SlideShare a Scribd company logo
NETWORK
DEVICES
NETWORK CONNECTING DEVICES
 NIC
 Hub
 Switch
 Repeaters
 Multiplexer
 MODEM
 Router
 Bridges
 Gateways
 Firewall
NIC (NETWORK INTERFACE CARD)
NIC (NETWORK INTERFACE CARD)
• The NIC used to connect the computer to external network.
• It would normally have the PCI connector (Edge connector) to
connect to one of the PC expansion slots .
• An RJ-45 connector to connect to external Ethernet .
• Almost all the NICs have LED indicators showing the network
connectivity.
• NIC are also called Network Adapters and connecting them in a
network their installation and configuration is very important.
For proper installation of NIC, one needs to pass through three
phases:
• Setting
• Configuration
• Interfacing
INSTALLATION OF NIC
 Setting: Before connecting NIC it needs settings of
particular parameters like IRQ, I/O Address. IRQ is
basically interrupt request lines that carry a signal from
a device to processor each device in PC must have
unique IRQ number.
 Configuration of NIC: It involves both hardware and
software configuration. Configuring these hardware and
software configurations the next point comes is
interfacing.
 Interfacing: Once the setting of parameters and
configuring of card is done, it is ready for interfacing
After proper connection you need to install a standard
driver for it.
HUB
Hubs are used to connect two or more computers. However we can
connect it without hub but for connecting more than 2 devices we
need hub to allow proper data communication within a network
HUB ARCHITECTURE
A hub looks like a box with ports for LAN nodes to plug in. So most
important part of hub is ports used for connecting network nodes
HUB
• Hub is a network connecting device used to connect multiple
nodes of a network through a single device.
• A hub connects all the nodes of network using Twisted pair
cables.
• In hub signals received by one port are transmitted to all other
ports, and vice versa.
• All the nodes connected through hub can listen each other.
• The advantage of using hub is low cost and easy integration.
• The disadvantage is reduce bandwidth and data security.
The reduction in bandwidth comes because all workstations are in
same collision domain. If 2 or more workstations try to transmit
data at same time can result in collision. As a result available
bandwidth of Ethernet network is reduced.
TYPES OF HUB
 Passive Hubs: Passive hubs are ones which does not provide any
additional feature except for working just as an interface between the
topology. These types of hubs do not help in rectifying/enhancing the
signals. It simply receives signals on input port and broadcasts it on output
ports.
 Active Hubs: These type of hubs takes participation in data
communication within a LAN network. It comes with various features, such
as receiving the signal and storing it for sometime before forwarding it,
helps transmitting data according to priority highest priority data the lower
one. It also rectify/enhance signal before forwarding.
 Intelligent Hubs: These add some more features than active hubs. It
provide all features of passive and active hub. It also provides features,
which helps in managing the network resources effectively and efficiently. It
helps in improving performance of a network. It helps in finding out where
the problem persists. It determines the exact cause of fault. They can
device that which packet goes in which output line. It helps in controlling
and minimizing the data traffic.
SWITCH
A switch is network device that connects devices on a computer
network by using packet switching to receive, and forward data to the
destination device. It is similar to Hub but better than it. A switch can
join multiple computers within one LAN, and a hub just connects
multiple Ethernet devices together as a single segment.
A switch on other hand, does not distribute signals without verifying
whether it really needs to propagate to given port or not. It verify on
base of its internal configuration settings. We can say that a Switch is
a Hub with some intelligence.
BRIDGE
A bridge is a type of computer network device that provides
interconnection with other networks that use the same
protocol. Bridge devices work at the data link layer of the Open System
Interconnect (OSI) model, connecting two different networks together and
providing communication between them.
BRIDGE
• A bridge functions very similar to a switch. It segments a given
network according to the requirements.
• Segmentation using bridge enables keeping unnecessary traffic
from entering different segments of network.
Bridge performs three basic functions:
• Examining and learning the address of the nodes.
• Frame filtering, reformatting and forwarding.
• Routing the frames.
Bridge are of two types:
1. Transparent Bridge
2. Source Routing Bridge
REPEATERS
Repeater is a simple hardware device that moves all data packets from
one LAN segment to another. During movement it regenerates, and
amplifies the electrical signals. A repeater takes incoming signals and
repeats it at a higher power so that network speed can be recovered. At
same time it makes signal noise free too.
ROUTER
• A router is a device that forwards data packets along networks. It
connects multiple networks and uses routing to forward packets.
• A router is connected to at least two networks, commonly two LANs
or WANs or a LAN and its ISP's network.
• A router is a intelligent connecting device that can send packets to
the correct LAN segment to deliver it to its destination.
• A router finds best route for delivery while data is transmitted
GATEWAYS
• A device which is used to bridge different network architectures is known
as “gateway”.
• It can handle messages, addresses and protocol for delivery of a packet to
its destination between two networks.
• Gateways are usually slower than the Bridges and Routers.
• The gateways are used to connect two networks that do not communicate
with the same network protocol.
• Gateways translate these protocols between both networks.
MODEM
• Modem stands for Modulator and Demodulator .
• A modem is used to send digital data over phone line.
• The sending modem modulates the data into analog signal compatible
to phone line.
• The receiving modem demodulates the signal back into digital data.
• Wireless modems convert digital data into wave signals.
1. Internal and External Modems: Internal modems are in form
of circuit boards, fitted in expansion slots of motherboard.
External modems are enclosed in separate cases and not inside
system units. It is connected to computer and telephone line by
means of two separate cables.
2. Intelligent and Standard Modems: The standard modems
accept instructions entered from keyboard of a microcomputer
and respond to commands and transmits information
simultaneously. It is done with help of microprocessor chips.
3. Wireless and Short-Haul Modems: Short-Haul modems
transfer data by means of cables. Since they don’t need external
power source, they are also called modem eliminators. The
wireless modems don’t require any kind of cable to transmit the
data signals. It transmit data signals through air.
TYPES OF MODEM
MULTIPLEXER
• In electronics, a multiplexer (or mux) is a device that selects between
several analog or digital input signals and forwards it to a single output line.
• A multiplexer is a device that merges several lower speed transmission
channels into one high speed channel at one end of the link.
• Reverse of multiplexing is called demultiplexing
• Multiplexing is done at sender send and demultiplexing is done at receiver
end
FIREWALL TECHNOLOGY
Firewall is a system designed to prevent unauthorized access to or
from the private network.
• A firewall is a network security system that monitors and controls
incoming and outgoing network traffic based on predetermined
security rules.
• A firewall typically establishes a barrier between a trusted internal
network and untrusted external network, such as the Internet.
• Firewalls can be implemented on both hardware and software.
• Firewalls are commonly used to prevent unauthorized users from
accessing private networks connected to internet.
• All message entering and leaving through intranet pass through
the firewall.
• Firewall examines each message and blocks those that do not
meet the specified security criteria.
FIREWALL
FIREWALL TECHNIQUES
 Packet Filters: Looks at each packet entering or leaving the
network and accepts and rejects on user defined rules.
 Application gateway: Applies security mechanisms to
specific applications, such as FTP and Telnet servers.
 Circuit level gateway: Applies security mechanisms when a
TCP or UDP connection is established. Once connection is
made, packets can flow between the hosts without further
checking.
 Proxy server: Intercepts all messages entering and leaving
the network. The proxy server effectively hides the true
network addresses.
FIREWALL TYPES
 Host Based Firewalls: Host based firewalls are popularly known as
personal firewalls are devices or programs intended to protect a single
computer. The personal firewalls are generally software based.
E.g. Norton Personal Firewalls and Internet Connection Firewall
 Network Based Firewalls: It normally protects entire network of
computer behind firewall.
a) Software based firewalls: A firewall that runs on generic OS such
as Windows and Linux is known as software firewall.
b) Hardware based firewalls: Firewalls that run in proprietary
hardware and software environment are known as hardware based
firewalls.
 Enterprise Firewalls: Enterprise firewalls are designed for large
geographically distributed networks. They are capable of handling
1000s of users, have faster throughput, and have advanced features.
It have ability to manage multiple firewalls centrally.
FIREWALL
 ADVANTAGES OF HARDWARE FIREWALLS:
• Faster speed
• More security
 DISADVANTAGES OF HARDWARE FIREWALLS:
• More costly than software firewalls
• Difficult to install
 ADVANTAGES OF SOFTWARE FIREWALLS:
• Cheaper
• Ideal for personal use or home use
• Easy to configure
 DISADVANTAGES OF HARDWARE FIREWALLS:
• Takes up system resources
• Difficult to remove or un-install
Network devices

More Related Content

What's hot

Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
Shafaan Khaliq Bhatti
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
rishi ram khanal
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
rahul kapoliya
 
Network devices
Network devicesNetwork devices
Network devices
Tapan Khilar
 
Network hardware
Network hardwareNetwork hardware
Network hardware
snoonan
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
Manish8976
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone NetworkHaither Mithath
 
Wireless Network
Wireless NetworkWireless Network
Wireless Network
dfg1990
 
Ring topology ppt
Ring topology pptRing topology ppt
Ring topology ppt
Ananthkumar6965
 
Networking
NetworkingNetworking
Networking
Palash Sachan
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
vasanthimuniasamy
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
Online
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
sourabh4u07
 
Computer networking
Computer networkingComputer networking
Computer networking
Bayarmaa GBayarmaa
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
Vignesh kumar
 

What's hot (20)

Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Network devices
Network devicesNetwork devices
Network devices
 
Network hardware
Network hardwareNetwork hardware
Network hardware
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone Network
 
Wireless Network
Wireless NetworkWireless Network
Wireless Network
 
Ring topology ppt
Ring topology pptRing topology ppt
Ring topology ppt
 
Networking
NetworkingNetworking
Networking
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
 

Similar to Network devices

networking.ppt
networking.pptnetworking.ppt
networking.ppt
suchita74
 
Network Devices
Network  DevicesNetwork  Devices
Network Devices
Kirti Verma
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
Rahul P
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
Raveena kumari
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
Archana Dwivedi
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
Archana Dwivedi
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdf
SanjanaSingh158
 
Network devices.pptx
Network devices.pptxNetwork devices.pptx
Network devices.pptx
AslamCh3
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
SankalpThaware
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
SibenConor
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
prajapatidev644
 
Lan network
Lan networkLan network
Lan network
claudiaviguri
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
Chandrakant Divate
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)howare
 
Computer networks
Computer networksComputer networks
Computer networks
Nilesh Thadani
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
Md Irfan Ansari
 
Vision
VisionVision
Vision
Gaurav Rai
 

Similar to Network devices (20)

networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Network Devices
Network  DevicesNetwork  Devices
Network Devices
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 
Networking
NetworkingNetworking
Networking
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdf
 
Network devices.pptx
Network devices.pptxNetwork devices.pptx
Network devices.pptx
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Lan network
Lan networkLan network
Lan network
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
 
05-Networks-Devices.pdf
05-Networks-Devices.pdf05-Networks-Devices.pdf
05-Networks-Devices.pdf
 
Vision
VisionVision
Vision
 

Recently uploaded

Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 

Recently uploaded (20)

Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 

Network devices

  • 2. NETWORK CONNECTING DEVICES  NIC  Hub  Switch  Repeaters  Multiplexer  MODEM  Router  Bridges  Gateways  Firewall
  • 4. NIC (NETWORK INTERFACE CARD) • The NIC used to connect the computer to external network. • It would normally have the PCI connector (Edge connector) to connect to one of the PC expansion slots . • An RJ-45 connector to connect to external Ethernet . • Almost all the NICs have LED indicators showing the network connectivity. • NIC are also called Network Adapters and connecting them in a network their installation and configuration is very important. For proper installation of NIC, one needs to pass through three phases: • Setting • Configuration • Interfacing
  • 5. INSTALLATION OF NIC  Setting: Before connecting NIC it needs settings of particular parameters like IRQ, I/O Address. IRQ is basically interrupt request lines that carry a signal from a device to processor each device in PC must have unique IRQ number.  Configuration of NIC: It involves both hardware and software configuration. Configuring these hardware and software configurations the next point comes is interfacing.  Interfacing: Once the setting of parameters and configuring of card is done, it is ready for interfacing After proper connection you need to install a standard driver for it.
  • 6. HUB Hubs are used to connect two or more computers. However we can connect it without hub but for connecting more than 2 devices we need hub to allow proper data communication within a network HUB ARCHITECTURE A hub looks like a box with ports for LAN nodes to plug in. So most important part of hub is ports used for connecting network nodes
  • 7. HUB • Hub is a network connecting device used to connect multiple nodes of a network through a single device. • A hub connects all the nodes of network using Twisted pair cables. • In hub signals received by one port are transmitted to all other ports, and vice versa. • All the nodes connected through hub can listen each other. • The advantage of using hub is low cost and easy integration. • The disadvantage is reduce bandwidth and data security. The reduction in bandwidth comes because all workstations are in same collision domain. If 2 or more workstations try to transmit data at same time can result in collision. As a result available bandwidth of Ethernet network is reduced.
  • 8. TYPES OF HUB  Passive Hubs: Passive hubs are ones which does not provide any additional feature except for working just as an interface between the topology. These types of hubs do not help in rectifying/enhancing the signals. It simply receives signals on input port and broadcasts it on output ports.  Active Hubs: These type of hubs takes participation in data communication within a LAN network. It comes with various features, such as receiving the signal and storing it for sometime before forwarding it, helps transmitting data according to priority highest priority data the lower one. It also rectify/enhance signal before forwarding.  Intelligent Hubs: These add some more features than active hubs. It provide all features of passive and active hub. It also provides features, which helps in managing the network resources effectively and efficiently. It helps in improving performance of a network. It helps in finding out where the problem persists. It determines the exact cause of fault. They can device that which packet goes in which output line. It helps in controlling and minimizing the data traffic.
  • 9. SWITCH A switch is network device that connects devices on a computer network by using packet switching to receive, and forward data to the destination device. It is similar to Hub but better than it. A switch can join multiple computers within one LAN, and a hub just connects multiple Ethernet devices together as a single segment. A switch on other hand, does not distribute signals without verifying whether it really needs to propagate to given port or not. It verify on base of its internal configuration settings. We can say that a Switch is a Hub with some intelligence.
  • 10. BRIDGE A bridge is a type of computer network device that provides interconnection with other networks that use the same protocol. Bridge devices work at the data link layer of the Open System Interconnect (OSI) model, connecting two different networks together and providing communication between them.
  • 11. BRIDGE • A bridge functions very similar to a switch. It segments a given network according to the requirements. • Segmentation using bridge enables keeping unnecessary traffic from entering different segments of network. Bridge performs three basic functions: • Examining and learning the address of the nodes. • Frame filtering, reformatting and forwarding. • Routing the frames. Bridge are of two types: 1. Transparent Bridge 2. Source Routing Bridge
  • 12. REPEATERS Repeater is a simple hardware device that moves all data packets from one LAN segment to another. During movement it regenerates, and amplifies the electrical signals. A repeater takes incoming signals and repeats it at a higher power so that network speed can be recovered. At same time it makes signal noise free too.
  • 13. ROUTER • A router is a device that forwards data packets along networks. It connects multiple networks and uses routing to forward packets. • A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. • A router is a intelligent connecting device that can send packets to the correct LAN segment to deliver it to its destination. • A router finds best route for delivery while data is transmitted
  • 14. GATEWAYS • A device which is used to bridge different network architectures is known as “gateway”. • It can handle messages, addresses and protocol for delivery of a packet to its destination between two networks. • Gateways are usually slower than the Bridges and Routers. • The gateways are used to connect two networks that do not communicate with the same network protocol. • Gateways translate these protocols between both networks.
  • 15. MODEM • Modem stands for Modulator and Demodulator . • A modem is used to send digital data over phone line. • The sending modem modulates the data into analog signal compatible to phone line. • The receiving modem demodulates the signal back into digital data. • Wireless modems convert digital data into wave signals.
  • 16. 1. Internal and External Modems: Internal modems are in form of circuit boards, fitted in expansion slots of motherboard. External modems are enclosed in separate cases and not inside system units. It is connected to computer and telephone line by means of two separate cables. 2. Intelligent and Standard Modems: The standard modems accept instructions entered from keyboard of a microcomputer and respond to commands and transmits information simultaneously. It is done with help of microprocessor chips. 3. Wireless and Short-Haul Modems: Short-Haul modems transfer data by means of cables. Since they don’t need external power source, they are also called modem eliminators. The wireless modems don’t require any kind of cable to transmit the data signals. It transmit data signals through air. TYPES OF MODEM
  • 17. MULTIPLEXER • In electronics, a multiplexer (or mux) is a device that selects between several analog or digital input signals and forwards it to a single output line. • A multiplexer is a device that merges several lower speed transmission channels into one high speed channel at one end of the link. • Reverse of multiplexing is called demultiplexing • Multiplexing is done at sender send and demultiplexing is done at receiver end
  • 18. FIREWALL TECHNOLOGY Firewall is a system designed to prevent unauthorized access to or from the private network.
  • 19. • A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. • A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet. • Firewalls can be implemented on both hardware and software. • Firewalls are commonly used to prevent unauthorized users from accessing private networks connected to internet. • All message entering and leaving through intranet pass through the firewall. • Firewall examines each message and blocks those that do not meet the specified security criteria. FIREWALL
  • 20. FIREWALL TECHNIQUES  Packet Filters: Looks at each packet entering or leaving the network and accepts and rejects on user defined rules.  Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers.  Circuit level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once connection is made, packets can flow between the hosts without further checking.  Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
  • 21. FIREWALL TYPES  Host Based Firewalls: Host based firewalls are popularly known as personal firewalls are devices or programs intended to protect a single computer. The personal firewalls are generally software based. E.g. Norton Personal Firewalls and Internet Connection Firewall  Network Based Firewalls: It normally protects entire network of computer behind firewall. a) Software based firewalls: A firewall that runs on generic OS such as Windows and Linux is known as software firewall. b) Hardware based firewalls: Firewalls that run in proprietary hardware and software environment are known as hardware based firewalls.  Enterprise Firewalls: Enterprise firewalls are designed for large geographically distributed networks. They are capable of handling 1000s of users, have faster throughput, and have advanced features. It have ability to manage multiple firewalls centrally.
  • 22. FIREWALL  ADVANTAGES OF HARDWARE FIREWALLS: • Faster speed • More security  DISADVANTAGES OF HARDWARE FIREWALLS: • More costly than software firewalls • Difficult to install  ADVANTAGES OF SOFTWARE FIREWALLS: • Cheaper • Ideal for personal use or home use • Easy to configure  DISADVANTAGES OF HARDWARE FIREWALLS: • Takes up system resources • Difficult to remove or un-install