SlideShare a Scribd company logo
1 of 65
Network DevicesNetwork Devices
ObjectivesObjectives
• Explain the uses, advantages, and
disadvantages of repeaters
• Explain the uses, advantages, and
disadvantages of hubs
• Define network segmentation
• Explain network segmentation using
bridges
RepeatersRepeaters
FireWire Repeater
RepeatersRepeaters
• The number of nodes on a network and the
length of cable used influence the quality of
communication on the network
• Attenuation
– Natural degradation of a transmitted signal over
distance
• Repeaters work against attenuation by repeating
signals that they receive on a network
- Typically cleaning and regenerating the digital
transmission in the process
RepeatersRepeaters
Figure 2-1:
Repeater
RepeatersRepeaters
• Note that on analog networks, devices that boost
the signal are called amplifiers
• These devices do not have the same signal
regeneration capabilities as repeaters because
they must maintain the shape of the received
signal
– Therefore, noise tends to amplified with the signal
RepeatersRepeaters
• Repeaters work in the Physical layer (layer 1)
• On optical networks, signal amplification is
handled by optical repeaters
• Some repeaters can be used to connect two
physically different types of cabling
RepeaterRepeater
RepeatersRepeaters
HubsHubs
Cisco Hub
HubsHubs
• Generic connection device used to tie several
networking cables together to create a link
between different stations on a network
• Hubs that are plugged into electric power are
called active hubs
• A hub that merely connects different cables on a
network and provides no signal regeneration is
called a passive hub and is not a repeater
HubsHubs
• Active hubs
– Amplify or repeat signals that pass through them
• Passive hub
– Merely connects cables on a network and provides
no signal regeneration
HubsHubs
• “Hub” is a generic term applied to many different
network-connection devices
• If a hub in some way segments or subdivides the
traffic on a network, it is an intelligent, or
switching, hub
Hubs
Hubs, are simple devices that interconnect
groups of users.
Hubs forward any data packets they receive over one port
from one workstation—including e-mail, word processing
documents, spreadsheets, graphics, or print requests—to all of
their remaining ports.
All users connected to a single hub sharing
the hub’s bandwidth or data-carrying capacity.
Examples of Cisco hub products:
Cisco Micro Hub series
Cisco FastHub® series
HubsHubs
• Topology
– Usually refers to the physical layout of network
cable and devices
– When all stations are connected to a central hub,
the topology is known as a star because of its
appearance
HubsHubs
Figure 2-2:
Star topology
HubsHubs
Advantages and Disadvantages ofAdvantages and Disadvantages of
Repeaters and HubsRepeaters and Hubs
• Advantages of using repeaters on your
network:
– Repeaters can extend a network’s total distance
– Repeaters do not seriously impact network
performance
– Certain repeaters can connect networks using
different physical media
Advantages and Disadvantages ofAdvantages and Disadvantages of
Repeaters and HubsRepeaters and Hubs
• Disadvantages of using repeaters on your network:
– Repeaters cannot connect different network
architectures, such as Token Ring and Ethernet
– Repeaters do not reduce network traffic
* They repeat everything they received
– Repeaters do not segment the network
– Do not reformat data structures
• Cannot connect networks that require different
types of frames
Advantages and Disadvantages ofAdvantages and Disadvantages of
Repeaters and HubsRepeaters and Hubs
• Because repeaters do not segment a network,
devices separated only by a repeater are
susceptible to data packet collision, since they are
part of the same collision domain
• Collision domain
– In Ethernet networking, a single segment on a
network
Network SegmentationNetwork Segmentation
• Segmentation
– Process of breaking a network into smaller broadcast
or collision domains
• Segment
– Part of a network that is divided logically or physically
from the rest of the network
• When network administrators place too many nodes
on the same network segment
– Causes the number of collisions to increase
Network SegmentationNetwork Segmentation
BridgesBridges
Cisco Bridge
BridgesBridges
• Operate at the Data Link layer of the OSI model
• Filters traffic between network segments by
examining the destination MAC address
– Based on this destination MAC address, the bridge either
forwards or discards the frame
– When a client sends a broadcast frame to the entire
network, the bridge will always forward the frame
– Reduce network traffic by keeping local traffic on the
local segment
BridgesBridges
• Broadcast frame
– Frame destined for all computers on the network
Transparent BridgesTransparent Bridges
• Also called learning bridges because they build a
table of MAC addresses as they receive frames
– This means that they “learn” which addresses are on which
segments
• The bridge uses the source MAC addresses to
determine which addresses are on which segments
– By determining a frame’s origin, the bridge knows where
to send frames in the future
• Ethernet networks mainly use transparent bridges
Advantages and Disadvantages ofAdvantages and Disadvantages of
BridgesBridges
• Advantages of using a bridge include:
– Bridges can extend a network by acting as a repeater
– Bridges can reduce network traffic on a segment by
subdividing network communications
– Bridges increase the available bandwidth to individual
nodes because fewer nodes share a collision domain
– Bridges reduce the likelihood of network collisions
– Some bridges connect networks using different media
types and architectures
Advantages and Disadvantages ofAdvantages and Disadvantages of
BridgesBridges
• Disadvantages of using a bridge include:
– Because bridges do more than repeaters by
viewing the MAC addresses, the extra processing
makes them slower than repeaters
* Extra processing by viewing MAC addresses
– Bridges forward broadcast frames
indiscriminately, so they do not filter broadcast
traffic
– Bridges are more expensive than repeaters
Advantages and Disadvantages ofAdvantages and Disadvantages of
BridgesBridges
• Because bridges forward broadcast traffic, it
can be a major disadvantage on a network
during a broadcast storm
• Broadcast storm
– Excessive broadcast messages to every host on the
network, launched by multiple computers
– When two or more stations engage in the
transmission of excessive broadcast traffic
SwitchesSwitches
Cisco Switch
SwitchesSwitches
• Increase network performance by reducing the
number of packets transmitted to the rest of
the network
• Like bridges, operate at the Data Link layer
of the OSI model
• In an Ethernet network, computers are usually
connected directly to a switch
SwitchesSwitches
• Switch opens a virtual circuit between the
source and the destination
– Prevents communications between just two
computers from being broadcast to every
computer on the network or segment
– Called microsegmentation
SwitchesSwitches
• Bandwidth
– Available capacity of a network
• Contention
– Condition that occurs when computers on a
network must share the available capacity of the
network wire with other computers
• When machines must share a wire and compete for
available bandwidth with other machines, they
experience contention
SwitchesSwitches
• When two machines have a virtual circuit
– They do not have to share the bandwidth with any
other computers
• Multiple virtual circuits can be in use at the
same time, each with its own full bandwidth
– Called “switched bandwidth”
SwitchesSwitches
• Advantages of switches include:
– Switches increase available network bandwidth
– With switches, there is reduced workload on individual
computers
– Switches increase network performance
– There are fewer frame collisions because switches create
collision domains for each connection
(microsegmentation)
– Switches connect directly to workstations
– Switches have an unlimited number of ports
SwitchesSwitches
• Disadvantages of switches include:
– Switches are significantly more expensive than
bridges
– Network connectivity problems can be difficult to
trace through a switch
– Broadcast traffic may be troublesome
RouterRouter
Cisco Router
RoutersRouters
• Routers
– Operate at the Network layer of the OSI model
– Provide filtering and network traffic control on LANs and
WANs
– Can connect multiple segments and multiple networks
• Networks connected by routers are called
internetworks because they create a larger network
of interconnected, smaller networks
• Internetworks
– Networks connected by multiple routers
RoutersRouters
• Similar to switches and bridges in that they segment
a network and filter traffic
– Routers use the logical address
RoutersRouters
• When a router is introduced into a network, it
creates more networks
• Routers create collision domains and they also
create broadcast domains because a router will
not pass broadcast traffic
– A broadcast domain is a group of network devices
that will receive LAN broadcast traffic from each
other
Physical vs. Logical AddressesPhysical vs. Logical Addresses
• MAC address
– Found at the Data Link layer of the OSI model
– Used by bridges and switches to make forwarding
decisions within a network or subnetwork
• Subnetwork
– Portion of the network created by manipulating a
network address and breaking it down into smaller
parts
Physical versus Logical AddressesPhysical versus Logical Addresses
• IP address
– Logical address when TCP/IP is used on an
internetwork
– 32-bit binary address used on TCP/IP networks
– Consists of a host portion and a network portion
• Routers use the IP address to route packets to
the correct network segment
IP Address / Logical
Address
MAC Address /
Physical Address
Physical versus Logical AddressesPhysical versus Logical Addresses
• Notice that
each port
(connection)
on the router
has its own
unique IP
address
Figure 2-5:
Router
Routers not only connect networks in a single location or
set of buildings, but they provide interfaces— or
“sockets”—for connecting to wide-area network (WAN)
services.
Examples of Cisco router products:
Cisco 700 series
Cisco 1000 series
Cisco 1600 series
Cisco 2500 series
Cisco 2600 series
Cisco 3600 series
Cisco 4500 series
Advantages and Disadvantages ofAdvantages and Disadvantages of
RoutersRouters
• Advantages of routers:
– Routers can connect different network
architectures
– Routes can choose the best path across the
network using dynamic routing techniques
– Routers can create collision domains by
segmenting the network
– Routers reduce network traffic because they do
not retransmit network broadcast traffic
Advantages and Disadvantages ofAdvantages and Disadvantages of
RoutersRouters
• Disadvantages of routers:
– Routers work only with routable network protocols
– Routers are more expensive than bridges or repeaters
– Dynamic router communication causes additional
network overhead
– Routers are slower than bridges or switches because
they must analyze a data transmission from the
Physical through the Network layer
Cisco RouterCisco Router
Cisco RouterCisco Router
Cisco RouterCisco Router
• Cisco has released different series of routers from the
600 to the 12000 series, these includes the popular 1600,
2500 and 1600 series. They all run the Cisco equipment
Internetwork Operating System (IOS) which separates
the Cisco routers from the rest. They created what they
call as the Cisco fusion where the goal is that all these
devices will run at the same operating system.
Cisco RouterCisco Router
IOS
• Internetwork Operating System (IOS) is the Operating
system where all Cisco routers run. IOS is the most
important component of the router. Without the IOS, the
router is practically useless. It provides the router its
capabilities and this can be updated or downloaded for
back up from the router.
• The IOS is around 5mb in size (or larger depending on
the series) and is loaded up upon the boot up. Its current
version is version 12 but Cisco releases minor versions
for bug fixing and added functionalities.
Notes:
Routers
• Compared to switches and bridges, routers are smarter.
• Based on a network roadmap called a “routing table,”
routers can help ensure that packets are traveling the
most efficient paths to their destinations.
• If a link between two routers goes down, the sending
router can determine an alternate route to keep traffic
moving.
BroutersBrouters
• Device that functions as:
– A bridge for nonroutable protocols
– A router for routable protocols
• Provides the best attributes of both a bridge
and a router
• Operates at both the Data Link and Network
layers
GatewaysGateways
Cisco Gateway
MC3800
GatewaysGateways
• Gateways
– Combination of hardware and software
– Translate between different protocols on a network
– Usually a combination of hardware and software
– Translates between different protocol suites
– Has the most negative effect on network performance
• Packets must be rebuilt not just at the lower levels but at the very
upper levels
– So that actual data content can be converted into a format the
destination can process
– Creates the most latency
GatewaysGateways
• Latency
– Delay on a network caused by a variety of factors
A gateway provides a LAN with access to a
different type of network, an internetwork,
a mainframe computer, or a particular type
of operating environment.
A gateway serves to connect networks with very
different architectures, for example, a LAN and
an X.25 packet-switching service. Gateways are
also used to provide access to special services,
such as e-mail (electronic mail), fax, and Telex.
Gateways can operate at several of the higher OSI
Reference Model levels, most notably at the session,
presentation, and application layers.
In doing their work, gateways may change the
representation of data before passing it on. For example, a
gateway may convert from ASCII to EBCDIC on the way
to an IBM mainframe, encrypting or decrypting data
between the source and destination environments.
Gateways also must do protocol conversion, since the
different environments
connected by a gateway will generally use different
protocol families.
Chapter SummaryChapter Summary
• Network administrators use devices to control and
extend usable size of a network
• Repeaters work against attenuation by cleaning and
repeating signals that they receive on a network
• A hub ties several networking cables together to
create a link between different stations on a network
• Network segmentation is the process of isolating
hosts onto smaller segments to reduce the possibility
of collisions
Chapter SummaryChapter Summary
• Bridges provide network segmentation by examining
the MAC address that is sent in the data frame
• Switches increase network performance by reducing
the number of frames transmitted to the rest of a
network
• Routers operate at the Network layer of the OSI
model and provide filtering and network-traffic
control on LANs and WANs
• A brouter is a hybrid device that functions both as a
bridge and as a router
Chapter SummaryChapter Summary
• Gateways are usually a combination of hardware and
software and are used to translate between different
protocols
• Ethernet is the most commonly used LAN
technology because it is the most efficient choice for
most LANs
• Fast Ethernet (100 Mbps) and Gigabit Ethernet (1000
Mbps) are faster implementations of the Ethernet
technology
• Most Ethernet networks can support either half- or
full-duplex communications
Network Devices: Repeaters, Hubs, Bridges, Switches and Routers

More Related Content

What's hot (20)

Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Network ppt
Network pptNetwork ppt
Network ppt
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Network switch
Network switchNetwork switch
Network switch
 
Unguided media
Unguided mediaUnguided media
Unguided media
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
IP Address
IP AddressIP Address
IP Address
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Data communication
Data communicationData communication
Data communication
 

Similar to Network Devices: Repeaters, Hubs, Bridges, Switches and Routers

Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)Dhani Ahmad
 
Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Aman Jaiswal
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network ComponentsJyoti Akhter
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices21viveksingh
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014Zuhaib Zaroon
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONAswini Badatya
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptxitwkd
 
CCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONCCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONShankar Ghorpade
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
networking.ppt
networking.pptnetworking.ppt
networking.pptsuchita74
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overviewSyaiful Ahdan
 
1.introduction to computer networks
1.introduction to computer networks1.introduction to computer networks
1.introduction to computer networksSidra Yousuf
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxAASTHAJAJOO
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Aneesh Nelavelly
 

Similar to Network Devices: Repeaters, Hubs, Bridges, Switches and Routers (20)

Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)
 
Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
CCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONCCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATION
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Networking dcoer
Networking dcoerNetworking dcoer
Networking dcoer
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Network devices
Network devicesNetwork devices
Network devices
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
 
1.introduction to computer networks
1.introduction to computer networks1.introduction to computer networks
1.introduction to computer networks
 
presentation on type of toplogy and network
presentation on type of toplogy and networkpresentation on type of toplogy and network
presentation on type of toplogy and network
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 

More from Dhani Ahmad

Strategic planning
Strategic planningStrategic planning
Strategic planningDhani Ahmad
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and recordsDhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behaviorDhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information managementDhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islamDhani Ahmad
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 

More from Dhani Ahmad (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Information system
Information systemInformation system
Information system
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Network Devices: Repeaters, Hubs, Bridges, Switches and Routers

  • 2. ObjectivesObjectives • Explain the uses, advantages, and disadvantages of repeaters • Explain the uses, advantages, and disadvantages of hubs • Define network segmentation • Explain network segmentation using bridges
  • 4. RepeatersRepeaters • The number of nodes on a network and the length of cable used influence the quality of communication on the network • Attenuation – Natural degradation of a transmitted signal over distance • Repeaters work against attenuation by repeating signals that they receive on a network - Typically cleaning and regenerating the digital transmission in the process
  • 6. RepeatersRepeaters • Note that on analog networks, devices that boost the signal are called amplifiers • These devices do not have the same signal regeneration capabilities as repeaters because they must maintain the shape of the received signal – Therefore, noise tends to amplified with the signal
  • 7. RepeatersRepeaters • Repeaters work in the Physical layer (layer 1) • On optical networks, signal amplification is handled by optical repeaters • Some repeaters can be used to connect two physically different types of cabling
  • 11. HubsHubs • Generic connection device used to tie several networking cables together to create a link between different stations on a network • Hubs that are plugged into electric power are called active hubs • A hub that merely connects different cables on a network and provides no signal regeneration is called a passive hub and is not a repeater
  • 12. HubsHubs • Active hubs – Amplify or repeat signals that pass through them • Passive hub – Merely connects cables on a network and provides no signal regeneration
  • 13. HubsHubs • “Hub” is a generic term applied to many different network-connection devices • If a hub in some way segments or subdivides the traffic on a network, it is an intelligent, or switching, hub
  • 14. Hubs Hubs, are simple devices that interconnect groups of users. Hubs forward any data packets they receive over one port from one workstation—including e-mail, word processing documents, spreadsheets, graphics, or print requests—to all of their remaining ports. All users connected to a single hub sharing the hub’s bandwidth or data-carrying capacity. Examples of Cisco hub products: Cisco Micro Hub series Cisco FastHub® series
  • 15. HubsHubs • Topology – Usually refers to the physical layout of network cable and devices – When all stations are connected to a central hub, the topology is known as a star because of its appearance
  • 18. Advantages and Disadvantages ofAdvantages and Disadvantages of Repeaters and HubsRepeaters and Hubs • Advantages of using repeaters on your network: – Repeaters can extend a network’s total distance – Repeaters do not seriously impact network performance – Certain repeaters can connect networks using different physical media
  • 19. Advantages and Disadvantages ofAdvantages and Disadvantages of Repeaters and HubsRepeaters and Hubs • Disadvantages of using repeaters on your network: – Repeaters cannot connect different network architectures, such as Token Ring and Ethernet – Repeaters do not reduce network traffic * They repeat everything they received – Repeaters do not segment the network – Do not reformat data structures • Cannot connect networks that require different types of frames
  • 20. Advantages and Disadvantages ofAdvantages and Disadvantages of Repeaters and HubsRepeaters and Hubs • Because repeaters do not segment a network, devices separated only by a repeater are susceptible to data packet collision, since they are part of the same collision domain • Collision domain – In Ethernet networking, a single segment on a network
  • 21. Network SegmentationNetwork Segmentation • Segmentation – Process of breaking a network into smaller broadcast or collision domains • Segment – Part of a network that is divided logically or physically from the rest of the network • When network administrators place too many nodes on the same network segment – Causes the number of collisions to increase
  • 24. BridgesBridges • Operate at the Data Link layer of the OSI model • Filters traffic between network segments by examining the destination MAC address – Based on this destination MAC address, the bridge either forwards or discards the frame – When a client sends a broadcast frame to the entire network, the bridge will always forward the frame – Reduce network traffic by keeping local traffic on the local segment
  • 25. BridgesBridges • Broadcast frame – Frame destined for all computers on the network
  • 26.
  • 27. Transparent BridgesTransparent Bridges • Also called learning bridges because they build a table of MAC addresses as they receive frames – This means that they “learn” which addresses are on which segments • The bridge uses the source MAC addresses to determine which addresses are on which segments – By determining a frame’s origin, the bridge knows where to send frames in the future • Ethernet networks mainly use transparent bridges
  • 28. Advantages and Disadvantages ofAdvantages and Disadvantages of BridgesBridges • Advantages of using a bridge include: – Bridges can extend a network by acting as a repeater – Bridges can reduce network traffic on a segment by subdividing network communications – Bridges increase the available bandwidth to individual nodes because fewer nodes share a collision domain – Bridges reduce the likelihood of network collisions – Some bridges connect networks using different media types and architectures
  • 29. Advantages and Disadvantages ofAdvantages and Disadvantages of BridgesBridges • Disadvantages of using a bridge include: – Because bridges do more than repeaters by viewing the MAC addresses, the extra processing makes them slower than repeaters * Extra processing by viewing MAC addresses – Bridges forward broadcast frames indiscriminately, so they do not filter broadcast traffic – Bridges are more expensive than repeaters
  • 30. Advantages and Disadvantages ofAdvantages and Disadvantages of BridgesBridges • Because bridges forward broadcast traffic, it can be a major disadvantage on a network during a broadcast storm • Broadcast storm – Excessive broadcast messages to every host on the network, launched by multiple computers – When two or more stations engage in the transmission of excessive broadcast traffic
  • 32. SwitchesSwitches • Increase network performance by reducing the number of packets transmitted to the rest of the network • Like bridges, operate at the Data Link layer of the OSI model • In an Ethernet network, computers are usually connected directly to a switch
  • 33. SwitchesSwitches • Switch opens a virtual circuit between the source and the destination – Prevents communications between just two computers from being broadcast to every computer on the network or segment – Called microsegmentation
  • 34. SwitchesSwitches • Bandwidth – Available capacity of a network • Contention – Condition that occurs when computers on a network must share the available capacity of the network wire with other computers • When machines must share a wire and compete for available bandwidth with other machines, they experience contention
  • 35. SwitchesSwitches • When two machines have a virtual circuit – They do not have to share the bandwidth with any other computers • Multiple virtual circuits can be in use at the same time, each with its own full bandwidth – Called “switched bandwidth”
  • 36.
  • 37. SwitchesSwitches • Advantages of switches include: – Switches increase available network bandwidth – With switches, there is reduced workload on individual computers – Switches increase network performance – There are fewer frame collisions because switches create collision domains for each connection (microsegmentation) – Switches connect directly to workstations – Switches have an unlimited number of ports
  • 38. SwitchesSwitches • Disadvantages of switches include: – Switches are significantly more expensive than bridges – Network connectivity problems can be difficult to trace through a switch – Broadcast traffic may be troublesome
  • 40. RoutersRouters • Routers – Operate at the Network layer of the OSI model – Provide filtering and network traffic control on LANs and WANs – Can connect multiple segments and multiple networks • Networks connected by routers are called internetworks because they create a larger network of interconnected, smaller networks • Internetworks – Networks connected by multiple routers
  • 41. RoutersRouters • Similar to switches and bridges in that they segment a network and filter traffic – Routers use the logical address
  • 42. RoutersRouters • When a router is introduced into a network, it creates more networks • Routers create collision domains and they also create broadcast domains because a router will not pass broadcast traffic – A broadcast domain is a group of network devices that will receive LAN broadcast traffic from each other
  • 43. Physical vs. Logical AddressesPhysical vs. Logical Addresses • MAC address – Found at the Data Link layer of the OSI model – Used by bridges and switches to make forwarding decisions within a network or subnetwork • Subnetwork – Portion of the network created by manipulating a network address and breaking it down into smaller parts
  • 44. Physical versus Logical AddressesPhysical versus Logical Addresses • IP address – Logical address when TCP/IP is used on an internetwork – 32-bit binary address used on TCP/IP networks – Consists of a host portion and a network portion • Routers use the IP address to route packets to the correct network segment
  • 45. IP Address / Logical Address MAC Address / Physical Address
  • 46. Physical versus Logical AddressesPhysical versus Logical Addresses • Notice that each port (connection) on the router has its own unique IP address Figure 2-5: Router
  • 47. Routers not only connect networks in a single location or set of buildings, but they provide interfaces— or “sockets”—for connecting to wide-area network (WAN) services. Examples of Cisco router products: Cisco 700 series Cisco 1000 series Cisco 1600 series Cisco 2500 series Cisco 2600 series Cisco 3600 series Cisco 4500 series
  • 48. Advantages and Disadvantages ofAdvantages and Disadvantages of RoutersRouters • Advantages of routers: – Routers can connect different network architectures – Routes can choose the best path across the network using dynamic routing techniques – Routers can create collision domains by segmenting the network – Routers reduce network traffic because they do not retransmit network broadcast traffic
  • 49. Advantages and Disadvantages ofAdvantages and Disadvantages of RoutersRouters • Disadvantages of routers: – Routers work only with routable network protocols – Routers are more expensive than bridges or repeaters – Dynamic router communication causes additional network overhead – Routers are slower than bridges or switches because they must analyze a data transmission from the Physical through the Network layer
  • 50.
  • 53. Cisco RouterCisco Router • Cisco has released different series of routers from the 600 to the 12000 series, these includes the popular 1600, 2500 and 1600 series. They all run the Cisco equipment Internetwork Operating System (IOS) which separates the Cisco routers from the rest. They created what they call as the Cisco fusion where the goal is that all these devices will run at the same operating system.
  • 54. Cisco RouterCisco Router IOS • Internetwork Operating System (IOS) is the Operating system where all Cisco routers run. IOS is the most important component of the router. Without the IOS, the router is practically useless. It provides the router its capabilities and this can be updated or downloaded for back up from the router. • The IOS is around 5mb in size (or larger depending on the series) and is loaded up upon the boot up. Its current version is version 12 but Cisco releases minor versions for bug fixing and added functionalities.
  • 55. Notes: Routers • Compared to switches and bridges, routers are smarter. • Based on a network roadmap called a “routing table,” routers can help ensure that packets are traveling the most efficient paths to their destinations. • If a link between two routers goes down, the sending router can determine an alternate route to keep traffic moving.
  • 56. BroutersBrouters • Device that functions as: – A bridge for nonroutable protocols – A router for routable protocols • Provides the best attributes of both a bridge and a router • Operates at both the Data Link and Network layers
  • 58. GatewaysGateways • Gateways – Combination of hardware and software – Translate between different protocols on a network – Usually a combination of hardware and software – Translates between different protocol suites – Has the most negative effect on network performance • Packets must be rebuilt not just at the lower levels but at the very upper levels – So that actual data content can be converted into a format the destination can process – Creates the most latency
  • 59. GatewaysGateways • Latency – Delay on a network caused by a variety of factors
  • 60. A gateway provides a LAN with access to a different type of network, an internetwork, a mainframe computer, or a particular type of operating environment. A gateway serves to connect networks with very different architectures, for example, a LAN and an X.25 packet-switching service. Gateways are also used to provide access to special services, such as e-mail (electronic mail), fax, and Telex.
  • 61. Gateways can operate at several of the higher OSI Reference Model levels, most notably at the session, presentation, and application layers. In doing their work, gateways may change the representation of data before passing it on. For example, a gateway may convert from ASCII to EBCDIC on the way to an IBM mainframe, encrypting or decrypting data between the source and destination environments. Gateways also must do protocol conversion, since the different environments connected by a gateway will generally use different protocol families.
  • 62. Chapter SummaryChapter Summary • Network administrators use devices to control and extend usable size of a network • Repeaters work against attenuation by cleaning and repeating signals that they receive on a network • A hub ties several networking cables together to create a link between different stations on a network • Network segmentation is the process of isolating hosts onto smaller segments to reduce the possibility of collisions
  • 63. Chapter SummaryChapter Summary • Bridges provide network segmentation by examining the MAC address that is sent in the data frame • Switches increase network performance by reducing the number of frames transmitted to the rest of a network • Routers operate at the Network layer of the OSI model and provide filtering and network-traffic control on LANs and WANs • A brouter is a hybrid device that functions both as a bridge and as a router
  • 64. Chapter SummaryChapter Summary • Gateways are usually a combination of hardware and software and are used to translate between different protocols • Ethernet is the most commonly used LAN technology because it is the most efficient choice for most LANs • Fast Ethernet (100 Mbps) and Gigabit Ethernet (1000 Mbps) are faster implementations of the Ethernet technology • Most Ethernet networks can support either half- or full-duplex communications