Repeaters, Bridges, Routers, and Gateways: A comparative
study
Computer Networking
Repeaters, Bridges, Routers, And Gateways:
A Comparative Study
4. Repeaters, Bridges, Routers,
and Gateways: A comparative study:
4.1 Repeaters
As signals travel along a network cable (or any other
medium of transmission), they degrade and become distorted
in a process that is called attenuation. If a cable is long
enough, the attenuation will finally make a signal unrecognizable
by the receiver.
A Repeater enables signals to travel longer distances
over a network. Repeaters work at the OSI's Physical layer.
A repeater regenerates the received signals and then retransmits
the regenerated (or conditioned) signals on other segments.
To pass data through the repeater in a usable fashion
from one segment to the next, the packets and the Logical
Link Control (LLC) protocols must be the same on the each
segment. This means that a repeater will not enable communication,
for example, between an 802.3 segment (Ethernet) and an
802.5 segment (Token Ring). That is, they cannot translate
an Ethernet packet into a Token Ring packet. In other words,
repeaters do not translate anything.
4.2 Bridges
Like a repeater, a bridge can join segments or workgroup
LANs. However, a bridge can also divide a network to isolate
traffic or problems. For example, if the volume of traffic from
one or two computers or a single department is flooding the
network with data and slowing down entire operation, a bridge
can isolate those computers or that department.
In the following figure, a bridge is used to connect two
segment segment 1 and segment 2.
Bridges can be used to:
Expand the distance of a segment.
Provide for an increased number of computers on the
network.
Reduce traffic bottlenecks resulting from an excessive
number of attached computers.
Bridges work at the Data Link Layer of the OSI model. Because
they work at this layer, all information contained in the higher
levels of the OSI model is unavailable to them. Therefore, they
do not distinguish between one protocol and another.
Bridges simply pass all protocols along the network. Because
all protocols pass across the bridges, it is up to the individual
computers to determine which protocols they can recognize.
A bridge works on the principle that each network node has
its own address. A bridge forwards the packets based on the
address of the particular destination node.
As traffic passes through the bridge, information about the
computer addresses is then stored in the bridge's RAM. The bridge
will then use this RAM to build a routing table based on source
addresses.
4.3 Routers
In an environment consisting of several network segments
with different protocols and architecture, a bridge may not
be adequate for ensuring fast communication among all of the
segments. A complex network needs a device, which not only knows
the address of each segment, but also can determine the best
path for sending data and filtering broadcast traffic to the
local segment. Such device is called a Router.
Routers work at the Network layer of the OSI model meaning
that the Routers can switc h and route packets across multiple
networks. They do this by exchanging protocol-specific information
between separate networks.Routers have access to more information
in packets than bridges, and use this information to improve
packet deliveries. Routers are usually used in a complex network
situation because they provide better traffic management than
bridges and do not pass broadcast traffic.
Routers can share status and routing information with one
another and use this information to bypass slow or malfunctioning
connections.
Routers do not look at the destination node address; they
only look at the network address. Routers will only pass the
information if the network address is known. This ability to
control the data passing through the router reduces the amount
of traffic between networks and allows routers to use these
links more efficiently than bridge
4.4 Gateways
Gateways make communication possible between different architectures
and environments. They repackage and convert data going from
one environment to another so that each environment can understand
the other's environment data.
A gateway repackages information to match the requirements
of the destination system. Gateways can change the format of
a message so that it will conform to the application program
at the receiving end of the transfer.
A gateway links two systems that do not use the same:
Communication protocols
Data formatting structures
Languages
Architecture
For example, electronic mail gateways, such as X.400 gateway,
receive messages in one format, and then translate it, and forward
in X.400 format used by the receiver, and vice versa.
To process the data, the gateway:
Decapsulates incoming data through the networks complete
protocol stack. Encapsulates the outgoing data in the complete
protocol stack of the other network to allow transmission.
4.5 NIC
A NIC or Network Interface Card is a circuit board or chip,
which allows the computer to communicate to other computers
on a Network. This board when connected to a cable or other
method of transferring data such as infrared can share resources,
information and computer hardware. Local or Wide area networks
are generally used for large businesses as well as are beginning
to be found in homes as home users begin to have more then one
computer. Utilizing network cards to connect to a network allow
users to share data such as companies being able to have the
capability of having a database that can be accessed all at
the same time send and receive e-mail internally within the
company or share hardware devices such as printers.
4.6 Connectors
Network cards have three main types of connectors. Below
is an example of what a network card may look like.
4.6.1 BNC connector:As illustrated in the above picture
the BNC connector is a round connector, which is used for thin
net or 10Base-2 Local Area Network.
4.6.2 DB9 (RJ45 JACK): The DB9 connector not to be
confused with the Serial Port or sometimes referred to as the
RJ45 JACK not to be confused with the RJ45 connection is used
with Token Ring networks.
4.6.3 DB15 Connector: The DB15 connector is used for
a Thick net or 10Base-5 Local area network.
4.6.4 RJ45 connector: Today one of the most popular
types of connections used with computer networks. RJ45 looks
similar to a phone connector or RJ11 connector however is slightly
larger.
LED - The LED's as shown in the above illustration indicates
if it detects a network generally by a green light which may
flash as it communicates and then a red light which indicates
collisions which will generally flash or not flash at all.
4.7 Cables
The following is a few examples of some of the more commonly
used types of cables found with networks.
As illustrated in the above picture you can see three of
the main types of cable used today. The first two pictures illustrate
Unshielded and Shielded twisted pair cables. Unshielded twisted-pair
cable is generally found in phone cables today and are used
more often then shielded twisted pair today as it has been found
that simply twisting the cable provides more efficient means
of protection against interference. In addition shielded twisted-pair
cable required the one end of the cable to be grounded. If both
ends were to be grounded however this would cause a grounding
loop causing low voltage and infinite amperage and various other
hazards to the network.
The third picture in the above illustration shows a coaxial
cable, which are the most commonly used and known types of cables.
This cable can be found for cable TV and when used with networks
utilize the BNC connector.
As illustrated in the above picture you can see three of
the main types of cable used today. The first two pictures illustrate
Unshielded and Shielded twisted pair cables. Unshielded twisted-pair
cable is generally found in phone cables today and are used
more often then shielded twisted pair today as it has been found
that simply twisting the cable provides more efficient means
of protection against interference. In addition shielded twisted-pair
cable required the one end of the cable to be grounded. If both
ends were to be grounded however this would cause a grounding
loop causing low voltage and infinite amperage and various other
hazards to the network.
The third picture in the above illustration shows a coaxial
cable, which are the most commonly used and known types of cables.
This cable can be found for cable TV and when used with networks
utilize the BNC connector.