Professional Documents
Culture Documents
Technology
Class X
Level 2
Students Handbook
2013-2014
Level 2
Students Handbook
2013-2014
CLASS
Information
Technology
Copies:
Published By
Design, Layout :
Printed By
H
k
k
j
r
d
k
l
af
o
/
k
u
m
sf
'
k
d
k
1
g
e
]
H
k
k
j
r
d
sy
k
sx
]
H
k
k
j
r
d
k
s,
d
l
E
i
w.
k
Z
i
zH
k
qR
o
&
l
ai
U
u
l
e
k
t
o
k
n
h
i
aF
k
f
u
j
i
s{
k
y
k
sd
r
a=
k
k
R
e
d
x
.
k
j
k
T
;
c
u
k
u
sd
sf
y
,
]
r
F
k
k
m
l
d
sl
e
L
r
u
k
x
f
j
d
k
sa d
k
s%
l
k
e
k
f
t
d
]
v
k
f
F
k
Zd
v
k
Sj
j
k
t
u
Sf
r
d
U
;
k
;
]
f
o
p
k
j
]
v
f
H
k
O
;
f
D
r
]
f
o
'
o
k
l
]
/
e
Z
v
k
Sj
m
i
k
l
u
k
d
h
L
o
r
a=
k
r
k
]
i
zf
r
"
B
k
v
k
Sj
v
o
l
j
d
h
l
e
r
k
i
zk
I
r
d
j
k
u
sd
sf
y
,
r
F
k
k
m
u
l
c
e
sa O
;
f
D
r
d
h
x
f
j
e
k
2
v
k
Sj
j
k
"
V
d
h
,
d
r
k
v
k
Sj
v
[
k
aM
r
k
l
qf
u
f
'
p
r
d
j
u
so
k
y
h
c
a/
qr
k
c
<
+k
u
sd
sf
y
,
n
`<
+l
ad
Y
i
g
k
sd
j
v
i
u
h
b
l
l
af
o
/
k
u
l
H
k
k
e
sa v
k
t
r
k
j
h
[
k
2
6
u
o
E
c
j
]
1
9
4
9
b
Z
d
k
s,
r
n
~}
k
j
k
b
l
l
af
o
/
k
u
d
k
sv
ax
h
r
]
v
f
/
f
u
;
f
e
r
v
k
Sj
v
k
R
e
k
f
i
Zr
d
j
r
sg
SaA
1
- l
af
o
/
k
u
(
c
;
k
y
h
l
o
k
al
a'
k
k
s/
u
)
v
f
/
f
u
;
e
]
1
9
7
6
d
h
/
k
j
k
2
}
k
j
k
(
3
1
1
9
7
7
)
l
s
i
zH
k
qR
o
&
l
ai
U
u
y
k
sd
r
a=
k
k
R
e
d
x
.
k
j
k
T
;
d
sL
F
k
k
u
i
j
i
zf
r
L
F
k
k
f
i
r
A
2
- l
af
o
/
k
u
(
c
;
k
y
h
l
o
k
al
a'
k
k
s/
u
)
v
f
/
f
u
;
e
]
1
9
7
6
d
h
/
k
j
k
2
}
k
j
k
(
3
1
1
9
7
7
)
l
s
j
k
"
V
d
h
,
d
r
k
d
sL
F
k
k
u
i
j
i
zf
r
L
F
k
k
f
i
r
A
H
k
k
x
4
d
e
wy
d
k
ZO
;
5
1
d
e
wy
d
k
ZO
;
&
H
k
k
j
r
d
si
zR
;
sd
u
k
x
f
j
d
d
k
;
g
d
k
ZO
;
g
k
sx
k
f
d
o
g
&
(
d
)
l
af
o
/
k
u
d
k
i
k
y
u
d
j
sv
k
Sj
m
l
d
sv
k
n
'
k
k
sZa]
l
aL
F
k
k
v
k
sa]
j
k
"
V
o
t
v
k
Sj
j
k
"
V
x
k
u
d
k
v
k
n
j
d
j
s_
(
[
k
)
L
o
r
a=
k
r
k
d
sf
y
,
g
e
k
j
sj
k
"
V
h
;
v
k
an
k
sy
u
d
k
si
zsf
j
r
d
j
u
so
k
y
sm
P
p
v
k
n
'
k
k
sZa d
k
s
n
;
e
sa l
at
k
s,
j
[
k
sv
k
Sj
m
u
d
k
i
k
y
u
d
j
s_
(
x
)
H
k
k
j
r
d
h
i
zH
k
qr
k
]
,
d
r
k
v
k
Sj
v
[
k
aM
r
k
d
h
j
{
k
k
d
j
sv
k
Sj
m
l
sv
{
k
q.
.
k
j
[
k
s_
(
?
k
)
n
s'
k
d
h
j
{
k
k
d
j
sv
k
Sj
v
k
g
~o
k
u
f
d
,
t
k
u
si
j
j
k
"
V
d
h
l
so
k
d
j
s_
(
)
H
k
k
j
r
d
sl
H
k
h
y
k
sx
k
sa e
sa l
e
j
l
r
k
v
k
Sj
l
e
k
u
H
k
zk
r
`R
o
d
h
H
k
k
o
u
k
d
k
f
u
e
k
Z.
k
d
j
st
k
s/
e
Z]
H
k
k
"
k
k
v
k
Sj
i
zn
s'
k
;
k
o
x
Zi
j
v
k
/
k
f
j
r
l
H
k
h
H
k
sn
H
k
k
o
l
si
j
sg
k
sa]
,
sl
h
i
zF
k
k
v
k
sa d
k
R
;
k
x
d
j
st
k
sf
L
=
k
;
k
sa d
sl
E
e
k
u
d
sf
o
#
g
Sa_
(
p
)
g
e
k
j
h
l
k
e
k
f
l
d
l
aL
f
r
d
h
x
k
Sj
o
'
k
k
y
h
i
j
ai
j
k
d
k
e
g
o
l
e
>
sv
k
Sj
m
l
d
k
i
f
j
j
{
k
.
k
d
j
s_
(
N
)
i
zk
f
r
d
i
;
k
Zo
j
.
k
d
h
f
t
l
d
sv
ar
x
Zr
o
u
]
>
h
y
]
u
n
h
]
v
k
Sj
o
U
;
t
h
o
g
Sa]
j
{
k
k
d
j
sv
k
Sj
m
l
d
k
l
ao
/
Zu
d
j
sr
F
k
k
i
zk
f
.
k
e
k
=
k
d
si
zf
r
n
;
k
H
k
k
o
j
[
k
s_
(
t
)
o
SK
k
f
u
d
n
`f
"
V
d
k
s.
k
]
e
k
u
o
o
k
n
v
k
Sj
K
k
u
k
t
Zu
r
F
k
k
l
q/
k
j
d
h
H
k
k
o
u
k
d
k
f
o
d
k
l
d
j
s_
(
>
)
l
k
o
Zt
f
u
d
l
ai
f
k
d
k
sl
qj
f
{
k
r
j
[
k
sv
k
Sj
f
g
al
k
l
sn
wj
j
g
s_
(
k
)
O
;
f
D
r
x
r
v
k
Sj
l
k
e
wf
g
d
x
f
r
f
o
f
/
;
k
sa d
sl
H
k
h
{
k
s=
k
k
sa e
sa m
R
d
"
k
Zd
h
v
k
sj
c
<
+u
sd
k
l
r
r
i
z;
k
l
d
j
sf
t
l
l
sj
k
"
V
f
u
j
ar
j
c
<
+r
sg
q,
i
z;
R
u
v
k
Sj
m
i
y
f
C
/
d
h
u
b
Zm
ap
k
b
;
k
sa d
k
sN
wy
s_
1
(
V
)
;
f
n
e
k
r
k
&
f
i
r
k
;
k
l
aj
{
k
d
g
S]
N
g
o
"
k
Zl
sp
k
Sn
g
o
"
k
Zr
d
d
h
v
k
;
qo
k
y
sv
i
u
s]
;
F
k
k
f
L
F
k
f
r
]
c
k
y
d
;
k
i
zf
r
i
k
Y
;
d
sf
y
;
sf
'
k
{
k
k
d
s
v
o
l
j
i
zn
k
u
d
j
sA
1
l
af
o
/
k
u
(
N
;
k
l
h
o
k
al
a'
k
k
s/
u
)
v
f
/
f
u
;
e
]
2
0
0
2
d
h
/
k
j
k
4
}
k
j
k
(
1
2
1
2
2
0
0
2
)
l
sa v
ar
%
L
F
k
k
f
i
r
A
Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "Sovereign Democratic Republic (w.e.f. 3.1.1977)
2.
Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "unity of the Nation (w.e.f. 3.1.1977)
FUNDAMENTAL DUTIES
ARTICLE 51A
Fundamental Duties - It shall be the duty of every citizen of India(a)
to abide by the Constitution and respect its ideals and institutions, the National Flag and the National
Anthem;
(b)
to cherish and follow the noble ideals which inspired our national struggle for freedom;
(c)
(d)
to defend the country and render national service when called upon to do so;
(e)
to promote harmony and the spirit of common brotherhood amongst all the people of India transcending
religious, linguistic and regional or sectional diversities; to renounce practices derogatory to the dignity of
women;
(f)
(g)
to protect and improve the natural environment including forests, lakes, rivers, wild life and to have
compassion for living creatures;
(h)
to develop the scientific temper, humanism and the spirit of inquiry and reform;
(i)
(j)
to strive towards excellence in all spheres of individual and collective activity so that the nation constantly
rises to higher levels of endeavour and achievement;
(k) who is a parent or guardian to provide opportunities for education to his/her child or, as the case may be,
ward between age of six and forteen years.
1.
Ins. by the constitution (Eighty - Sixth Amendment) Act, 2002 S.4 (w.e.f. 12.12.2002)
Preface
The national curriculum Framework, 2005, recommends that childrens life at school must
be linked to their life outside the school. This principle make a departure from the legacy of
bookish learning which continues to shape our systems and caused a gap between the
school home, community and the workplace.
The student workbook on information Technology (IT) is a part of qualification package
developed for the implementation of National Vocational Education Qualification
Framework (NVEQF), an initiative of Ministry of Human Resource Development (MHRD),
Government of India to set common principles and guidelines for a nationally recognised
qualification system covering the schools vocational education and training institutions,
technical education institutions, college and universities. It is envisaged that the NVEQF
will promote transparency of qualifications, cross-sect oral learning, student
qualifications, thus encouraging life-long learning.
The CBSE has developed materials (units) for the vocational qualification package in
IT/ITes sector for NVEQF levels 1 to 4; level 2 is equivalent to class X. Based on Nos
occupation related core competencies (Knowledge, skills and abilities) were identified for
development of curriculum and learning modules (units).
This student workbook attempts to discourage rote learning and to bring about necessary
flexibility in offering of courses necessary for breaking the sharp boundaries between
different subjects areas. The workbook attempts to enhance this endeavour by giving
higher priority and space to opportunities for contemplation and wondering, discussion in
small groups and activities requiring hands on experience.
Any suggestions, feedback from the readers for improvement in the future editions of the
volume shall be heartily welcomed.
Vineet Joshi
Chairman, CBSE
This student workbook, which forms a part of vocational qualification package for
students who have passed class IX or equivalent examination, was created by group of
experts. The IT-ITes skill development council approved by the national occupation
standards (NOS). The national occupation standards are a set of competency standards
and guidelines endorsed by the representatives of IT industry for recognized and
assessing skills and assessing skills and knowledge needed to perform effectively in the
workplace.
Contents
Preface
Acknowledgement
Networking Fundamentals
o
1
23
40
62
79
103
Unit Code
Unit Title
ITCC-201
Networking Fundamentals
Evolution of Networking and Need for Networking
Transmission of Data through different Switching Techniques
Data Communication Terminologies
Transmission Medium and Network Devices
Network Types and Layouts
ITDC-202
ITDC-204
ITDC-205
ITOC-206
Unit -
Networking Fundamentals
1.1 Evolution of Networking and Need for Networking
As you know, networking is widely used for accessing and sharing information;
examples include web browsing, downloading & uploading, file sharing, printer
sharing, etc. Today networking is popular with private and business users across the
globe.
In today's world, it can be extremely difficult to live without networks, since resource
sharing (printers, shared folders etc) and Internet connectivity have become an
integral part of our daily activities.
Networks in which all computers have an equal status are called peer to peer
networks. Generally in such a network each terminal has an equally competent CPU.
Peer-to-Peer Network
Client- Server
Networks in which certain computers have special dedicated tasks, providing
services to other computers (in the network) are called client server networks.
The computer(s) which provide services are called servers and the ones that use
these services are called clients.
Client-Server Network
Note: Clients are referred to as "Service Requestors" and Servers as "Service Providers".
Any machine that request a service is called as the client and machines that fulfill the
requests is called the client.
Intranet
Intranet refers to private computer network used by organizations for sharing
resources; Intranets can be simple within a building or very large spread across the
globe connected through various networking technologies. Intranets help employees
of an organization to locate information much faster resulting in increased
productivity. Though popularly referred to a company's internal website or portal,
Intranet usually employs other protocols such as POP3, SMTP, FTP, etc. and may even
offer a variety of services (you will read more about these in later sessions).
Extranet
Internet is one of the most useful technologies of modern times which help us in our
daily, personal and professional life. Internet is widely used by students, educational
institutes; scientist and professionals to gather information for research and
general information. Businesses use the Internet to access complex databases
such as financial database. The Internet is the largest encyclopedia for all age
groups. The Internet helps in maintaining contact with friends and relatives
who live across different locations via Internet chatting systems and email
software. Internet is also becoming a major source of entertainment for the general
public.
system of interlinked hypertext documents accessed via the Internet. With a web
browser, one can view web pages that may contain text, images, videos, and other
multimedia, and navigate between them via hyperlinks.
Information is stored on web servers referred to as web pages are retrieved by using a
web browser such as Firefox on the local computer. A Web Browser is software used
to view websites and acts as an interface between the user and the World Wide Web.
A Web server is a computer that stores web sites and their related files for viewing on
the Internet.
Some of the advantages associated with networking are:
o
Data Sharing: One of the most important uses of networking is to allow the
sharing of data. Users can send text files, spread sheets, documents,
presentations, audio files, video files, etc. to other users.
o
Hardware Sharing: Hardware components such as printers, scanners, etc.
can also be shared. For example, instead of purchasing 10 printers for each user,
one printer can be purchased and shared among multiple users thus saving
cost.
o
Internet Access Sharing: You can purchase a single Internet connection and
share it among other computers in a network instead of purchasing multiple
Internet connection for each computer. This is very commonly found in
Internet caf (browsing centres), schools, colleges, companies, etc.
o
Usage of network based applications such as web browsers, email clients,
chat application, audio & video calling, etc is another advantage.
?
In connectionless mode, packets have source & destination address for
routing that may take different paths. Example: Ethernet, IP, UDP.
?
In connection-oriented mode, connection is defined (a virtual circuit is
created) before a packet is transferred. Packet switching supports variable
packet sizes. Example: X.25, Frame Relay, TCP.
o
Cell Switching: Cell switching method is similar to that of packet switching but
has a fixed size for the cells transmitting data. Cell switching is efficient when large
amounts of data need to transferred. Example: ATM.
o
The data is broken up into bits of same sized pieces called packets.
o
A header is added to each packet explaining where the data has come from,
where it should end up and where it fits in with the rest of the packets.
o
Each packet is sent from computer to computer until it finds its destination.
Each computer on the way decides where next to send the packet. All
packets may not take the same route.
o
At the destination, the packets are examined. If any packets are missing or
damaged, a message is sent asking for them to be re-sent. This continues until
all packets have been received intact.
o
The packets are now reassembled into their original form. All this done in
seconds! To access the Internet, you need an active internet connection. You
need to gather and understand your requirement carefully before subscribing
to an internet connection plan. In this exercise, you will learn how to
choose an Internet connection.
In very simple language, let's see what happens to a piece of data, say a Web page,
when it is transferred over the Internet:
Some of the common questions that help you in your decision are:
o
What is the purpose of getting this connection?
o
Will you use the connection regularly?
o
How much data will be downloaded on an average per month?
o
How much speed do you need?
o
What technology is available in your particular area?
o
What are the different plans available from the ISP?
o
Is there any limitation or catch for the selected plan?
To access Wi-Fi, you need an access point with an active Internet connection.
Usually when you subscribe to an Internet connection, the ISP provides options
to purchase or rent a Wi-Fi router that can act as both an internet connectivity
device and an access point for Wi-Fi connectivity. Setting up a Wi-Fi network
requires technical expertise; however, you can access the Wi-Fi network by
connecting to an access point that is already setup for use. On computers that run
Windows XP, you can view the list of wireless networks available by using the
following procedure:
o
Right-Click on the Wireless Icon in the system tray and Click View Available
Wireless Networks.
Windows XP will display the list of available Wi-Fi networks; you can choose any of
the connection from the list. Select by Double-clicking on the name displayed in
the list.
Note: You may be prompted to enter a password if the selected network is secure. You
will receive a confirmation that you are connected to a wireless network. Now the
system is ready to be used for network related applications such as Firefox, Chrome,
Skype, etc.
Single Channel
Frequency
C1
C2
Frequency
Channel Operation
Channel operation refers to the mode of communication between connected devices
or computers. Channel operation can be simplex, half-duplex or fullduplex. Simplex is
a one way communication, similar to that of a radio. Halfduplex is a two way
communication but only one way at a time, similar to that of a walkie-talkie. Fullduplex is two way simultaneous communication (data can be received and sent at the
same time), similar to that of a telephone.
o
Broadband: Data is send as analog signals by using portion of a bandwidth.
Broadband supports use of multiple signals at different frequencies (multiple
channels). Signals are split into channels by using FDM (Frequency Division
Multiplexing). Example: xDSL, where telephone lines are used for both voice
(telephone) calls and data (Internet connectivity).
CSMA/CD
CSMA/CD (Carrier Sense Multiple Access/Collision Detect) as per IEEE 802.3
standard is a mechanism that defines how transmission takes place in a network.
Only one device in the collision domain may transmit at any one time, and the other
devices in the domain listen to the network before sending any packets in order to
avoid data collisions. Collisions also decrease network efficiency on a collision
domain. If two devices transmit simultaneously, a collision occurs, and both devices
device will wait for a random amount of time before attempting to transmit again.
Collision domains are found in a hub environment where each host segment connects
to a hub that represents only one collision domain and only one broadcast domain.
Modern wired networks use a network switch to eliminate collisions. By connecting
each device directly to a port on the switch, either each port on a switch becomes its
own collision domain (in the case of half duplex links) or the possibility of collisions is
eliminated entirely in the case of full duplex links. Collision domains are also found in
wireless networks such as Wi-Fi.; CSMA/CA is used in wireless networks.
CSMA/CA
Carrier sense multiple access with collision avoidance (CSMA/CA) is a network
multiple access method in which nodes attempt to avoid collisions by transmitting
only when the channel is sensed to be "idle". It is particularly important for wireless
networks, where the collision detection of the alternative CSMA/CD is unreliable due
to the hidden node problem.
Token Passing
Token passing is a channel access method where a signal called a token is passed
between nodes that authorize the node to communicate. The most well-known
examples are token ring and ARCNET.
Addressing methods
Type of Connectivity
Dial-Up
Wired
DSL
Wired
Wired
3G
Wireless
WiMAX
Wireless
Wi-Fi
Wireless
10
Dial-up connections are extremely slow and in most cases, it is replaced by a high
speed connection such as DSL or Cable Modem.
DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data
over wires of a local telephone network. DSL service is delivered along with wired
telephone service on the same telephone line. On the customer premises, a DSL
filter removes the high frequency interference, enabling simultaneous use of the
telephone and data transmission. For using a DSL connection, you need a DSL modem
and a subscription.
Cable Internet Access: Cable Internet Access is a form of broadband Internet access
that uses the cable television infrastructure. Cable Internet Access is provided
through existing cable TV networks; this is similar to DSL that is provided over
existing telephone lines.
3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and
mobile telecommunication services and networks. High-Speed Downlink Packet
Access (HSDPA) is 3G mobile telephony communications protocol that allows higher
data transfer speeds and capacity. If support for 3G is available on your mobile phone,
you can subscribe to the 3G connectivity with your ISP in order to get high speed
Internet connection on your phone.
Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically
for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid WiFi access to the Internet for their customers.
11
Fiber Optic: A fiber optic cable is a cable containing one or more optical fibers. FiberOptic cables are ideal for transmitting data over very long distances at great speeds as
light is used for the medium for transmission. Fiber optic cables are not susceptible to
any EMI, Near-end Crosstalk (NEXT), or Far-end Crosstalk (FEXT).
Note that you require special network interface cards & network switch that support
the fiber optic interface which is usually expensive and common only in large
enterprise networks or locations that are susceptible to EMI such as factories that
use heavy machineries.
Fiber-Optic cables consist of a high quality glass or plastic strands and a plastic jacket
made of Teflon or PVC that protects the cable.
Two types of Fiber-Optic cable exist: Single-Mode Fiber (SMF) used for longer
distances and Multi-Mode Fiber (MMF) used for shorter distances. Signals are
transmitted as light signals from source to destination. Either LED or Laser is used. In
multi-mode fiber, light signals are transmitted in numerous dispersed path (singlemode fiber use single light source) and making it un-suitable for long distance
transmissions.
In some cases, plenum rated cables are used that have a special jacket to protect
against fire and emit less smoke than normal cables. However, this is rare and often
seen only in industrial or manufacturing sites.
12
Network Hardware
TCP/IP Utilities
On computers that have support for networking, a list of utilities is available to
configure and troubleshoot network related issues. Often referred to as TCP/IP
utilities, these utilities are bundled along with the operating system. Though the
names of the utilities could vary in spelling, the underlying function is almost the
same across operating systems. Given below is a list of utilities (with simple
description) You will learn more about them in later sessions.
Utility
Description
Internet Protocol Configuration Utility
GETMAC
PING
TRACERT
ARP
Host name
NETSTAT
Nbtstat
Nslookup
Route
Pathping
Note: Use /? for additional help/syntax for each command listed here. For example to
know more about IPCONFIG, type IPCONFIG /?
Network devices such as NIC, hub, bridge, switch & routers are devices that help
computers to network and communicate. There are a variety of network devices
equipped with a wide range of functions.
IPCONFIG
13
Network Interface Cards are available for desktop, laptop and server computers.
A variety of interface such as PCI, CardBus, USB are available today. Most desktops,
laptops, servers and motherboards have built-in NIC.
Lab
View Network Interface card installed on a computer
Hub
A hub is a device that connects multiple computers using a twisted-pair cable. Hubs
operate at Layer 1 (Physical). The number of computers that can be connected to a
hub depends on the number of ports available (typically 4 to 8). Whenever it receives
data from one port, the hub broadcast data to all the devices connected to it, leading
to collisions. Hence hubs are referred to as multiport repeaters. Since the evolution of
SOHO routers and network switches, hubs are rarely used and considered obsolete.
Bridge
Bridge is a device that can connect network segments and separate network traffic
based on broadcasts. Bridges examine the frames and selectively transfer frames
according to their MAC address. Bridges operate at Layer 2 of the OSI Model.
Switch
Switch is a device that allows multiple computers to be connected using twisted pair
cable. Switches (operating at Level 2 - OSI) manage traffic based on MAC (Media
Access Control) addresses and are efficient in large networks. Switches are
intelligent as they can build a table of MAC Addresses of all the devices connected to
ports on the switch and create a virtual circuit for each attached device. Once a packet
is received, it is analyzed and forwarded to only the destined station with matching
MAC address based on the table.
14
Using switches can eliminate collision as each port in the switch acts as a collision
domain. Since switches isolate collision domains, they are referred to as multiport
bridges. When forwarding frames, switches use Store and forward, cut through,
Fragment free or Adaptive switching methods.
Unlike a hub that uses half-duplex communication, a network switch can send and
receive at the same time (full-duplex mode) resulting in faster performance.
Number of computers that you can connect to a switch depends on the number of
ports available (Typically 4 or 8 on SOHO switches designed for use in home and
small business networks and 8 - 32 or 64 on switches designed for use in an
enterprise network.). The networks can be extended by adding additional switches
usually cascaded from the primary switch. Switches designed for larger networks are
cascaded through a special port called the Uplink port.
15
o
to implement security.
For example if all the computers in an organization are connected to a single switch,
you can isolate them by creating VLAN's for each department resulting in restricted
access across departments with maximum access between computers within
departments. VLANs can be configured only on Managed switches.
Separate VLANs for marketing & finance team connected to a single switch
16
Router
Routers are Layer 3 devices that allow packets to be routed to different logical
networks. Routers can discover and transfer packets based on routing table that are
pre-determined or self-discovered. Routing tables are either managed by an
administrator by manually defining the routes or automated through special
configuration to exchange the routing tables with other routers on a logical network.
Most common type of routers includes the SOHO router used at home or small office
for sharing Internet connection; sophisticated routers are widely used in enterprise
networks and ISP's. Similar to SOHO switches, SOHO routers do not need to be
configured and routers designed for use in large networks require to be configured
before they can be used.
Enterprise Router
In general, a combination of several routers and switches are used in large networks.
Notable manufacturers of routers include Cisco, Nortel Networks, Avaya, HP, Dell,
Huawei, etc.
Routing
Routing is the process of selecting paths in a network when sending or receiving
packets across computers or devices. Imagine if you are planning to send a parcel to
someone; the parcel will travel through different offices, change routes if roadblocks
are detected and finally be delivered to the recipient. Similarly when you browse the
internet or send an email, packets take different routes (from your computer to your
ISP, from your ISP to the next ISP, etc.) until it reaches its destination.
SOHO Router
SOHO Router
Also referred to as a residential gateway, SOHO (Small Office Home Office) routers are
devices designed for use in small to medium sized networks. Most SOHO routers have
combinations of a switch, DSL or cable modem and an access point for Wi-Fi
connectivity. These devices are used for two primary purposes:
o
Connecting desktops & laptops across home or office.
17
o
Sharing a single Internet connection across desktops & laptops.
Some models include support for connecting peripherals such as printers, USB hard
disk drives, etc. through USB ports.
Wireless Networking
Introduction to Wireless Networking, RF Communication
Wireless network refers to a computer network that is not connected by any cables.
Typically Wireless networking is used where wired connectivity is not possible or
feasible due to technology costs or availability. Wireless telecommunications
networks are implemented and administered using a transmission system called
radio waves. This implementation takes place at the physical level (layer) of the OSI
model network structure.
Instant Messaging
Instant messaging (IM) is a form of communication over the Internet that offers an
18