even more components using expansion slots.

Wednesday, April 9, 2014

Time Sharing System

A time sharing system allows many users to share the computer resources simultaneously. In other words, time sharing refers to the allocation of computer resources in time slots to several programs simultaneously. For example a mainframe computer that has many users logged on to it. Each user uses the resources of the mainframe -i.e. memory, CPU etc. The users feel that they are exclusive user of the CPU, even though this is not possible with one CPU i.e. shared among different users.
The time sharing systems were developed to provide an interactive use of the computer system. A time shared system uses CPU scheduling and multiprogramming to provide each user with a small portion of a time-shared computer. It allows many users to share the computer resources simultaneously. As the system switches rapidly from one user to the other, a short time slot is given to each user for their executions.
The time sharing system provides the direct access to a large number of users where CPU time is divided among all the users on scheduled basis. The OS allocates a set of time to each user. When this time is expired, it passes control to the next user on the system. The time allowed is extremely small and the users are given the impression that they each have their own CPU and they are the sole owner of the CPU. This short period of time during that a user gets attention of the CPU; is known as a time slice or a quantum. The concept of time sharing system is shown in figure.
                               
In above figure the user 5 is active but user 1, user 2, user 3, and user 4 are in waiting state whereas user 6 is in ready status.
As soon as the time slice of user 5 is completed, the control moves on to the next ready user i.e. user 6. In this state user 2, user 3, user 4, and user 5 are in waiting state and user 1 is in ready state. The process continues in the same way and so on.
The time-shared systems are more complex than the multi-programming systems. In time-shared systems multiple processes are managed simultaneously which requires an adequate management of main memory so that the processes can be swapped in or swapped out within a short time.
Note: The term 'Time Sharing' is no longer commonly used, it has been replaced by 'Multitasking System'
  • While multiprogrammed systems used resources more efficiently i.e. minimized CPU idle time, a user could not interact with a program.
  • Time-Sharing Systems Interactive Computing. Time sharing (or multitasking) is a logical extension of multiprogramming. In time-sharing systems, the CPU executes multiple jobs by switching among them, but the switches occur so frequently that the users can interact with each program while it is running.
  • The user gives instructions to the OS or to a program directly, using a input device such as a keyboard or a mouse, and waits for immediate results on an output device. Accordingly, the response time should be short-typically less than one second.
  • As the system switches rapidly from one user to the next, each user is given the impression that the entire computer system is dedicated to his use, even though it is being shared among many users.
  • The CPU switches to the next job that can be run whenever the current job enters a wait state or after the current job has used a standard unit of time.
  • When viewed over a relatively long time frame, we obtain the appearance that the CPU is simultaneously running multiple programs.
  • A time-shared OS uses CPU scheduling and multiprogramming to provide each user with a small portion of a time-shared computer.
  • Time-sharing and multiprogramming require several jobs to be kept simultaneously in memory. Since in general main memory is too small to accommodate all jobs, the jobs are kept initially on the disk in the job pool.
  • Processes are swapped in and out of main memory to the disk. In effect, we are now ``memory sharing'' between competing users (programs). This idea leads to a mechanism called virtual memory.
  • Virtual memory is a technique that allows the execution of a process that is not completely in memory. The main advantage of the virtual-memory scheme is that it enables users to run programs that are larger than actual physical memory.
  • If several jobs are ready to be brought into memory, and if there is not enough room for all of them, then the system must choose among them. Making this decision is job scheduling.
  • When the OS selects a job from the job pool, it loads that job into memory for execution. Having several programs in memory at the same time requires some form of memory management.
  • In addition, if several jobs are ready to run at the same time, the system must choose among them. Making this decision is CPU scheduling.
  • Further, it abstracts main memory into a large, uniform array of storage, separating logical memory as viewed by the user from physical memory.
  • This arrangement frees programmers from concern over memory-storage limitations.
  • Time-sharing systems must also provide a file system. The file system resides on a collection of disks; hence, disk management must be provided.
  • Also, time-sharing systems provide a mechanism for protecting resources from inappropriate use.
  • To ensure orderly execution, the system must provide mechanisms for job synchronization and communication, and it may ensure that jobs do not get stuck in a deadlock, forever waiting for one another.
  • New OS Functionalities: More complex job scheduling, memory management, concurrency control and synchronization.
  • The sensible sharing of resources such as CPU time and memory must be handled by the OS. For this control program to always be in control, we require that it never be blocked from running. The OS, which might in fact be organized like a small number of cooperating programs, will lock itself into memory and then control CPU allocation priority in order that it never be blocked from running.

Time-sharing operating systems

Time sharing is a technique which enables many people, located at various terminals, to use a particular computer system at the same time. Time-sharing or multitasking is a logical extension of multiprogramming. Processor's time which is shared among multiple users simultaneously is termed as time-sharing. The main difference between Multiprogrammed Batch Systems and Time-Sharing Systems is that in case of Multiprogrammed batch systems, objective is to maximize processor use, whereas in Time-Sharing Systems objective is to minimize response time.
Multiple jobs are executed by the CPU by switching between them, but the switches occur so frequently. Thus, the user can receives an immediate response. For example, in a transaction processing, processor execute each user program in a short burst or quantum of computation. That is if n users are present, each user can get time quantum. When the user submits the command, the response time is in few seconds at most.
Operating system uses CPU scheduling and multi-programming to provide each user with a small portion of a time. Computer systems that were designed primarily as batch systems have been modified to time-sharing systems.
Advantages of Time sharing operating systems are following
·         Provide advantage of quick response.
·         Avoids duplication of software.
·         Reduces CPU idle time.
Disadvantages of Timesharing operating systems are following.
·         Problem of reliability.
·         Question of security and integrity of user programs and data.
·         Problem of data communication.


Monday, April 7, 2014

Advantage of Digital Over Analog Signal Processing

1.  The main advantage of digital signals over analog signals is that the precise signal level of the digital signal is not vital. This means that digital signals are fairly immune to the imperfections of real electronic systems which tend to spoil analog signals. As a result, digital CD's are much more robust than analog LP's.
2. Codes are often used in the transmission of information. These codes can be used either as a means of keeping the information secret or as a means of breaking the information into pieces that are manageable by the technology used to transmit the code, e.g. The letters and numbers to be sent by a Morse code are coded into dots and dashes.
3. Digital signals can convey information with greater noise immunity, because each information component (byte etc) is determined by the presence or absence of a data bit (0 or one). Analog signals vary continuously and their value is affected by all levels of noise.
4. Digital signals can be processed by digital circuit components, which are cheap and easily produced in many components on a single chip. Again, noise propagation through the demodulation system is minimized with digital techniques.
5. Digital signals do not get corrupted by noise etc. You are sending a series of numbers that represent the signal of interest (i.e. audio, video etc.)
6.  Digital signals typically use less bandwidth. This is just another way to say you can cram more information (audio, video) into the same space.
7. Digital can be encrypted so that only the intended receiver can decode it (like pay per view video, secure telephone etc.)
8. Enables transmission of signals over a long distance.
9. Transmission is at a higher rate and with a wider broadband width.
10. It is more secure.
11. It is also easier to translate human audio and video signals and other messages into machine language.
12. There is minimal electromagnetic interference in digital technology.
13. It enables multi-directional transmission simultaneously.

Saturday, April 5, 2014

MULTIPLAXING

What is multiplexing?
Frequency-Division Multiplexing
Time-Division Multiplexing (Synchronous)
Statistical Time-Division Multiplexing, etc.



Different type of Multiplexers
Frequency division multiplexing (FDM)
·       Time division multiplexing (TDM)
Frequency Division Multiplexing
(FDM)
           Frequency spectrum is divided among multiple logical channels.
     • Each user can have access to its own assigned frequencies or logical channels at all the time the individual user is active.
    • Sends the signal in several distinct frequency ranges.
    • Used in cable TV.
    • Carry multiple video channel on a single cable
     Each signal is modulated on the different carrier frequency and the carrier frequencies are separated by guard‐bands.


FDM System



FDM of Three Voiceband Signals
 Disadvantages of FDM
    • The problem with the FDM is that it cannot utilize the full
capacity of the system.
      • We need to ensure that the adjacent band do not overlap         each other otherwise signal mayefect other Signal.
       
Time Division Multiplexing           
                 (T DM)
    • In time division multiplexing the time is divided into multiple smaller units called slots and each user is given a slot to transmit it signal.
    • Each user have the entire bandwidth of the channel for short duration of time.
    • T‐1 and ISDN telephone lines are common examples of time division multiplexing.
     Used for digital signals or analog signals carrying digital data.
    • Data rate of the transmission medium exceeds the required data rate of all the signals.
    • Clock synchronization is one of the major issue in
     TDM systems as a small mismatch in the timing may ruin the utility of overall system.

         An important feature of sampling process is a conservation of time.
     • In principle, the communication link is used only at the sampling time instances.
     • Hence, it may be feasible to put other message’s samples between adjacent samples of this message
on a time‐shared basis.
     • This forms the time‐division multiplex (TDM) system.



Wednesday, April 2, 2014


NETWORK DEVICES

NETWORK DEVICES
Inter networking devices are products used to connect networks.  As computer networks grow in size and complexity, so do the inter networking devices used to connect them. Network devices are components used to connect computers or other electronic devices together so that they can share files or resources like printers or fax machines. Devices used to setup a Local Area Network (LAN) are the most common type of network devices used by the public. A LAN requires a hub, router, cabling or radio technology, network cards, and if online access is desired, a high-speed modem. Happily this is much less complicated than it might sound to someone new to networking. In a network, one computer is designated as the server, and the others, clients. The server is connected to an external hub, which the clients are also connected to. Now that the computers each have one foot in a common electronic door (the hub), they can use the hub to pass signals back and forth. To direct these signals, the hub contains a device known as a router. The router is the equivalent of an electronic traffic cop that handles data traffic between the computers. Every type of network device was developed to solve a problem. Network devices operate at different layers of the OSI model.
The Purposes of having devices
b        First, they allow a greater number of nodes to be connected to the network.
b        Second, they extend the distance over which a network can extend.
b        Third, they localize traffic on the network.
b        Fourth, they can merge existing networks.
b        Fifth, they isolate network problems so that they can be diagnosed more easily. 
Network Devices Types
Network devices are four types .They are
1-Hubs          2- Rutter’s       3- Switches         4-Routers
Hub
A Hub is a multiport repeater. It is normally used to create connections between stations in a physical star topology.
Multi-port repeaters are often called hubs. Hubs are very common internetworking devices. Generally speaking, the term hub is used instead of repeater when referring to the device that serves as the center of a star topology network

This is a hardware device that is used to network multiple computers together. It is a central connection for all the computers in a network, which is usually Ethernet-based. Information sent to the hub can flow to any other computer on the network. If you need to connect more than two computers together, a hub will allow you to do so. If you only need to network two computers together, a simple crossover Ethernet cable will do the trick.
Types of Hub
There are three types of hubs. These hubs include active, passive hub, and intelligent hub.
Active hubs
 Active hubs act as a connector between two regions. Amplify or repeat signals that pass to correct data transmission errors or help troubleshoot network problems. . This type of hub is quite similar to that of the passive hub but can perform the additional tasks. Active hubs are those hubs that can work as connector between two regions but also has ability to regenerate the information with the help of strong electrical signals. It is also called as the multi -port repeater. It helps in the communication and can upgrade the properties of the signals before delivery.
Passive hub
Merely connects cables on a network and provides no signal regeneration. Passive hubs act like a bridge allowing information to be received. Passive hubs simply pass on the data they receive on the network. Passive hub does not perform any particular function but it just behaves like a bridge between the cables of connection and just receives the information and forwards it without any change in topology.
Intelligent hubs
Intelligent hubs are hubs that perform the tasks of both an active hub and a passive hub. Intelligent hubs have the most features of all. Intelligent hubs are very useful in managing larger .The third and the last type of the hub that can perform the both functions of the active and the passive hub is generally referred to as the intelligent hub. Basically this hub provides the opportunity to increase the speed of networking and also make the performance of the network efficient as compared to other devices. Addition to their specific work intelligent hubs can also perform the different functions that of routing, bridging etc.
 PURPOSE of Hub
A hub is a word with several meanings. It can mean the central part of a rectangular box whose work is to join network devices like computers together thus forming a one network segment. This enables the computers to directly communicate with each other. It can also be used to mean the central part of the bicycle wheel which provides a surface for attaching the spokes of bicycles. With the help of hubs we can create a home network easily. Hubs can also monitor the whole network in a real inexpensive way. It also provide the opportunity to the users to connect their old devices with their hub drives.  Network hub or repeater hub is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and thus making them act as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The device is thus a form of multiport repeater. Repeater hubs also participate in collision detection, forwarding a jam signal to all ports if it detects a collision. 


FUNCTION
The functions of a hub within a network is so they produce packets to the location of the service required to load or view a webpage or document. A hub is a network device that connects multiple computers on a LAN so they can communicate with one another, the rest of the network, and the Internet. All users connected to a hub share the available network bandwidth (unlike a switch, which provides full bandwidth to each computer). Hubs enable computers on a network to communicate. Each computer plugs into the hub with an Ethernet cable, and information sent from one computer to another passes through the hub. A hub can't identify the source or intended destination of the information it receives, so it sends the information to all of the computers connected to it, including the one that sent it. A hub can send or receive information, but it can't do both at the same time. This makes hubs slower than switches. Hubs are the least complex and the least expensive of these devices.
Network with a hub
Switches
A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). Ethernet switch devices were commonly used on home networks before home routers became popular; broadband routers integrate Ethernet switches directly into the unit as one of their many functions. High-performance network switches are still widely used in corporate networks and data centers.
A Network Switch is a constituent of computer network that connects two network slices and/or two network devices (switches or routers) together. Switch can be termed as a network bridge with multiple ports which helps to process and route packets at data link layer of the OSI reference model. There are some switches which have capabilities to process data at the upper layers (network layer and above). Those switches are often termed as multilayer switches.





Two layer switch
Layer 2 refers to the Data Link layer of the commonly-referenced multilayered communication model, Open Systems Interconnection (OSI). The Data Link layer is concerned with moving data across the physical links in the network. In a network, the switch is a device that redirects data messages at the layer 2 level, using the destination Media Access Control (MAC) address to determine where to direct the message.
The Data-Link layer contains two sub-layers that are described in the IEEE-802 LAN standards:
·         Media Access Control (MAC) sub-layer
·         Logical Link Control (LLC) sub-layer
The Data Link layer ensures that an initial connection has been set up, divides output data into data frames, and handles the acknowledgements from a receiver that the data arrived successfully. It also ensures that incoming data has been received successfully by analyzing bit patterns at special places in the frames

Layer 2 Functionality

  • Store and Forward: The switch stores and verifies each packet before routing it.
  • Cut through: The switch verifies the portion of the packet header up to the hardware address of frame before it is forwarded. They may have to stick to the store and forward procedure if the outgoing port is engaged when the packet enters.
  • Fragment free: It is the methodology that tries to preserve the advantages of both cut through and store and forward functionalities. Fragment free verifies the first 64 bytes of the packet, wherein addressing details are saved. This is because; collisions should be determined within the first 64 bytes of the packet frame, so erroneous packet frames will not be routed.
  • Adaptive switching: This method automatically selects one of the above three methods depending upon traffic situation.
L 3 Switches
 Network device that forwards traffic based on layer 3 information at very high speeds. Traditionally, routers, which inspect layer 3, were considerably slower than layer 2 switches. In order to increase routing speeds, many "cut-through" techniques were used, which perform an "inspect the first packet at layer 3 and send the rest at layer 2" type of processing. Ipsilon's IP Switch and Cabletron's SecureFast switches were pioneers in cut-through switching.
A Layer 3 switch is a high-performance device for network routing. Layer 3 switches actually differ very little from routers. A Layer 3 switch can support the same routing protocols as network routers do. Both inspect incoming packets and make dynamic routing decisions based on the source and destination addresses inside. Both types of boxes share a similar appearance. A hybrid device is the latest improvement in internetworking technology. Combining the packet handling of routers and the speed of switching, these multilayer switches operate on both layer 2 and layer 3 of the OSI network model. The performance of this class of switch is aimed at the core of large enterprise networks. Sometimes called routing switches or IP switches, multilayer switches look for common traffic flows, and switch these flows on the hardware layer for speed. For traffic outside the normal flows, the multilayer switch uses routing functions. This keeps the higher overhead routing functions only where it is needed, and strives for the best handling strategy for each network packet.
Many vendors are working on high end multilayer switches, and the technology is definitely a "work in process". As networking technology evolves, multilayer switches are likely to replace routers in most large networks.
Functions
The basic function that any switch is supposed to perform is to receive information from any source connected to it and dispatch that information to the appropriate destination only. This thing differentiates switches from hubs. Hub gets the information and forwards that to every other device in the network. This is the reason why switches are called intelligent devices.
The network switch has become a crucial part of present local area networks (LANs). LANs with medium to large sizes are established using a number of inter-linked network switches. SOHO (Small Office/Home office) networks generally consist of a single switch, or sometimes a multi-purpose device like a residential gateway to utilize small office/home broadband services such as Digital subscriber line (DSL) and cable Internet. Nowadays, we have been using router-like components which interface to the particular physical broadband technology. We may see some people using telephone technology on internet using Voice over IP (VoIP).
As mentioned above, a switch is operated at the data link layer to develop a distinct collision domain for each port of the switch. Let us consider, there are four computers - A, B, C, and D connected to four ports of the switch, then any pair , say A and B, may transfer data in either directions, at the same time, the other pair, C and D, can exchange their information simultaneously, and these two communications will not interrupt each other. Using full duplex mode, pairs may get overlapped (A communicating with B, B with C, and so on). Whereas in hubs, all of them have to share the same bandwidth by running in half duplex mode, causing collisions, which will result in unnecessary packet retransmissions.

Network Switching

The benefits of switching vary from network to network. Adding a switch for the first time has different implications than increasing the number of switched ports already installed. Understanding traffic patterns is very important to network switching - the goal being to eliminate (or filter) as much traffic as possible. A switch installed in a location where it forwards almost all the traffic it receives will help much less than one that filters most Network response times (the user-visible part of network performance) suffers as the load on the network increases, and under heavy loads small increases in user traffic often results in significant decreases in performance. This is similar to automobile freeway dynamics, in that increasing loads results in increasing throughput up to a point, then further increases in demand results in rapid deterioration of true throughput. In Ethernet, collisions increase as the network is loaded, and this causes retransmissions and increases in load which cause even more collisions. The resulting network overload slows traffic considerably.
Using network utilities found on most server operating systems network managers can determine utilization and collision rates. Both peak and average statistics should be considered.
PURPOSE OF SWITCHES
Switches work the same way as hubs, but they can identify the intended destination of the information that they receive, so they send that information to only the computers that are supposed to receive it. Switches can send and receive information at the same time, so they can send information faster than hubs can. If your home network has four or more computers or you want to use your network for activities that require passing a lot of information between computers (such as playing network games or sharing music), you should probably use a switch instead of a hub. Switches cost a little more than hubs.
Rutter’s
         Routers have access to network layer addresses and contain software that enables them to determine which of several possible paths between those addresses the best for a particular transmission is.
          Router’s operate in the physical, data link, and network layers of the OSI model.
         Routers are another type of internetworking device.
         These devices pass data packets between networks based on network protocol or layer 3 information. Routers have the ability to make intelligent decisions as to the best path for delivery of data on the network.
Purpose of Rutter’s
Rutter’s enable computers to communicate and they can pass information between two networks—such as between your home network and the Internet. This capability to direct network traffic is what gives the router its name. Routers can be wired (using Ethernet cables) or wireless. If you just want to connect your computers, hubs and switches work well; however, if you want to give all of your computers access to the Internet using one modem, use a router or a modem with a built-in router. Routers also typically provide built-in security, such as a firewall. Routers are more expensive than hubs and switches.
Network with a wired router
An optical communications repeater receives light as input and outputs light. The output signal power source is external to the input power, but the output power may be driven by input power.
Radio repeaters are used in radio communication services such as Commercial or Amateur Radio. A radio repeater consists of a radio receiver connected to a transmitter. The radio signal is received, amplified and retransmitted, usually on a different frequency. Higher radio frequencies are limited to line-of-sight transmission, their range is blocked by mountains and the curvature of the Earth, and so repeaters are located on hills and mountains, to retransmit the signal beyond the obstruction. Radio repeaters are also used extensively in broadcasting, where they are known as broadcast relay stations. These extend the broadcast coverage area to remote communities, outside the range of the main broadcast station.
A dig repeater is a blend word meaning "digital repeater", particularly used in amateur radio. Store and forward dig repeaters generally receive a packet radio transmission

Function of a Router

The main function of a router is to enable the movement of data by a device from one network to another. A router is actually a specialized computer connected to one or more networks

MAIN FUNCTION OF ROUTER

Router has generally three main functions.
  • Packet Forwarding
  • Packet switching and
  • Packet filtering

PACKET FORWARDING:

Router maintains a routing table for all possible networks those can be reached.  In the routing table, a router maintains, subnet, Gateway, forwarding interface, timing etc of the destination network. If multiple paths exist to reach the destination network, only best path is maintained in the routing table .Once any packet is received, it checks the destination IP network in the routing table. If destination network is available in routing table, It forwards the packet otherwise it drops.

PACKET SWITCHING:

To move packets from one interface to another to get a packet to its destination.

PACKET FILTERING:

Packet filtering is such like firewall. By which you can define which network can be entered and which network can be dropped. In easy word, it filters the packet on the basis of IP address, subnet, and port no and protocols.
Repeaters
A network repeater is a computer hardware that is used to expand the boundaries of a wired or wireless local area network (LAN). These repeaters normally amplify data signals before sending them on to the uplinked segment, thereby countering signal decay that occurs over extended lengths of wire.
A repeater (or regenerator) is an electronic device that operates on only the physical layer of the OSI model. A repeater installed on a link receives the signal before it becomes too weak or corrupted, regenerates the original pattern, and puts the refreshed copy back on the link.
A repeater does not actually connect two LANS; it connects two segments of the same LAN. A repeater forwards every frame; it has no filtering capability

         

Function of a Repeater

A repeater is used to amplify signals carried by a network. The function of a repeater is to receive incoming signals or a packet of data, regenerate the signals to their original strength and retransmit them. When a repeater amplifies the electric signals in a network, they allow transmissions to travel a greater distance. For a repeater to work, both network segments must be identical
The function of a repeater is to amplify signals that are carried by a network. The repeater receives incoming signals, regenerates them to their original power and then retransmits them to cover longer distances.
A repeater is the simplest facility used for network interconnection, whose major function is to receive a network signal from one LAN terminal cable segment and to regenerate and retransmit the signal as it is in its original strength over a one or more other cable segment. Basically repeater regenerates the strength of the signal before transmitting it
Repeaters operate in the OSI model Physical layer and are transparent to all the protocols operating in the layers above the Physical layer.
A specific LAN implementation usually places a limit on the physical size of a single cable segment. The limit is based on the physical medium and transmission techniques used
Repeaters allow a network to be constructed to exceed the size limit of a single, physical, cable segment. The number of repeaters that can be used intandem is generally limited by a particular LAN implementation. Using a repeater between two or more LAN cables segment requires that the same physical layer protocol be used to send signal over all the cable segments
Example of how this work
Two LAN cable segment in an Ethernet LAN that both use baseband transmission could be connected with a repeater. Different types of physical transmission medium can be connected using a properly designed repeater as long as they handle similar type of signal, as explained below: Ethernet repeaters are available that allows all the various types of baseband Ethernet transmission medium, including 10baseT, Coaxial cable, 10base2 and twisted pair cable segment to be interconnected in the same LAN

Purpose of Repeaters
Repeaters are used to increase the range of a transmitted signal by re-transmission. For a conducted signal, an amplifier is used. Optical systems don't amplify but all these devices give the appearance of doing so.
Some of the energy traveling as direct current through a conductor is converted to heat energy. This causes a drop in potential energy (a voltage) across the ends of the conductor proportional to the current times the inverse of the conductor's conductance. Energy passing as alternating current is also lost as it travels but, since it changes direction, there is an additional loss proportional to the capacitive reactance times the current. Since alternating voltage and its current are out of phase, total losses equal the vector sum (rather than linear sum) of the two losses. Similarly, light, which consists of photons rather than electrons, suffer attenuation due to scattering and absorption. And then retransmit it on the same frequency. When providing a point-to-point telecom link using radio beyond line of sight, one uses repeaters in a microwave radio relay. A reflector, often on a mountaintop, that relays such signals around an obstacle, is called a passive repeater.
.