SlideShare a Scribd company logo
1 of 4
Download to read offline
IT (9626)
Theory Notes
www.FaisalChughtai.com +92 3008460713 info.sirfaisal@gmail.com
Network Devices
Switch:
A switch, in the context of networking is a high-speed device that receives incoming data packets
and redirects them to their destination on a local area network (LAN). A LAN switch operates at
the data link layer (Layer 2) or the network layer of the OSI Model and, as such it can support all
types of packet protocols.
A switch in an Ethernet-based LAN reads incoming
TCP/IP data packets/frames containing destination
information as they pass into one or more input ports.
The destination information in the packets is used to
determine which output ports will be used to send the
data on to its intended destination.
Switches are similar to hubs, only smarter. A hub simply connects all the nodes on the network --
communication is essentially in a haphazard manner with any device trying to communicate at
any time, resulting in many collisions. A switch, on the other hand, creates an electronic tunnel
between source and destination ports for a split second that no other traffic can enter. This results
in communication without collisions.
Hub:
A hub is a hardware device that relays communication data. A hub sends data packets (frames) to
all devices on a network, regardless of any MAC addresses contained in the data packet. A data
packet arriving at one hub’s port may be copied to other ports allowing all segments of the
network to have access to the data packet.
A switch is different than a hub in that it keeps a record
of all MAC addresses of all connected devices. Thus, it
knows which device or system is connected to which
port. When a data packet is received, the switch
immediately knows which port to send it to.
Active Hub: This is a type of hub that monitors,
amplifies, and regenerates signals. Signals are
strengthened in active hubs.
Passive Hub: Passive hub serves only as a physical
connection point for computer devices, it does not take
an active role in maintaining, processing, or regenerating
signals.
IT (9626)
Theory Notes
www.FaisalChughtai.com +92 3008460713 info.sirfaisal@gmail.com
Wireless Access Point (WAP):
A wireless access point (WAP) is a hardware device or configured node on a local area network
(LAN) that allows wireless capable devices and wired networks to connect through a wireless
standard, including Wi-Fi or Bluetooth. WAPs feature radio transmitters and antennae, which
facilitate connectivity between devices and the Internet or a network. A WAP is also known as a
hotspot.
Wireless access points (WAP) may be used to provide network connectivity in office
environments, allowing employees to work anywhere in the office and remain connected to a
network. In addition, WAPs provide wireless Internet in public places, like coffee shops, airports
and train stations.
Wireless access points are most commonly thought of in the context of the 802 series of wireless
standards, commonly known as Wi-Fi. While there are other wireless standards, the vast majority
of the time the terms Wi-Fi hotspot and WAP are synonymous.
Network Interface Card (NIC):
A Network Interface Card (NIC) is a computer hardware component that allows a computer to
connect to a network. NICs may be used for both wired and wireless connections.
A NIC is also known as a network interface controller (NIC),
network interface controller card, expansion card, computer
circuit board, network card, LAN card, network adapter or
network adapter card (NAC).
Most new computers have either Ethernet capabilities
integrated into the motherboard chipset or use an inexpensive
dedicated Ethernet chip.
Wireless Network Interface Card (WNIC):
A wireless network interface controller (WNIC) is a network interface controller which connects
to a wireless radio-based computer network, rather than a wired network. A WNIC, just like other
NICs, works on the Layer 1 and Layer 2 of the OSI Model. This card uses an antenna to
communicate via microwave radiation.
Router:
A Router is a device that transfers data from one network to another in an intelligent way. It has
the task of forwarding data packets to their destination by the most efficient route.
IT (9626)
Theory Notes
www.FaisalChughtai.com +92 3008460713 info.sirfaisal@gmail.com
In order to do this, the router has a micro computer inside it. This holds a table in memory that
contains a list of all the networks it is connected to, along with the latest information on how busy
each path in the network is, at that moment. This is called the 'routing table'.
When a data packet arrives, the router does the following:-
 Reads the data packet's destination address
 Looks up all the paths it has available to get to that
address
 Checks on how busy each path is at the moment
 Sends the packet along the least congested (fastest)
path
Other tasks the Router can perform:
 Exchange protocol information across networks
 Filter traffic - helps prevent unauthorised intrusion by malware
Routers are also needed to enable a computer to connect to the internet.
Repeater:
A repeater is a network device that retransmits a received signal with more power and to an
extended geographical or topological network boundary than what would be capable with the
original signal.
A repeater is implemented in computer networks to expand the coverage area of the network,
repropagate a weak or broken signal and or service remote nodes. Repeaters amplify the
received/input signal to a higher frequency domain so that it is reusable, scalable and available.
Repeaters were introduced in wired data communication networks due to the limitation of a
signal in propagating over a longer distance and now are a common installation in wireless
networks for expanding cell size.
Repeaters are also known as signal boosters.
Gateway:
A gateway is a data communication device that provides a remote network with connectivity to a
host network.
A gateway device provides communication to a remote network or an autonomous system that
is out of bounds for the host network nodes. Gateways serve as the entry and exit point of a
network; all data routed inward or outward must first pass through and communicate with the
IT (9626)
Theory Notes
www.FaisalChughtai.com +92 3008460713 info.sirfaisal@gmail.com
gateway in order to use routing paths. Generally, a router is configured to work as a gateway
device in computer networks.
Any network has a boundary or a limit, so all communication placed within that network is
conducted using the devices attached to it, including switches and routers. If a network node
wants to communicate with a node/network that resides outsides of that network or autonomous
system, the network will require the services of a gateway, which is familiar with the routing path
of other remote networks.
Bridge:
A bridge is a type of computer network device that provides interconnection with other bridge
networks that use the same protocol.
Bridge devices work at the data link layer of the Open System Interconnect (OSI) model,
connecting two different networks together and providing communication between them.
Bridges are similar to repeaters and hubs in that they broadcast data to every node. However,
bridges maintain the media access control (MAC) address table as soon as they discover new
segments, so subsequent transmissions are sent to only to the desired recipient.
Firewall:
A firewall is designed to help protect a computer network from intruders. It does this by
controlling what data can and cannot pass through it.
Firewalls block unauthorized access to or from private networks and are often employed to
prevent unauthorized Web users or illicit software from gaining access to private networks
connected to the Internet. A firewall may be implemented using hardware, software, or a
combination of both.
A firewall is recognized as the first line of defense in securing sensitive information. For better
safety, the data can be encrypted.
A firewall can either be
 A piece of software e.g. Windows has a built in Firewall, Zone Alarm is a free firewall or you
can purchase commercial software firewalls.
 A piece of hardware. These boxes are much faster than the software version but they are
also much more expensive and tricky to set up.
You would expect home networks to be protected by a software firewall but a large corporation
would have several layers of hardware firewalls protecting their networks as well as intruder
detection software applications looking for odd behaviour on their networks. Basically, the more
valuable or sensitive the information, the higher the level of protection expected.

More Related Content

Similar to Network_Devices.pdf

Computer network note
Computer network noteComputer network note
Computer network noteMdAnikKhan
 
What is computer network? Give details.
What is computer network? Give details.What is computer network? Give details.
What is computer network? Give details.MuhammadTanveer121
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Devices use in computer networking
Devices use in computer networkingDevices use in computer networking
Devices use in computer networkingEzekielHuggins110315
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfSanjanaSingh158
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and ManagementBry Cunal
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1Prosanta Mazumder
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGRozinaMemon1
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 

Similar to Network_Devices.pdf (20)

Lan
LanLan
Lan
 
Computer network note
Computer network noteComputer network note
Computer network note
 
What is computer network? Give details.
What is computer network? Give details.What is computer network? Give details.
What is computer network? Give details.
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Network devices
Network devicesNetwork devices
Network devices
 
Devices use in computer networking
Devices use in computer networkingDevices use in computer networking
Devices use in computer networking
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdf
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Data Communication
Data Communication Data Communication
Data Communication
 
compo 131_banalnal
compo 131_banalnalcompo 131_banalnal
compo 131_banalnal
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1
 
Data communication notes
Data communication notesData communication notes
Data communication notes
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Basics of network
Basics of networkBasics of network
Basics of network
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
 

Recently uploaded

OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 

Recently uploaded (20)

OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 

Network_Devices.pdf

  • 1. IT (9626) Theory Notes www.FaisalChughtai.com +92 3008460713 info.sirfaisal@gmail.com Network Devices Switch: A switch, in the context of networking is a high-speed device that receives incoming data packets and redirects them to their destination on a local area network (LAN). A LAN switch operates at the data link layer (Layer 2) or the network layer of the OSI Model and, as such it can support all types of packet protocols. A switch in an Ethernet-based LAN reads incoming TCP/IP data packets/frames containing destination information as they pass into one or more input ports. The destination information in the packets is used to determine which output ports will be used to send the data on to its intended destination. Switches are similar to hubs, only smarter. A hub simply connects all the nodes on the network -- communication is essentially in a haphazard manner with any device trying to communicate at any time, resulting in many collisions. A switch, on the other hand, creates an electronic tunnel between source and destination ports for a split second that no other traffic can enter. This results in communication without collisions. Hub: A hub is a hardware device that relays communication data. A hub sends data packets (frames) to all devices on a network, regardless of any MAC addresses contained in the data packet. A data packet arriving at one hub’s port may be copied to other ports allowing all segments of the network to have access to the data packet. A switch is different than a hub in that it keeps a record of all MAC addresses of all connected devices. Thus, it knows which device or system is connected to which port. When a data packet is received, the switch immediately knows which port to send it to. Active Hub: This is a type of hub that monitors, amplifies, and regenerates signals. Signals are strengthened in active hubs. Passive Hub: Passive hub serves only as a physical connection point for computer devices, it does not take an active role in maintaining, processing, or regenerating signals.
  • 2. IT (9626) Theory Notes www.FaisalChughtai.com +92 3008460713 info.sirfaisal@gmail.com Wireless Access Point (WAP): A wireless access point (WAP) is a hardware device or configured node on a local area network (LAN) that allows wireless capable devices and wired networks to connect through a wireless standard, including Wi-Fi or Bluetooth. WAPs feature radio transmitters and antennae, which facilitate connectivity between devices and the Internet or a network. A WAP is also known as a hotspot. Wireless access points (WAP) may be used to provide network connectivity in office environments, allowing employees to work anywhere in the office and remain connected to a network. In addition, WAPs provide wireless Internet in public places, like coffee shops, airports and train stations. Wireless access points are most commonly thought of in the context of the 802 series of wireless standards, commonly known as Wi-Fi. While there are other wireless standards, the vast majority of the time the terms Wi-Fi hotspot and WAP are synonymous. Network Interface Card (NIC): A Network Interface Card (NIC) is a computer hardware component that allows a computer to connect to a network. NICs may be used for both wired and wireless connections. A NIC is also known as a network interface controller (NIC), network interface controller card, expansion card, computer circuit board, network card, LAN card, network adapter or network adapter card (NAC). Most new computers have either Ethernet capabilities integrated into the motherboard chipset or use an inexpensive dedicated Ethernet chip. Wireless Network Interface Card (WNIC): A wireless network interface controller (WNIC) is a network interface controller which connects to a wireless radio-based computer network, rather than a wired network. A WNIC, just like other NICs, works on the Layer 1 and Layer 2 of the OSI Model. This card uses an antenna to communicate via microwave radiation. Router: A Router is a device that transfers data from one network to another in an intelligent way. It has the task of forwarding data packets to their destination by the most efficient route.
  • 3. IT (9626) Theory Notes www.FaisalChughtai.com +92 3008460713 info.sirfaisal@gmail.com In order to do this, the router has a micro computer inside it. This holds a table in memory that contains a list of all the networks it is connected to, along with the latest information on how busy each path in the network is, at that moment. This is called the 'routing table'. When a data packet arrives, the router does the following:-  Reads the data packet's destination address  Looks up all the paths it has available to get to that address  Checks on how busy each path is at the moment  Sends the packet along the least congested (fastest) path Other tasks the Router can perform:  Exchange protocol information across networks  Filter traffic - helps prevent unauthorised intrusion by malware Routers are also needed to enable a computer to connect to the internet. Repeater: A repeater is a network device that retransmits a received signal with more power and to an extended geographical or topological network boundary than what would be capable with the original signal. A repeater is implemented in computer networks to expand the coverage area of the network, repropagate a weak or broken signal and or service remote nodes. Repeaters amplify the received/input signal to a higher frequency domain so that it is reusable, scalable and available. Repeaters were introduced in wired data communication networks due to the limitation of a signal in propagating over a longer distance and now are a common installation in wireless networks for expanding cell size. Repeaters are also known as signal boosters. Gateway: A gateway is a data communication device that provides a remote network with connectivity to a host network. A gateway device provides communication to a remote network or an autonomous system that is out of bounds for the host network nodes. Gateways serve as the entry and exit point of a network; all data routed inward or outward must first pass through and communicate with the
  • 4. IT (9626) Theory Notes www.FaisalChughtai.com +92 3008460713 info.sirfaisal@gmail.com gateway in order to use routing paths. Generally, a router is configured to work as a gateway device in computer networks. Any network has a boundary or a limit, so all communication placed within that network is conducted using the devices attached to it, including switches and routers. If a network node wants to communicate with a node/network that resides outsides of that network or autonomous system, the network will require the services of a gateway, which is familiar with the routing path of other remote networks. Bridge: A bridge is a type of computer network device that provides interconnection with other bridge networks that use the same protocol. Bridge devices work at the data link layer of the Open System Interconnect (OSI) model, connecting two different networks together and providing communication between them. Bridges are similar to repeaters and hubs in that they broadcast data to every node. However, bridges maintain the media access control (MAC) address table as soon as they discover new segments, so subsequent transmissions are sent to only to the desired recipient. Firewall: A firewall is designed to help protect a computer network from intruders. It does this by controlling what data can and cannot pass through it. Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized Web users or illicit software from gaining access to private networks connected to the Internet. A firewall may be implemented using hardware, software, or a combination of both. A firewall is recognized as the first line of defense in securing sensitive information. For better safety, the data can be encrypted. A firewall can either be  A piece of software e.g. Windows has a built in Firewall, Zone Alarm is a free firewall or you can purchase commercial software firewalls.  A piece of hardware. These boxes are much faster than the software version but they are also much more expensive and tricky to set up. You would expect home networks to be protected by a software firewall but a large corporation would have several layers of hardware firewalls protecting their networks as well as intruder detection software applications looking for odd behaviour on their networks. Basically, the more valuable or sensitive the information, the higher the level of protection expected.