• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Communication » What is NICs (Network Adapter)
Next →
← Prev

What is NICs (Network Adapter)

By Dinesh Thakur

A high-speed network interface card (NIC) for communication networks is used.A network interface controller (also known as a network interface card, network adapter, LAN adapter) is a computer hardware component that connects a computer to a computer network.Network interface cards, commonly referred to as NICs are used to connect a PC to a computer network.

The NIC provides a physical connection between the computer networking medium and the computers’ internal bus, and is responsible for facilitating an “access method” to the networks.

Most NICs are designed for a particular type of network, protocol and media, although some can serve multiple networks.

Whereas network interface controllers were commonly implemented on expansion cards that plug into a computer bus, the low cost and ubiquity of the Ethernet standard means that most newer computers have a network interface built into the motherboard.

It allows users to connect to each other either by using cables or wirelessly if the NIC is a wireless NIC (WiFi/WNIC).  Every entity on a network, a PC, printer, router, etc., that needs to communicate with other devices must have a NIC if it is to communicate over the network.  On older computers, the NIC is probably an expansion card, usually PCI or PCI express. 

High performance cards can cost less that $30.  NIC functionality is now often integrated into the motherboard chip-set or implemented with a dedicated Ethernet chip on the motherboard. 

A similar situation is true for laptop computers.  At one time, a PCMCIA network card would be used in a laptop computer for the NIC just as the PCI card was used in desktop computer, but now, NIC functionality is often integrated with the motherboard.

Ethernet is the dominant standard for cable connections for wired computer networks. An Ethernet connector looks similar to a telephone connector, only larger.  This connector is called “RJ45”.  Ethernet cables are either a shielded or un-shielded cable of four twisted pairs of 24 AWG connectors, specified at 100 ohm impedance.  Maximum cable length for CATX cables is 100 meters.

Early versions of Ethernet cables were CAT3 or CAT4 (CAT being short for category).  These versions were not long lived.  CAT5 and CAT5e are currently the most commonly used cables (bandwidth of 100 MHz, 100 Mbps), with CAT6 (bandwidth of 250 MHz, 1 Gbps) available and the configuration of the near-future.  A CAT7 cable (bandwidth of 600 MHz) specification is in development, and should be available in a few years.

Each Ethernet NIC has a unique serial number called a “media access code” (MAC address) that is used to identify the NIC and associated computer on the network.  No two NIC will have the same address, because the NIC manufacturers must purchase blocks of addresses from the Institute of Electrical and Electronics Engineers (IEEE).

NIC cards are capable of different speeds.  Speeds of up to one gigabit per second (Gbps) are now available. Two NIC can communicate if they differ in speed ratings, but they will communicate at the rate of the slower NIC.

On a very simple network, NIC can be used to link personal computers (PC).  If the computers are connected directly to one another, the network is a “peer-to-peer” (P2P, also called an “ad hoc”) network.  If computers are connected directly to one another, a “cross-over” Ethernet cable is needed (also called a “Null-Modem cable”).  This cable is not “straight-through” like standard Ethernet, but crosses the send and receive connectors, so that send line from computer A connects to the receive line of computer B.

For networks of a few computers, a “hub” can be used, with all of the computers connected to the hub.  Any message sent from any PC will be seen by all of the computers, but only the computer with the correct MAC address will receive the message.  P2P networks are useful for many purposes. File and printer sharing are the most common applications.

Networks with more than four active computers at a time will benefit from using a “network switch” instead of a hub.  A network switch will direct the message to the appropriate destination, instead of each message packet being broadcast across the network.  Computer A can send a message to computer B, while simultaneously, computer C sends a message to computer D. 

This increases the efficiency of the network.  This is a simple form of a server network.  An example of a client-server design is a computer server where the clients initiate a download or upload of files and the server reacts.  The server would also often be responsible for interacting with printers and other servers on other networks, including satellite networks (SATCOM) or the Internet.

“Latency” is the delay caused by a network to communicate data.  Latency causes not only slow service, but can result in data loss as well. Latency is usually tested by sending a message packet that is immediately returned to the sending computer.  The round-trip time is defined as the latency.

Networking performance can be optimized for either latency or throughput. Networks can use a technique known as “interrupt moderation” to increase throughput and lower CPU utilization by queuing message packets and issuing fewer interrupts to the CPU. A network optimized this way would favor large transfers, reducing transfer overhead. 

CPU and network throughput benefit, but network latency would increase.  The alternative is to fragment each message and pipeline the fragments through the network.  Multiple paths from source to destination can allow overlapping.  Latency can also be addressed with techniques such as prefetching (anticipating the need for data requests) and/or using multiple execution threads (multi-threading).

There are two indicator LEDs on a typical NIC.  A single lit green LED indicates the computer is connected to the network. This is called the “link” light.  The second LED is amber in color.  A flashing amber LED indicates message packet collisions are occurring.  Occasional collisions are normal on a busy network, but a frequently lit amber LED is an indication of problems. 

A quickly flashing link LED (green) is a network activity indicator, meaning that communication is occurring.  If the green link light is off, and the amber LED is blinking, then the NIC is in “power save” mode.

A wireless network interface controller (WNIC) is a NIC for connecting to a wireless network (WiFi).  The standard for WiFi is IEEE 802.11.  A WNIC uses an antenna to communicate with an Rf signal, most often at 2.4 GHz.  Wireless connectivity development in recent years has closely paralleled wired connectivity.  Like its wired cousin, a wireless card was once integrated with a PCI or PCMCIA add-on card.  Now, integrated WNIC’s are becoming common, especially for laptop computers.

You’ll also like:

  1. What is Graphics Adapter?
  2. Java Adapter Classes with Example
  3. What is CGA (Color Graphics Adapter)?
  4. What is EGA (enhanced graphics adapter)?
  5. What is a Communication Network? Network Effectiveness Criteria
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Networking

Networking Tutorials

  • Network - Home
  • Network - Uses
  • Network - Advantages
  • Network - Classification
  • Network - Architecture Type
  • Nework - Networks Vs Comms

Networking Devices

  • Network - Modem
  • Network - Routers Types
  • Network - Bluetooth
  • Network - RS-232C
  • Network - Hub
  • Network - Devices
  • Network - Bridges
  • Network - Repeaters
  • Network - Routers
  • Network - Switching Hubs
  • Network - Transceiver
  • Network - Multiplexer
  • Network - Gateway
  • Network - BNC Connector
  • Network - Optical Connectors
  • Network - NICs
  • Networking Protocol

  • Protocol - Definition
  • Protocol - IP
  • Protocol - Aloha
  • Protocol - MAC Layer
  • Protocol - Sliding Window
  • Protocol - Stop & Wait
  • Protocol - Network Protocols
  • Protocol - Token Passing
  • Protocol - SIP
  • Protocol - Ad-Hoc Networks Routing
  • Protocol - Lap-f
  • Protocol - Point-to-Point
  • Protocol - PPP
  • Protocol - PPP Phases
  • Protocol - LDP
  • Protocol - MPLS
  • Protocol - MPOA
  • Protocol - HDLC
  • Protocol - Distance Vector routing
  • Protocol - IGMP
  • Protocol - ICMP
  • Protocol - SLIP
  • Protocol - DVMRP
  • Protocol - SDLC
  • Protocol - Routing
  • Protocol - UDP
  • Protocol - ARP and RARP
  • Protocol - Link-State
  • Protocol - ARP Table
  • Protocol - RTP
  • Protocol - NHRP
  • Network Addressing

  • Addressing - Home
  • Addressing - SubNetting
  • Addressing - Classless
  • Addressing - Classes or Classful
  • Addressing - IPV4 vs IPV6
  • Addressing - IPv6
  • Addressing - Subnet Mask
  • Addressing - MAC Address
  • Addressing - Supernetting
  • Addressing - Private IP
  • Addressing - IPv4
  • Addressing - Public IP
  • Addressing - Multihomed
  • Addressing - Indirect Addressing
  • Addressing - ASP
  • Addressing - VLSM
  • Addressing - Routing Algorithms
  • Addressing - Hierarchical Routing
  • Addressing - Routing
  • Addressing - Distributed Routing
  • Addressing - Data Routing
  • Addressing - Services
  • Addressing - IP forwarding
  • Addressing - Aging
  • Addressing - Algorithm CR
  • Networking Media

  • Transmission - Home
  • Transmission - Modes
  • Transmission - Media
  • Transmission - System
  • Transmission - Bound
  • Transmission - Unbound
  • Transmission - Baseband
  • Transmission - Wired
  • Transmission - Fiber Benfits
  • Transmission - Infrared
  • Transmission - UnGuided
  • Transmission - Microwave
  • Transmission - Infrared
  • Transmission - Radio Wave
  • Transmission - Network
  • Transmission - Digital Signal
  • Transmission - Data
  • Transmission - Asynchronous
  • Transmission - Sync Vs Async
  • Cable - Twisted-Pair
  • Cable - Coaxial
  • Cable - UTP and STP
  • Cable - Fiber Optics
  • Cable - Gigabit Ethernet
  • Cable - Fast Ethernet
  • Cable - Ethernet Cable
  • Cable - Fiber-Optic Using
  • Cable - CATV
  • Cable - 100Base T
  • Cable - 10BASE T
  • Cable - 10 Base 2
  • Cable - 10 Base 5
  • Networking Types

  • IEEE - 802.11
  • IEEE - 802.5
  • IEEE - 802.15
  • IEEE - 802.11e
  • IEEE - 802.11n
  • Network - Ethernet
  • Network - Arpanet
  • Network - Frame Relay
  • Network - X.25
  • Network - Telephone
  • Network - WSN
  • Network - Metro Ethernet
  • Network - WAN Ethernet
  • Network - Wireless Mesh
  • Network - SAN
  • Network - SNA
  • Network - Cisco Architecture
  • Network - Vlan
  • Network - FDDI
  • Network - 100VG-Any
  • Network - EPON
  • Network - ISDN
  • Network - ARCNet
  • Network - Passive Optical
  • Networking Reference Models

  • Models - TCP/IP
  • Models - OSI
  • Models - MAC Layer
  • Models - Network Layer
  • Models - MAC Layer Functions
  • Models - TCP/IP Vs OSI
  • Models - CSMA
  • Models - CSMA/CD
  • Models - CSMA/CA
  • Models - CDMA
  • Models - STDM
  • Models - FDMA
  • Models - TDMA
  • Models - SDH
  • Models - CDM
  • Models - Multiplexing
  • Models - Reference
  • Models - Random Access Methods
  • Models - TCP/IP Architecture
  • Models - FDM
  • Models - IP Header
  • Models - OTN
  • Models - Amplitude Levels
  • Models - MIMO
  • Models - Plesiochronous Media
  • Models - Half Duplex
  • Models - ISO Architecture
  • Models - Data-Link Layer
  • Models - WDM
  • Models - Duplex
  • Models - Ethernet FDSE
  • Networking Switching Techniques

  • Switching - Home
  • Switching - Techniques
  • Switching - Packet
  • Switching - Circuit
  • Switching - Message
  • Switching - Packet Vs virtual Circuit
  • Switching - Cell
  • Switching - ATM Cell Structure
  • Switching - Virtual Circuit Vs Datagram
  • Switching - Time Space
  • Switching - Modulation
  • Switching - Cell Relay
  • Switching - ATM Structure
  • Switching - VC Vs PVC
  • Switching - Packet and Circuit
  • Switching - VPC
  • Switching - IP
  • Switching - Logical Channels
  • Switching - TDM
  • Switching - FDM
  • Network Codes

  • Codes - CRC
  • Codes - Error Correction and Detection
  • Codes - Hamming
  • Codes - Piggybacking
  • Codes - Encoding Techniques
  • Codes - Error Control
  • Codes - Parity Check
  • Codes - Parity bit
  • Codes - Bit Error
  • Codes - CRC
  • Codes - Transmission Errors
  • Codes - Error Detection and Correction
  • Network Communication

  • Communication - Home
  • Communication - Satellite
  • Communication - Wireless
  • Communication - Data Type
  • Communication - Congestion Control
  • Communication - Network
  • Communication - Data
  • Communication - Software
  • Communication - Layering Process
  • Networking Signaling

  • Signal - Analog
  • Signal - Digital
  • Signal - Analog Vs Digital
  • Signal - Digitization
  • Network Security

  • Security - Home
  • Security - Requirements
  • Security - Threats
  • Security - Services

Other Links

  • Networking - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW