SlideShare a Scribd company logo
 Network adapter is a device that enables a computer to talk
with other computer/network. Using unique hardware
addresses (MAC address) encoded on the card chip, the
data-link protocol employs these addresses to discover other
systems on the network so that it can transfer data to the
right destination.
 There are two types of network cards: wired and wireless.
The wired NIC uses cables and connectors as a medium to
transfer data, whereas in the wireless card, the connection is
made using antenna that employs radio wave technology. All
modern laptop computers incorporated wireless NIC in
addition to the wired adapter.
Network Card Speed
 Network Interface card, one of the main computer network
components, comes with different speeds, 10Mbps, 100Mbps, and
1000Mbps, so on. Recent standard network cards built with
Gigabit (1000Mbps) connection speed. It also supports to connect
slower speeds such as 10Mbps and 100Mbps. However, the speed
of the card depends on your LAN speed.
 For example, if you have a switch that supports up to 100Mbps,
your NIC will also transfer a data with this same speed even
though your computer NIC has still the capability to transfer data
at 1000Mbps (1Gbps). In modern computers, network adapter is
integrated with a computer motherboard. However if you want
advanced and fast Ethernet card, you may buy and install on your
computer using the PCI slot found on the motherboard (desktop)
and ExpressCard slots on laptop .
 Hub is a device that splits a network connection into multiple
computers. It is like a distribution center. When a computer
request information from a network or a specific computer, it
sends the request to the hub through a cable. The hub will
receive the request and transmit it to the entire network.
Each computer in the network should then figure out
whether the broadcast data is for them or not.
 Currently Hubs are becoming obsolete and replaced by more
advanced communication devices such as Switchs and
Routers.
 Switch is a telecommunication device grouped as one of
computer network components. Switch is like a Hub but built
in with advanced features. It uses physical device addresses
in each incoming messages so that it can deliver the
message to the right destination or port.
 Like Hub, switch don’t broadcast the received message to
entire network, rather before sending it checks to which
system or port should the message be sent. In other words
switch connects the source and destination directly which
increases the speed of the network. Both switch and hub
have common features: Multiple RJ-45 ports, power supply
and connection lights.
 When we talk about computer network components, the
other device that used to connect a LAN with an internet
connection is called Router. When you have two distinct
networks (LANs) or want to share a single internet
connection to multiple computers, we use a Router.
 In most cases, recent routers also include a switch which in
other words can be used as a switch. You don’t need to buy
both switch and router, particularly if you are installing small
business and home networks.
 There are two types of Router: wired and wireless. The
choice depends on your physical office/home setting, speed
and cost.
 A modem enables you to connect your computer to the
available internet connection over the existing telephone
line. Like NIC, Modem is not integrated with a computer
motherboard. It comes as separate part which can be
installed on the PCI slots found on motherboard.
 A modem is not necessary for LAN, but required for internet
connection such as dial-up and DSL.
 There are some types of modems, which differs in speed and
transmission rate. Standard PC modem or Dial-up modems
(56Kb data transmission speed), Cellular modem (used in a
laptop that enables to connect while on the go), cable
modem (500 times faster than standard modem) and DSL
Modems are the most popular.
 Firewall is a network security system that monitors and controls
the incoming and outgoing network traffic based on
predetermined security rules.
 A firewall typically establishes a barrier between a trusted, secure
internal network and another outside network, such as the
Internet, that is assumed not to be secure or trusted.
 Firewalls are often categorized as either network firewalls or host-
based firewalls. Network firewalls are a software appliance running
on general purpose hardware or hardware-based firewall
computer appliances that filter traffic between two or more
networks. Host-based firewalls provide a layer of software on one
host that controls network traffic in and out of that single
machine.
 Firewall appliances may also offer other functionality to the
internal network they protect such as acting as a DHCP or VPN
server for that network.
 Cisco IOS Intrusion Prevention System (IPS) is an inline,
deep-packet inspection feature that effectively mitigates a
wide range of network attacks. A component of the Cisco
IOS Integrated Threat Control framework and
complemented by Cisco IOS Flexible Packet Matching
feature, Cisco IOS IPS provides your network with the
intelligence to accurately identify, classify, and stop or block
malicious traffic in real time.
Benefits
 Increased network availability -- Provides networkwide,
distributed protection from many attacks, exploits, worms, and
viruses
 Faster remediation -- Pinpoints the source of network attacks
faster and takes corrective actions closest to the attack
 Deployment flexibility -- Offers inline inspection of traffic
through any combination of the router's LAN and WAN interfaces
with field-customizable worm and attack signature sets and event
actions that adjust automatically based on risk level
 Comprehensive threat protection -- Works with Cisco IOS
Firewall, control-plane policing, and other Cisco IOS Software
security features
 It is a software/Hardware capable of authenticating and
authorizing users and devices that are connected to a
network.
 It is a centralized based authentication process similar to the
Cisco’sAAA/ACS
 The model of deploying an ACS or ISE server in the network
is said to be a part of Cisco’sTrust Sec Model
 Get advanced threat defense, advanced malware protection, application
visibility and control, insightful reporting, and secure mobility. The Cisco
Web Security Appliance (WSA) combines all of these forms of protection
and more in a single solution. The WSA also helps to secure and control
web traffic, while simplifying deployment and reducing costs.
 The Web Security Appliance gives you complete control over how your
users access the Internet. By identifying hundreds of applications and
more than 150,000 micro-applications, our appliance helps your
administrators create highly granular policies.
 Specific features and applications, such as chat, messaging, video, and
audio can be:
 Allowed
 Restricted with time and bandwidth limits
 Blocked according to your requirements
 You no longer need to block entire websites.
 Cisco Secure Access Control Server (ACS) is an access policy
control platform that helps you comply with growing regulatory
and corporate requirements. By integrating with your other access
control systems, it helps improve productivity and contain costs. It
supports multiple scenarios simultaneously, including:
 Device administration: Authenticates administrators, authorizes commands,
and provides an audit trail
 Remote Access: Works with VPN and other remote network access devices to
enforce access policies
 Wireless: Authenticates and authorizes wireless users and hosts and enforces
wireless-specific policies
 Network admission control: Communicates with posture and audit servers to
enforce admission control policies
 NOTE: This product is no longer being sold and might not be
supported.
• Prior to wireless network, setting up a computer network in a
business, home or school often required many cables in
order to deliver network access to all of the network enable
devices in the building.
• With the creation of WAP, network users are now able to add
devices that access the network with few or no cable.
• A WAP normally connects directly to a wires Ethernet
connection and the WAP then provides wireless connections
using radio frequency for other devices to utilized that wired
connection.
 As the number of client using wireless infrastructure
continues to increase, so does the need for continuous
wireless coverage, wireless network uptime and
centralized management and monitoring.
 A WLAN controller is a hardware device that provides a
single point of management for all of the access points
in your network in a simplified manner.
 Those access point connect to the WLAN controller,
which then connect to your wireless network.
 A WLAN controller communicates with the access
points over any Ethernet or IP network using
lightweight access point protocol (LWAPP), which lets
you control several wireless access points at once.
 A terminal server commonly provides out-of-band access
for multiple devices. A terminal server is a router with
multiple, low speed, asynchronous ports that are
connected to other serial devices, for example, modems
or console ports on routers or switches.
 The terminal server allows you to use a single point to
access the console ports of many devices. A terminal
server eliminates the need to configure backup scenarios
like modems on auxiliary ports for every device. You can
also configure a single modem on the auxiliary port of the
terminal server, to provide dial-up service to the other
devices when network connectivity fails.
 IP phone uses Voice over IP technologies for placing and
transmitting telephone calls over an IP network, such as the
Internet, instead of the traditional public switched telephone
network

More Related Content

What's hot

Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Network devices
Network devicesNetwork devices
Network devices
Rahul Kushwaha
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
rahul kapoliya
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Nayan Dagliya
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
Pritom Chaki
 
HUB Device
HUB Device HUB Device
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
keyur Nandaniya
 
Networking devices
Networking devicesNetworking devices
Networking devices
Tayyab Hussain
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
Farhan Galib
 
Router switch and hub
Router switch and hubRouter switch and hub
Router switch and hub
Usama Mudassar
 
WLAN
WLANWLAN
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cableilakkiya
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Kiran Buriro
 
Networking devices
Networking devicesNetworking devices
Networking devices
Mubassir Ambekar
 
Lan network
Lan networkLan network
Lan network
claudiaviguri
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
Online
 

What's hot (20)

Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Network devices
Network devicesNetwork devices
Network devices
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
HUB Device
HUB Device HUB Device
HUB Device
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Router switch and hub
Router switch and hubRouter switch and hub
Router switch and hub
 
WLAN
WLANWLAN
WLAN
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cable
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Lan network
Lan networkLan network
Lan network
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 

Similar to Networking devices

Unit 1 ppt-idc
Unit 1 ppt-idcUnit 1 ppt-idc
Unit 1 ppt-idc
hiya123jes
 
IOT on health waste management and its use on rat poison and bomb making
IOT on health waste management and its use on rat poison and bomb makingIOT on health waste management and its use on rat poison and bomb making
IOT on health waste management and its use on rat poison and bomb making
sunnymaxlord
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
HonKencyTress
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
prajapatidev644
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
Md Saylab
 
Computer networking
Computer networkingComputer networking
Computer networking
tdsparks3
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
lucita cabral
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
SankalpThaware
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
DR. Ram Kumar Pathak
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
What can you do with todays centralized wireless networks
What can you do with todays centralized wireless networksWhat can you do with todays centralized wireless networks
What can you do with todays centralized wireless networks
excitingip
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
Pak Cik Nan
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
Katyana Londono
 
Network devices
Network devicesNetwork devices
Network devices
NoorNawaz12
 
Ccna
CcnaCcna
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Network devices.pptx
Network devices.pptxNetwork devices.pptx
Network devices.pptx
AslamCh3
 
Computer network
Computer networkComputer network
Computer network
sana zaib
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 

Similar to Networking devices (20)

Unit 1 ppt-idc
Unit 1 ppt-idcUnit 1 ppt-idc
Unit 1 ppt-idc
 
IOT on health waste management and its use on rat poison and bomb making
IOT on health waste management and its use on rat poison and bomb makingIOT on health waste management and its use on rat poison and bomb making
IOT on health waste management and its use on rat poison and bomb making
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
What can you do with todays centralized wireless networks
What can you do with todays centralized wireless networksWhat can you do with todays centralized wireless networks
What can you do with todays centralized wireless networks
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
 
Network Built For Local Area Networks Essay
Network Built For Local Area Networks EssayNetwork Built For Local Area Networks Essay
Network Built For Local Area Networks Essay
 
Network devices
Network devicesNetwork devices
Network devices
 
Ccna
CcnaCcna
Ccna
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Network devices.pptx
Network devices.pptxNetwork devices.pptx
Network devices.pptx
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 

More from NetProtocol Xpert

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
NetProtocol Xpert
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
NetProtocol Xpert
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
NetProtocol Xpert
 
Storm-Control
Storm-ControlStorm-Control
Storm-Control
NetProtocol Xpert
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
NetProtocol Xpert
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
NetProtocol Xpert
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
NetProtocol Xpert
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
NetProtocol Xpert
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
NetProtocol Xpert
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
NetProtocol Xpert
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
NetProtocol Xpert
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
NetProtocol Xpert
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
NetProtocol Xpert
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
NetProtocol Xpert
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
NetProtocol Xpert
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
NetProtocol Xpert
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
NetProtocol Xpert
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
NetProtocol Xpert
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
NetProtocol Xpert
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
NetProtocol Xpert
 

More from NetProtocol Xpert (20)

Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
Common Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & MitigationCommon Layer 2 Threats, Attacks & Mitigation
Common Layer 2 Threats, Attacks & Mitigation
 
Storm-Control
Storm-ControlStorm-Control
Storm-Control
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
IP Source Guard
IP Source Guard IP Source Guard
IP Source Guard
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
 
Application & Data Center
Application & Data CenterApplication & Data Center
Application & Data Center
 
Cisco ISR 4351 Router
Cisco ISR 4351 RouterCisco ISR 4351 Router
Cisco ISR 4351 Router
 
Cisco ASR 1001-X Router
Cisco ASR 1001-X RouterCisco ASR 1001-X Router
Cisco ASR 1001-X Router
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Point to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAPPoint to-point protocol (ppp), PAP & CHAP
Point to-point protocol (ppp), PAP & CHAP
 
Avoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a commandAvoid DNS lookup when mistyping a command
Avoid DNS lookup when mistyping a command
 
TCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and SwitchesTCLSH and Macro Ping Test on Cisco Routers and Switches
TCLSH and Macro Ping Test on Cisco Routers and Switches
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)MTU (maximum transmission unit) & MRU (maximum receive unit)
MTU (maximum transmission unit) & MRU (maximum receive unit)
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
Cisco OTV 
Cisco OTV Cisco OTV 
Cisco OTV 
 
OTV(Overlay Transport Virtualization)
OTV(Overlay  Transport  Virtualization)OTV(Overlay  Transport  Virtualization)
OTV(Overlay Transport Virtualization)
 

Recently uploaded

ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 

Recently uploaded (20)

ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 

Networking devices

  • 1.
  • 2.  Network adapter is a device that enables a computer to talk with other computer/network. Using unique hardware addresses (MAC address) encoded on the card chip, the data-link protocol employs these addresses to discover other systems on the network so that it can transfer data to the right destination.  There are two types of network cards: wired and wireless. The wired NIC uses cables and connectors as a medium to transfer data, whereas in the wireless card, the connection is made using antenna that employs radio wave technology. All modern laptop computers incorporated wireless NIC in addition to the wired adapter.
  • 3. Network Card Speed  Network Interface card, one of the main computer network components, comes with different speeds, 10Mbps, 100Mbps, and 1000Mbps, so on. Recent standard network cards built with Gigabit (1000Mbps) connection speed. It also supports to connect slower speeds such as 10Mbps and 100Mbps. However, the speed of the card depends on your LAN speed.  For example, if you have a switch that supports up to 100Mbps, your NIC will also transfer a data with this same speed even though your computer NIC has still the capability to transfer data at 1000Mbps (1Gbps). In modern computers, network adapter is integrated with a computer motherboard. However if you want advanced and fast Ethernet card, you may buy and install on your computer using the PCI slot found on the motherboard (desktop) and ExpressCard slots on laptop .
  • 4.
  • 5.  Hub is a device that splits a network connection into multiple computers. It is like a distribution center. When a computer request information from a network or a specific computer, it sends the request to the hub through a cable. The hub will receive the request and transmit it to the entire network. Each computer in the network should then figure out whether the broadcast data is for them or not.  Currently Hubs are becoming obsolete and replaced by more advanced communication devices such as Switchs and Routers.
  • 6.
  • 7.  Switch is a telecommunication device grouped as one of computer network components. Switch is like a Hub but built in with advanced features. It uses physical device addresses in each incoming messages so that it can deliver the message to the right destination or port.  Like Hub, switch don’t broadcast the received message to entire network, rather before sending it checks to which system or port should the message be sent. In other words switch connects the source and destination directly which increases the speed of the network. Both switch and hub have common features: Multiple RJ-45 ports, power supply and connection lights.
  • 8.
  • 9.  When we talk about computer network components, the other device that used to connect a LAN with an internet connection is called Router. When you have two distinct networks (LANs) or want to share a single internet connection to multiple computers, we use a Router.  In most cases, recent routers also include a switch which in other words can be used as a switch. You don’t need to buy both switch and router, particularly if you are installing small business and home networks.  There are two types of Router: wired and wireless. The choice depends on your physical office/home setting, speed and cost.
  • 10.
  • 11.  A modem enables you to connect your computer to the available internet connection over the existing telephone line. Like NIC, Modem is not integrated with a computer motherboard. It comes as separate part which can be installed on the PCI slots found on motherboard.  A modem is not necessary for LAN, but required for internet connection such as dial-up and DSL.  There are some types of modems, which differs in speed and transmission rate. Standard PC modem or Dial-up modems (56Kb data transmission speed), Cellular modem (used in a laptop that enables to connect while on the go), cable modem (500 times faster than standard modem) and DSL Modems are the most popular.
  • 12.
  • 13.  Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.  A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.  Firewalls are often categorized as either network firewalls or host- based firewalls. Network firewalls are a software appliance running on general purpose hardware or hardware-based firewall computer appliances that filter traffic between two or more networks. Host-based firewalls provide a layer of software on one host that controls network traffic in and out of that single machine.  Firewall appliances may also offer other functionality to the internal network they protect such as acting as a DHCP or VPN server for that network.
  • 14.
  • 15.  Cisco IOS Intrusion Prevention System (IPS) is an inline, deep-packet inspection feature that effectively mitigates a wide range of network attacks. A component of the Cisco IOS Integrated Threat Control framework and complemented by Cisco IOS Flexible Packet Matching feature, Cisco IOS IPS provides your network with the intelligence to accurately identify, classify, and stop or block malicious traffic in real time.
  • 16. Benefits  Increased network availability -- Provides networkwide, distributed protection from many attacks, exploits, worms, and viruses  Faster remediation -- Pinpoints the source of network attacks faster and takes corrective actions closest to the attack  Deployment flexibility -- Offers inline inspection of traffic through any combination of the router's LAN and WAN interfaces with field-customizable worm and attack signature sets and event actions that adjust automatically based on risk level  Comprehensive threat protection -- Works with Cisco IOS Firewall, control-plane policing, and other Cisco IOS Software security features
  • 17.
  • 18.  It is a software/Hardware capable of authenticating and authorizing users and devices that are connected to a network.  It is a centralized based authentication process similar to the Cisco’sAAA/ACS  The model of deploying an ACS or ISE server in the network is said to be a part of Cisco’sTrust Sec Model
  • 19.
  • 20.  Get advanced threat defense, advanced malware protection, application visibility and control, insightful reporting, and secure mobility. The Cisco Web Security Appliance (WSA) combines all of these forms of protection and more in a single solution. The WSA also helps to secure and control web traffic, while simplifying deployment and reducing costs.  The Web Security Appliance gives you complete control over how your users access the Internet. By identifying hundreds of applications and more than 150,000 micro-applications, our appliance helps your administrators create highly granular policies.  Specific features and applications, such as chat, messaging, video, and audio can be:  Allowed  Restricted with time and bandwidth limits  Blocked according to your requirements  You no longer need to block entire websites.
  • 21.
  • 22.  Cisco Secure Access Control Server (ACS) is an access policy control platform that helps you comply with growing regulatory and corporate requirements. By integrating with your other access control systems, it helps improve productivity and contain costs. It supports multiple scenarios simultaneously, including:  Device administration: Authenticates administrators, authorizes commands, and provides an audit trail  Remote Access: Works with VPN and other remote network access devices to enforce access policies  Wireless: Authenticates and authorizes wireless users and hosts and enforces wireless-specific policies  Network admission control: Communicates with posture and audit servers to enforce admission control policies
  • 23.  NOTE: This product is no longer being sold and might not be supported.
  • 24. • Prior to wireless network, setting up a computer network in a business, home or school often required many cables in order to deliver network access to all of the network enable devices in the building. • With the creation of WAP, network users are now able to add devices that access the network with few or no cable. • A WAP normally connects directly to a wires Ethernet connection and the WAP then provides wireless connections using radio frequency for other devices to utilized that wired connection.
  • 25.
  • 26.  As the number of client using wireless infrastructure continues to increase, so does the need for continuous wireless coverage, wireless network uptime and centralized management and monitoring.  A WLAN controller is a hardware device that provides a single point of management for all of the access points in your network in a simplified manner.  Those access point connect to the WLAN controller, which then connect to your wireless network.  A WLAN controller communicates with the access points over any Ethernet or IP network using lightweight access point protocol (LWAPP), which lets you control several wireless access points at once.
  • 27.
  • 28.  A terminal server commonly provides out-of-band access for multiple devices. A terminal server is a router with multiple, low speed, asynchronous ports that are connected to other serial devices, for example, modems or console ports on routers or switches.  The terminal server allows you to use a single point to access the console ports of many devices. A terminal server eliminates the need to configure backup scenarios like modems on auxiliary ports for every device. You can also configure a single modem on the auxiliary port of the terminal server, to provide dial-up service to the other devices when network connectivity fails.
  • 29.
  • 30.  IP phone uses Voice over IP technologies for placing and transmitting telephone calls over an IP network, such as the Internet, instead of the traditional public switched telephone network