SlideShare a Scribd company logo
1 of 18
By
Ramola Dhande
Networking devices
Why devices are required?
 To transfer data effectively.
 To connect a LAN to the Internet.
 To break a LAN into segments to relieve traffic
congestion.
 To provide a security wall between two different
types of users.
 To connect WLAN to LAN.
Introduction
 Devices are used to connect different nodes to
each other or networks to each other.
 According to the type of network devices are
selected.
 Repeaters, routers, hubs, switches,bridges,
gateways are responsible for moving data from
one network cable to another.
Types of devices
Repeater
 It is a device that extends the distance of a
particular network run.
 It boost the signal and then send it to next node.
 Repeaters are only used to connect the same
type of media, such as 10Base-2 to 10Base-2, or
Token Ring to Token Ring.
 Repeaters operate at the physical layer of the
OSI networking model.
Hub
 A hub interconnects two or more workstations into a
local area network.
 When a workstation transmits to a hub, the hub
immediately resends the data frame to all connecting
links.
 It more simply called concentrators.
 It prevents collision between packets
transmission from one node to other.
 Also it has automatic partitioning property if any
one of port get damage.
 It is a physical layer device.
Bridges
 Bridges are basically more intelligent versions of
repeaters.
 Bridges examine the Media Access Control
(MAC) address of each packet and forms table.
 Use bridges is only on smaller networks.
 Bridges operate at the data-link layer.
 Bridges don’t really care about the network
protocols they’re carrying,they just forward
packets.
Router
 Routers are more intelligent bridges.
 Routers have processor and memory.
 Routers operate at the network layer.
 Routers can connect both similar and dissimilar
networks.
 It determine the shortest route to a destination
and use it.
 Routers actually become a node on a network,
and they have their own network address.
 Routers must be programmed to function
correctly.
Switches
 They are a lot like bridges, except that they have
many ports and otherwise look like a hub.
 switches form one-to-one connections between
any two ports.
 Multiple workstations connected to a switch use
dedicated segments. This is a very efficient way
to isolate heavy users from the network.
Gateways
 They are application-specific interfaces that link
all seven layers of the OSI Model when they are
dissimilar at any or all levels.
 The primary use for gateways today is for
handling e-mail.
 POP3 and SMTP are two protocols handle by it.
Devices and OSI model
Networking devices

More Related Content

What's hot

Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantagessabari Giri
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data CommunicationKamal Acharya
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.mvenkat2016
 
networkmedia presentation1
networkmedia presentation1networkmedia presentation1
networkmedia presentation1uncleRhyme
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabhaSuprabha Sahoo
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 

What's hot (20)

Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
networkmedia presentation1
networkmedia presentation1networkmedia presentation1
networkmedia presentation1
 
Computer network physical layer
Computer network  physical layerComputer network  physical layer
Computer network physical layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Tcp
TcpTcp
Tcp
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Router switch and hub
Router switch and hubRouter switch and hub
Router switch and hub
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 

Viewers also liked

Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)Ramola Dhande
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolIshtdeep Hora
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Chapter One- Intro to Biology
Chapter One- Intro to BiologyChapter One- Intro to Biology
Chapter One- Intro to BiologyMary Beth Smith
 
Chapter 1 Lecture- Matter & Measurement
Chapter 1 Lecture- Matter & MeasurementChapter 1 Lecture- Matter & Measurement
Chapter 1 Lecture- Matter & MeasurementMary Beth Smith
 
Chapter 5 - Electron Configurations
Chapter 5 - Electron ConfigurationsChapter 5 - Electron Configurations
Chapter 5 - Electron ConfigurationsKendon Smith
 
Introduction 2 linux
Introduction 2 linuxIntroduction 2 linux
Introduction 2 linuxPapu Kumar
 
Web Application Lunacy
Web Application LunacyWeb Application Lunacy
Web Application Lunacyanandvaidya
 
Chapter 4 Lecture- Solution Stoich
Chapter 4 Lecture- Solution StoichChapter 4 Lecture- Solution Stoich
Chapter 4 Lecture- Solution StoichMary Beth Smith
 
UNIX(Essential needs of administration)
UNIX(Essential needs of administration)UNIX(Essential needs of administration)
UNIX(Essential needs of administration)Papu Kumar
 
Chapter 2 - Matter and Change
Chapter 2 - Matter and ChangeChapter 2 - Matter and Change
Chapter 2 - Matter and ChangeKendon Smith
 
Chapter 24- Seeds & Flowers
Chapter 24- Seeds & FlowersChapter 24- Seeds & Flowers
Chapter 24- Seeds & FlowersMary Beth Smith
 
2010 05 02 10 Dr Daniel C Tsui Physics Nobel Prize King Carl Xvi Gustaf Of S...
2010 05 02 10 Dr Daniel C Tsui  Physics Nobel Prize King Carl Xvi Gustaf Of S...2010 05 02 10 Dr Daniel C Tsui  Physics Nobel Prize King Carl Xvi Gustaf Of S...
2010 05 02 10 Dr Daniel C Tsui Physics Nobel Prize King Carl Xvi Gustaf Of S...hjk888
 
Chapter 6 - The Periodic Table
Chapter 6 - The Periodic TableChapter 6 - The Periodic Table
Chapter 6 - The Periodic TableKendon Smith
 

Viewers also liked (20)

Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Chapter One- Intro to Biology
Chapter One- Intro to BiologyChapter One- Intro to Biology
Chapter One- Intro to Biology
 
Chapter 1 Lecture- Matter & Measurement
Chapter 1 Lecture- Matter & MeasurementChapter 1 Lecture- Matter & Measurement
Chapter 1 Lecture- Matter & Measurement
 
Chapter 5 - Electron Configurations
Chapter 5 - Electron ConfigurationsChapter 5 - Electron Configurations
Chapter 5 - Electron Configurations
 
Introduction to xml
Introduction to xmlIntroduction to xml
Introduction to xml
 
Introduction 2 linux
Introduction 2 linuxIntroduction 2 linux
Introduction 2 linux
 
Web Application Lunacy
Web Application LunacyWeb Application Lunacy
Web Application Lunacy
 
Chapter 4 Lecture- Solution Stoich
Chapter 4 Lecture- Solution StoichChapter 4 Lecture- Solution Stoich
Chapter 4 Lecture- Solution Stoich
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
UNIX(Essential needs of administration)
UNIX(Essential needs of administration)UNIX(Essential needs of administration)
UNIX(Essential needs of administration)
 
005 skyeye
005 skyeye005 skyeye
005 skyeye
 
Chapter 2 - Matter and Change
Chapter 2 - Matter and ChangeChapter 2 - Matter and Change
Chapter 2 - Matter and Change
 
Chapter 24- Seeds & Flowers
Chapter 24- Seeds & FlowersChapter 24- Seeds & Flowers
Chapter 24- Seeds & Flowers
 
2010 05 02 10 Dr Daniel C Tsui Physics Nobel Prize King Carl Xvi Gustaf Of S...
2010 05 02 10 Dr Daniel C Tsui  Physics Nobel Prize King Carl Xvi Gustaf Of S...2010 05 02 10 Dr Daniel C Tsui  Physics Nobel Prize King Carl Xvi Gustaf Of S...
2010 05 02 10 Dr Daniel C Tsui Physics Nobel Prize King Carl Xvi Gustaf Of S...
 
Chapter 6 - The Periodic Table
Chapter 6 - The Periodic TableChapter 6 - The Periodic Table
Chapter 6 - The Periodic Table
 
سه فیزیک دان برنده نوبل ۲۰۱۶
سه فیزیک دان برنده نوبل ۲۰۱۶سه فیزیک دان برنده نوبل ۲۰۱۶
سه فیزیک دان برنده نوبل ۲۰۱۶
 
Chapter 4 notes
Chapter 4 notesChapter 4 notes
Chapter 4 notes
 

Similar to Networking devices

Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their securitylovizabasharat
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyAvishek Maitra
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksKarthik Ak
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Devices use in computer networking
Devices use in computer networkingDevices use in computer networking
Devices use in computer networkingEzekielHuggins110315
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfSanjanaSingh158
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in BusinessNethan P
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan Singh
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.pptssuserf7cd2b
 

Similar to Networking devices (20)

Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Inter networking
Inter networkingInter networking
Inter networking
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
 
Networks 2
Networks 2Networks 2
Networks 2
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Devices use in computer networking
Devices use in computer networkingDevices use in computer networking
Devices use in computer networking
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
network layer
network layernetwork layer
network layer
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdf
 
Networking device Computer Application in Business
Networking device Computer Application in BusinessNetworking device Computer Application in Business
Networking device Computer Application in Business
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......router
 
networking
networkingnetworking
networking
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Cna
CnaCna
Cna
 
05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt
 
Networking devices
Networking devicesNetworking devices
Networking devices
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Networking devices

  • 2. Why devices are required?  To transfer data effectively.  To connect a LAN to the Internet.  To break a LAN into segments to relieve traffic congestion.  To provide a security wall between two different types of users.  To connect WLAN to LAN.
  • 3. Introduction  Devices are used to connect different nodes to each other or networks to each other.  According to the type of network devices are selected.  Repeaters, routers, hubs, switches,bridges, gateways are responsible for moving data from one network cable to another.
  • 5. Repeater  It is a device that extends the distance of a particular network run.  It boost the signal and then send it to next node.  Repeaters are only used to connect the same type of media, such as 10Base-2 to 10Base-2, or Token Ring to Token Ring.  Repeaters operate at the physical layer of the OSI networking model.
  • 6.
  • 7. Hub  A hub interconnects two or more workstations into a local area network.  When a workstation transmits to a hub, the hub immediately resends the data frame to all connecting links.  It more simply called concentrators.  It prevents collision between packets transmission from one node to other.  Also it has automatic partitioning property if any one of port get damage.  It is a physical layer device.
  • 8.
  • 9. Bridges  Bridges are basically more intelligent versions of repeaters.  Bridges examine the Media Access Control (MAC) address of each packet and forms table.  Use bridges is only on smaller networks.  Bridges operate at the data-link layer.  Bridges don’t really care about the network protocols they’re carrying,they just forward packets.
  • 10.
  • 11. Router  Routers are more intelligent bridges.  Routers have processor and memory.  Routers operate at the network layer.  Routers can connect both similar and dissimilar networks.  It determine the shortest route to a destination and use it.  Routers actually become a node on a network, and they have their own network address.  Routers must be programmed to function correctly.
  • 12.
  • 13. Switches  They are a lot like bridges, except that they have many ports and otherwise look like a hub.  switches form one-to-one connections between any two ports.  Multiple workstations connected to a switch use dedicated segments. This is a very efficient way to isolate heavy users from the network.
  • 14.
  • 15. Gateways  They are application-specific interfaces that link all seven layers of the OSI Model when they are dissimilar at any or all levels.  The primary use for gateways today is for handling e-mail.  POP3 and SMTP are two protocols handle by it.
  • 16.