12th Class
A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. A computer network allows sharing of resources and information among interconnected devices. In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software. Early networks of communicating computers included the military radar system Semi-Automatic Ground Environment (SAGE) and its relative the commercial airline reservation system Semi-Automatic Business Research Environment (SABRE), starting in the late 1950s. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. Development of the network began in 1969, based on designs developed during the 1960s. The ARPANET evolved into the modern Internet.
A computer network is a system for communicating between two or more computers and associated devices. It is an interconnection of computers for the purposes of sharing information and resources. A network is any collection of independent computers that communicate with one another over a shared network medium. A computer network is a collection of two or more connected computers. When these computers are joined in a network, people can share files and peripherals such as modems, printers, tape backup drives, or CD-ROM drives. When networks at multiple locations are connected using services available from phone companies, people can send e-mail, share links to the global Internet, or conduct video conferences in real time with other remote users. As companies rely on applications like electronic mail and database management for core business operations, computer networking becomes increasingly more important. A popular example of a computer network is the internet, which allows millions of users to share information
An example of a network
Internet
File sharing: Networking of computers helps the users to share data files. Hardware sharing: Users can share devices such as printers, scanners, CD-ROM drives, hard drives etc. Application sharing: Applications can be shared over the network, and this allows to implement client/server applications ser communication: Networks allow users to communicate using e-mail, newsgroups, and video conferencing etc. Network gaming: Lot of games are available, which are supports multi-users.
Connectivity and Communication: Networks connect computers and the users of those computers. Individuals within a building or work group can be connected into local area networks (LANs); LANs in distant locations can be interconnected into larger wide area networks (WANs). Once connected, it is possible for network users to communicate with each other using technologies such as electronic mail. This makes the transmission of business (or non-business) information easier, more efficient and less expensive than it would be without the network. Data Sharing: One of the most important uses of networking is to allow the sharing of data. Before networking was common, an accounting employee who wanted to prepare a report for manager would have to produce it on his PC, put it on a floppy disk, and then walk it over to the manager, who would transfer the data to her PC's hard disk. (This sort of shoe-based network was sometimes sarcastically called a sneakernet .) True networking allows thousands of employees to share data much more easily and quickly than this. More so, it makes possible applications that rely on the ability of many people to access and share the same data, such as databases, group software development, and much more. Intranets and extranets can be used to distribute corporate information between sites and to business partners. Hardware Sharing: Networks facilitate the sharing of hardware devices. For example, instead of giving each of 10 employees in a department an expensive color printer (or resorting to the sneakernet again), one printer can be placed on the network for everyone to share.
Internet Access: The Internet is itself an enormous network, so whenever you access the Internet, you are using a network. The significance of the Internet on modern society is hard to exaggerate, especially for those of us in technical fields. Internet Access Sharing: Small computer networks allow multiple users to share a single Internet connection. Special hardware devices allow the bandwidth of the connection to be easily allocated to various individuals as they need it, and permit an organization to purchase one high-speed connection instead of many slower ones. Data Security and Management: In a business environment, a network allows the administrators to much better manage the company's critical data. Instead of having this data spread over dozens or even hundreds of small computers in a haphazard fashion as their users create it, data can be centralized on shared servers. This makes it easy for everyone to find the data, makes it possible for the administrators to ensure that the data is regularly backed up, and also allows for the implementation of security measures to control who can read or change various pieces of critical information. Performance Enhancement and Balancing: Under some circumstances, a network can be used to enhance the overall performance of some applications by distributing the computation tasks to various computers on the network. Entertainment: Networks facilitate many types of games and entertainment. The Internet itself offers many sources of entertainment, of course. In addition, many multi-player games exist that operate over a local area network. Many home networks are set up for this reason, and gaming across wide area networks (including the Internet) has also become quite popular.
Price of Cheap Domain Registration in India TLD TLD com net org biz info in co.in net.in org.in us co.uk 1 Years INR 499.00 INR 499.00 INR 499.00 INR 499.00 INR 499.00 INR 799.00 INR 499.00 INR 499.00 INR 449.00 INR 449.00 INR 700.00 5 Years INR 2,495.00 INR 2,495.00 INR 2,495.00 INR 2,495.00 org.cn INR 2,495.00 tv INR 3,995.00 cc INR 2,495.00 ws INR 2,495.00 de INR 2,245.00 name INR 2,245.00 INR 3,500.00 mobi INR 700.00 INR 3,500.00 INR 499.00 INR 2,495.00 INR 1,000.00 INR 5,000.00 INR 1,500.00 INR 7,500.00 INR 1,500.00 INR 7,500.00 INR 2,200.00 INR 11,000.00 INR 1,500.00 INR 7,500.00 org.uk cn com.cn net.cn 1 Years INR 700.00 INR 1,500.00 INR 1,500.00 INR 1,500.00 5 Years INR 3,500.00 INR 7,500.00 INR 7,500.00 INR 7,500.00
IP Address
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995. IP addresses are binary numbers, but they are usually stored in text files and displayed in human-readable notations, such as 172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6). The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (Internet service providers) and other entities.
IP Addressing
An IP (Internet Protocol) address is a unique identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 (known as octets) separated by decimal points. This is known as "dotted decimal notation. Example: 140.179.220.200 It is sometimes useful to view the values in their binary form. 140 .179 .220 .200 10001100.10110011.11011100.11001000 Every IP address consists of two parts, one identifying the network and one identifying the node. The Class of the address and the subnet mask determine which part belongs to the network address and which part belongs to the node address.
Address Classes
There are 5 different address classes. We can determine which class any IP address is in by examining the first 4 bits of the IP address. Class A addresses begin with 0xxx, or 1 to 126 decimal. Class B addresses begin with 10xx, or 128 to 191 decimal. Class C addresses begin with 110x, or 192 to 223 decimal. Class D addresses begin with 1110, or 224 to 239 decimal. Class E addresses begin with 1111, or 240 to 254 decimal. Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine. [You can test this: you should always be able to ping 127.0.0.1, which points to yourself] Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. They should not be used for host addresses. Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N) and which part belongs to the node (n). Class A -- NNNNNNNN.nnnnnnnn.nnnnnnn.nnnnnnn Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn In the example, 140.179.220.200 is a Class B address so by default the Network part of the address (also known as the Network Address) is defined by the first two octets (140.179.x.x) and the node part is defined by the last 2 octets (x.x.220.200). In order to specify the network address for a given IP address, the node section is set to all "0"s. In our example, 140.179.0.0 specifies the network address for 140.179.220.200. When the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the network. 140.179.255.255 specifies the example broadcast address. Note that this is true regardless of the length of the node section.
Subnetting
Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive. Subnet Masking Applying a subnet mask to an IP address allows you to identify the network and node parts of the address. Performing a bitwise logical AND operation between the IP address and the subnet mask results in the Network Address or Number. For example, using our test IP address and the default Class B subnet mask, we get:
10001100.10110011.11110000.11001000 11111111.11111111.00000000.00000000 10001100.10110011.00000000.00000000 140.179.240.200 255.255.000.000 140.179.000.000 Class B IP Address Default Class B Subnet Mask
------------------------------------------------------------------------Network Address Default subnet masks: Class A - 255.0.0.0 - 11111111.00000000.00000000.00000000 Class B - 255.255.0.0 - 11111111.11111111.00000000.00000000 Class C - 255.255.255.0 - 11111111.11111111.11111111.00000000
IP versions
Two versions of the Internet Protocol (IP) are in use:
IP Version 4, and IP Version 6.
IP Address Format
The 32-bit IP address is grouped eight bits at a time, separated by dots and represented in decimal format known as dotted decimal notation. Each bit in the octet has a binary weight (128, 64, 32, 16, 8, 4, 2, 1). The minimum value for an octet is zero (0) and the maximum value for an octet is 255.
IP version 4 Addresses
In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses). IPv4 addresses are canonically represented in dot-decimal notation, which consists of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be presented in various hexadecimal, octal, or binary representations.
IP version 6 Addresses
IPv6 routing is almost exactly like IPv4 routing except for the length of the address and the subnet mask. Although IPv4 uses a dotted-decimal representation of the network prefix known as the subnet mask, a subnet mask is not used for IPv6. Only the prefix length notation is supported. IPv6 increases the IP address size from 32 bits to 128 bits to support more levels of the addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration. IPv6 supports approximately 340,282,366,920,938,463,463,374,607,431,768,211,456 possible IP addresses. IPv6 text representation is very different from IPv4. The address form can be written three ways (preferred, compressed, and mixed) and it offers three different types of addresses (unicast, anycast, and multicast). With the growth of the Internet and its possible extension to additional devices, such as TVs, toasters, and coffee makers, all IPv4 solutions proposed for scaling the Internet address space will only delay the inevitable. There are just not enough IPv4 addresses. The IETF has produced a comprehensive set of specifications to define what is commonly known as the next-generation IP protocol ( IPng or IPv6 ).
OSI Model
Open System Interconnection (OSI) reference model has become an International standard and serves as a guide for networking. This model is the best known and most widely used guide to describe networking environments. Vendors design network products based on the specifications of the OSI model. It provides a description of how network hardware and software work together in a layered fashion to make communications possible. It also helps with trouble shooting by providing a frame of reference that describes how components are supposed to function.
TCP/IP Protocols
The Transmission Control Protocol/Internet Protocol (TCP/IP) suite has become the industry-standard method of interconnecting hosts, networks, and the Internet. As such, it is seen as the engine behind the Internet and networks worldwide. The Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite is the engine for the Internet and networks worldwide. Its simplicity and power has led to its becoming the single network protocol of choice in the world today. The TCP/IP protocol suite is so named for two of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP). The main design goal of TCP/IP was to build an interconnection of networks, referred to as an internetwork, or internet, that provided universal communication services over heterogeneous physical networks. The clear benefit of such an internetwork is the enabling of communication between hosts on different networks, perhaps separated by a large geographical area.
TCP/IP
TCP/IP is modelled in layers. This layered representation leads to the term protocol stack, which refers to the stack of layers in the protocol suite. It can be used for positioning (but not for functionally comparing) the TCP/IP protocol suite against others, such as Systems Network Architecture (SNA) and the Open System Interconnection (OSI) model. By dividing the communication software into layers, the protocol stack allows for division of labour, ease of implementation and code testing, and the ability to develop alternative layer implementations.
The 7 layer OSI model has been revised to a 5 layer TCP/IP based Internet Model 1. Application 2. Transport, 3. Internet, 4. Network, and 5. Physical layer.
TYPES of Networks
PAN LAN MAN WAN
31
32
LAN
Local Area Networks are widely used to share resources and exchange information by connecting personal computers and workstations in company office and factories. A single building or campus of few kilometres in size, LAN acts as privately-owned networks. LANs are limited to a single building or group of buildings. By using telephone lines and radio waves, one LAN can be attached to other LANs over any distance. A system of multiple connections of LANs is called a wide-area network (WAN). In today's world, Local Area Networks become fundamental part of communication. LAN applications are used in hospitals, educational facilities businesses, stock exchanges and warehouses.
LAN basics
LAN s can be either wired or wireless. Twisted pair, coax or fiber optic cable can be used in wired LAN s Nodes in a LAN are linked together with a certain topology. These topologies include: Bus Ring Star Branching tree A node is defined to be any device connected to the network. This could be a computer, a printer, a router, etc. A Hub is a networking device that connects multiple segments of the network together A Network Interface Card (NIC) is the circuit board that has the networking logic implemented, and provides a plug for the cable into the computer (unless wireless). In most cases, this is an Ethernet card inserted in a slot of the computer s motherboard The Network Operating System (NOS) is the software (typically part of the operating system kernel) that communicates with the NIC, and enables users to share files and hardware and communicate with other computers. Examples of NOS include: Windows XP, Windows NT, Sun Solaris, Linux, etc..
34
LAN Continue
LAN (Local Area Network)
A collection of nodes within a small area. The nodes are linked in a bus, ring, star, tree, or fully connected topology network configuration. Benefits of LANs:
Sharing of hardware resources. Sharing of software and data. Consolidated wiring/cabling. Simultaneous distribution of information. More efficient person-to-person communication.
Components of LAN
1. Network operating system(NOS) In order for computers to be able to communicate with each other, they must first have the networking software that tells them how to do so. Without the software, the system will function simply as a standalone, unable to utilize any of the resources on the network. Network operating software may by installed by the factory, eliminating the need for you to purchase it, (for example AppleTalk), or you may install it yourself.
Components of LAN
2.
In addition to network operating software, each network device must also have a network interface card. These cards today are also referred to as adapters, as in Ethernet adapter card or Token Ring adapter card. The NIC card amplifies electronic signals which are generally very weak within the computer system itself. The NIC is also responsible for packaging data for transmission, and for controlling access to the network cable. When the data is packaged properly, and the timing is right, the NIC will push the data stream onto the cable. The NIC also provides the physical connection between the computer and the transmission cable (also called media ). This connection is made through the connector port. Examples of transmission media are Ethernet, Token Ring, and FDDI.
Components of LAN
3. Writing Hub
In order to have a network, you must have at least two devices that communicate with each other. In this simple model, it is a computer and a printer. The printer also has an NIC installed (for example, an HP Jet Direct card), which in turn is plugged into a wiring hub. The computer system is also plugged into the hub, which facilitates communication between the two devices. Additional components (such as a server, a few more PCs, and a scanner) may be connected to the hub. With this connection, all network components would have access to all other network components.
Components of LAN
4. Cables or Transmission Media
Cables are one example of transmission media. Media are various physical environments through which transmission signals pass. Common network media include twisted-pair, coaxial cable, fiber-optic cable, and the atmosphere (through which microwave, laser, and infrared transmission occurs). Another term for this is physical media.
*Note that not all wiring hubs support all medium types.
Components of LAN
5. Network Cabling Cable is the actual physical path upon
which an electrical signal travels as it moves from one component to another. Transmission protocols determine how NIC cards take turns transmitting data onto the cable. Remember that we discussed how LAN cables (baseband) carry one signal, while WAN cables (broadband) carry multiple signals. There are three primary cable types: - Twisted-pair (or copper) - Coaxial cable, and - Fiber-Optic cable
Networking Devices
HUB, Switches, Wireless Access Modems etc. Routers, Points,
7-44
Cable Layout
Typical Crossover Cable Wiring: 1-3 White/Orange 2-6 Orange 3-1 White/Green 6-2 Green 4-4 Blue 5-5 White/Blue 7-7 White/Brown 8-8 Brown
7-46
Each cable can send several thousand phone conversations or computer communications.
7-47
Uses of LAN
Effective Customer Service : LAN is very beneficial in
customer service aspect. The customer has not go to a particular terminal in the branch. He can approach to any terminal for multi-purpose.
Communication:
Terminals can do the job of intercom. Message can be transferred across the users sitting in other rooms simultaneously. The high channel speed is another quality of LAN. Most Local Area Networks transfer data at the rate of 1 to 10 million bits per second.
Uses of LAN
Security : It is noted that users have access to other users but
the AN system has in-built security and it is virtually not possible to get hold of files of other users.
Limitations of LAN
The maintenance cost of the complete system is enough high. Proper care is to be taken for maintenance. High quality software has to be used for the system. Until and unless the Server is started, the terminals attached with it will not function. If the system is not used properly, the cunning user may have access to the data of other user.
Network Topologies
The bus network A continuous coaxial cable to which all the devices are attached. All nodes can detect all messages sent along the bus.
Linking nodes:
The ring network Nodes linked together to form a circle. A message sent out from one node is passed along to each node in between until the target node receives the message.
7-51
Network Topologies
The star network Each node is linked to a central node. All messages are routed through the central node, who delivers it to the proper node.
Linking nodes:
Network Topologies
The fully connected network (Total Link Network)
All nodes are connected to all other nodes.
Linking nodes:
Internetworking Connecting together any number of direct-connected networks. The largest: Internet.
7-53
Star Topology
Advantages of Star Topology:
Due to its centralized nature, the topology offers simplicity of operation. It also achieves an isolation of each device in the network. If one node of the network fails, it does not affect the connectivity. Each and every node involves in this topology only the centralized system and one peripheral. Therefore in this topology access protocols are very simple.
Ring Topology
Advantages of Ring Topology
There is a lesser number of connections. Each node is connecting to its neighbour node with short cable. The data being transmitted between two nodes passes through all the intermediate nodes. A central server is not required for the management of this topology.
Bus Topology
Advantages of Bus Topology
It is easy to handle and implement. It is best suited for small networks. The Bus topology has an inherent simplicity. All the data passes through one cable and there is a smooth propagation. An additional node can be connected to the network at any point its length.
WAN
The Wide Area Network technology is a method of creating an intelligent data sharing network of computers, whose complexity and scale is so huge that it may extend over a city, a region, or a country. It may even be an international network. The Internet is the widest WAN constructed yet. It is like the single most and biggest continuously linked hardware network in the world. What kind of infrastructure and technology makes a WAN possible ? It is a combination of an intelligent network architecture, quantized data interchange and a protocol language that regulates the flow of predestined data. The WAN forms and grows like any other network through the integration of small Local Area Networks (LANs) which in turn are clusters of smaller networks. Nowadays, private organizations like big software companies have their own WANs constructed. It makes their internal communication simpler and more secure. Internet service providers provide connectivity and infrastructure to private LANs and integrate them into the Internet. Wide area networks can be constructed in a variety of ways depending on what kind of linking or Internet connection is used. WANs could also be classified on the basis of what kind of Internet protocol or data sharing technique they use.
Types of WAN
Leased
It is the most expensive of all types and also the most secure. It uses a point to point connection from the WAN hub to the specific LAN point. This option is used by most big software corporations as not only does it offer superior security features but also higher data transfer rate. It uses the PPP(Point to point protocol), the HNAS, the HDLC or SDLC protocol. They are all specialized protocol mechanisms designed for security and errorfree operation.
Line:
Cell Relay: This is quite similar in structure to packet switching type but
divides data into equally sized packets or cells. It is supposed to be very efficient for synchronous voice and video transmission and gives amazing clarity. It uses the ATM (Asynchronous Transfer mode) protocol.
Types of WAN
Packet Switching: They use dynamic circuit paths with single point to
multiple point linking. The data is sliced into variable sized packets irrespective of its type. Varying types of data use the same media link and therefore there is congestion and queuing delays in delivery. It uses the X.25 Frame relay protocol which is one of the first protocols ever developed.
Wireless WAN: WAN technology has also taken the step to the next level of
network integration which is based on the mobile phone platform. It provides Internet connectivity through the wireless telecommunication mode and is called Wireless Wide Area Network (WWAN). It is a part of the Third Generation (3G) Mobile technologies that are being offered. It takes advantage of the advances in mobile technology and the development of mobile infrastructure to deliver high quality and high speed Internet Access.
B A
C D
All other connected network interfaces on my local network see the frame go across the wire
Because they each know the protocol they will be able to tell one packet from another Only the node with the same MAC address as the destination will accept the frame Other network interfaces will ignore the frame, because it is not addressed to them
If our frames collide both of our frames become garbage! (corrupt) the packet is no longer the same as what was originally sent The payload can be corrupted (that s bad). The header could be corrupted such that we can t deliver the message any more! Fortunately, network interface cards can detect collisions on the wire so the receiver will know to disregard the packet. Unfortunately, collisions slow down our network by causing time on the wire to be wasted.
Modes of Transmission
Simplex transmission
allows data to travel only in a single, pre specified direction. An example from everyday life is doorbell the signal can go only from the button to the chime. Two other examples are television and radio broadcasting. The simplex standard is relatively uncommon for most types of computer-based telecommunications applications; even devices that are designed primarily to receive information, such as printers must be able to communicate acknowledgement signals back to the sender devices. In Half Duplex transmission messages can move in either direction , but only one way at a time. The press to talk radio phones used in police cars employ the half-duplex standard; only one person can talk at a time. Often the line between a desktop workstation and a remote CPU conforms to the half duplex patterns as well. If another computer is transmitting to a workstation, the operator cannot send new messages until the other computer finishes its message to acknowledge an interruption. In this mode data can be transmitted in both directions. Transmission works like traffic on a busy two way street the flow moves in two directions at the same time. Full-duplexing is ideal for hardware units that need to pass large amounts of data between each other as in mainframe-to-mainframe communications.
Full duplex:
MODEM
Modem is actually an odd acronym for ModulatorDemodulator. A modem takes a digital signal from a computer and converts to an analog signal so that it can be transferred through a phone line. This conversion is necessary because modems make use of regular phone lines which are analog. A modem modulates outgoing digital signals from a computer or other digital device to analog signals for a conventional copper twisted pair telephone line and demodulates the incoming analog signal and converts it to a digital signal for the digital device.
MODEM
Modem is an electronic device that converts a computer s digital signals into specific frequencies to travel over telephone or cable television lines. At the destination, the receiving modem demodulates the frequencies back into digital data. Computers use modems to communicate with one another over a network. The modem has significantly evolved since the 1970s when the 300 baud modem was used for connecting computers to bulletin board systems (BBSs). With this type of modem each bit, represented digitally by a 1 or 0, was transmitted as a specific tone. The receiving modem responded with its own dedicated frequencies so that the modems could talk at the same time . The technical term for this type of modem is asynchronous.
MODEM
The designation asymmetric simply means that the modem is faster at downloading (getting data), than uploading (sending data). The ADSL modem has significant, immediate advantages over the dial-up modem. Though it uses a standard telephone line like a dial-up modem, it does not tie up the line, making it possible to use the telephone while cruising the Internet. ADSL service is an always on connection, unlike a dial-up modem that cannot be left connected indefinitely. Finally, the ADSL modem is far faster than a dial-up modem. The ADSL modem can accommodate a telephone conversation because of available bandwidth on the dedicated copper wire, which runs from households and businesses to the telephone company (Telco). Another type of modem uses cable TV wiring rather than the phone line to provide Internet connectivity. A cable modem requires service from a cable TV provider for Internet connectivity. The cable modem works on the same principle as the DSL modem, in that digital data is transferred across wires using frequencies that are translated back into digital data. Frequencies used for data traffic do not interfere with existing TV traffic.
MODEM
A less common modem is a satellite modem, or satmodem. The satellite modem converts digital data into radio waves to communicate with a satellite dish.