SlideShare a Scribd company logo
Study of Network Devices in Detail
1.Repeater:
Basic knowledge,Feature and Services:
>> A repeater is a device that operates only at the Physical layer.
>> A repeater can be used to increase the length of network by elemenating the effect
of attenuation on the signal.
>> It connects two segments of the same network, overcoming the distance
limitations of the transmission media.
>> A repeater forwards every frame; It has no filtering capability.
>> A repeater is a regenerator not an amplifier.
>>Repeaters can connect segments that have the same access method.
(CSMA/CD,Token Passing, Polling etc.)
2. Hub:
Basic knowledge,Feature and Services:
>> A hub is used as a central point of connection among media segments.
>> It works at Physical layer of the OSI model.
>> It cannot filter data. Data packets are sent to all connected devices and there is no
intelligence to find out the best path for data packet which then leads to inefficiencies
and wastage.
>> Cables from network devices plug in to the port on the hub.
>> Types of hubs :
Passive hub: A passive hub is just a connector. It connects wires coming from
different branches. The signal pass through a passive hub without regeneration
or amplification.
Active hub: They regenerate or amplify the signal before ther are
retransmitted. It is known as Multiport repeater also.
>> Hubs are used on a small networks where data transmission is not very high.
3. Switch:
Basic knowledge,Feature and Services:
>> A network switch is a computer networking devices that is used to connect
devices together on a computer network by performing a form of packet switching.
>> Types of Switch :
Two layer switch : It operates at Physical and data link layer. eg. Bridge.
Three layer switch : It operates at network layer. eg. Router.
>> It is considered more advanced than a hub because a switch will only send a
message to the device that need or requests it, rather than broadcasting the same
message out of its ports.
4. Bridge:
Basic knowledge,Feature and Services:
>> Operates in both the PHYSICAL and the data link layer.
>As a PHYSICAL layer device, it regenerates the signal it receives.
>As a data link layer device, the bridge can check the PHYSICAL/MAC
addresses (source and destination) contained in the frame.
>> Types of Bridges :
Transparent Bridge – Also called learning bridges. Build a table of MAC
addresses as frames arrive. Ethernet networks use transparent bridge.
Source Routing Bridge – Used in Token Ring networks. Each station should
determine the route to the destination when it wants to send a frame and
therefore include the route information in the header of frame. A Frame
contains not only the source and destination address but also the bridge
addresses.
>> A bridge has a table used in filtering decisions. It can check the destination
address of a frame and decide if the frame should be forwarded or dropped. If the
frame is to be forwarded, the decision must specify the port.
>> A bridge has a table that maps address to ports.
>> Limit or filter traffic keeping local traffic local yet allow connectivity to other
parts (segments).
5. Router:
Basic knowledge,Feature and Services:
>> Routes packets based on their logical addresses.(host-to-host addressing)
>> A router normally connects LANs and WANs in the Internet and has a routing
table that is used for making decision about the route.
>> Types of Routers:
There are several types of routers in the market. eg. Broadband Routers,Wireless
Routers, Brouters, Edge Router, Subscriber Edge Router, Inter-provider Border
Router, Core Router, Wired and Wireless Routers etc.
>> The routing tables are normally dynamic and are updated using routing protocols.
>> Provide sophisticated routing, flow control, and traffic isolation.
>> Configurable, which allows network manager to make policy based on routing
decisions.
6. Gate Way :
Basic knowledge,Feature and Services:
>> Connect two networks above the network layer of OSI model.
>> Are capable of converting data frames and network protocols into the format
needed by another network.
>> Types of Gateways :
Transport Gateway- Make a connection between two networks at the
transport layer.
Application Gateway- Connect two parts of an application in the application
layer. eg. Sending email between two machines using different mail formats.
Broadband-modem-router Gateway- It combines the functions of a DSL or
cable modem, a hub or switch, and a firewall. Broadband routers attempt to
combine all of the essential features of home networking in one integrated,
easy-to-use package. Differentiators for home "residential gateways" include
specific features, reliability, cost, speed, and vendor reputation.
>> Provide for translation services between different computer protocols.
Ans to the ques no: 04
Firewall: An entity that prevents a specific type of information from moving between
outside world (untrusted network) and inside world (trusted network).
Perform and process of Firewall:
Firewall can limit network exposure. It can prevent the dangers of the Internet from
spreading into a LAN (e.g. DdoS). It can keep one (more vulnerable) segment of a
LAN from another. A firewall can log Internet activity. Since all traffic passes
through the firewall, the firewall is a good place to collect information about system
and network use or misuse. Based on this view I will block the access of
FACEBOOK (https://www.facebook.com) under network in Bangladesh.
I will apply this Firewall at Gateway hardware which I described above.

More Related Content

What's hot

WLAN
WLANWLAN
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
Vipul Kumar Maurya
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Base Station System
Base Station SystemBase Station System
Base Station SystemSokunth Che
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
Harshit Gupta
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
Syed Ahmed Zaki
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
Hitesh Mohapatra
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
Md. Mashiur Rahman
 
Mobile ipv6
Mobile ipv6Mobile ipv6
Mobile ipv6
Paras Jha
 
Different types of network cables
Different types of network cablesDifferent types of network cables
Different types of network cables
PrabhakarPremUpreti
 
Dsss final
Dsss finalDsss final
Dsss final
AJAL A J
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
Maksudujjaman
 
Network topology
Network topologyNetwork topology
Network topology
Ashaduzzaman Kanon
 
WLAN
WLANWLAN
Lan network
Lan networkLan network
Lan network
claudiaviguri
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
Ram Dutt Shukla
 

What's hot (20)

WLAN
WLANWLAN
WLAN
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Base Station System
Base Station SystemBase Station System
Base Station System
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Mobile ipv6
Mobile ipv6Mobile ipv6
Mobile ipv6
 
Different types of network cables
Different types of network cablesDifferent types of network cables
Different types of network cables
 
Dsss final
Dsss finalDsss final
Dsss final
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Network topology
Network topologyNetwork topology
Network topology
 
WLAN
WLANWLAN
WLAN
 
Lan network
Lan networkLan network
Lan network
 
Long Term Evolution (LTE) -
Long Term Evolution (LTE) -Long Term Evolution (LTE) -
Long Term Evolution (LTE) -
 
Multicast Routing Protocols
Multicast Routing ProtocolsMulticast Routing Protocols
Multicast Routing Protocols
 

Similar to Study of Network Devices

Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
vinayh.vaghamshi _
 
Networks
Networks   Networks
Networks
pavishkumarsingh
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
Sweta Kumari Barnwal
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
Raj vardhan
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986sherifmeetme
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
Jyoti Akhter
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
EliasPetros
 
Networkswitch
Networkswitch Networkswitch
Networkswitch
Ravinder Kaur
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
kishorekommu kommu
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
SibenConor
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
AfsanaAkterRubi
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
Rahul P
 
NIM module 1 31122017.pdf
NIM module 1 31122017.pdfNIM module 1 31122017.pdf
NIM module 1 31122017.pdf
ADARSHN40
 
Data Communication Class Note
Data Communication Class NoteData Communication Class Note
Data Communication Class Note
Abul Kalam Robin
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
IT Tech
 
Network devices
Network devicesNetwork devices
Network devices
NoorNawaz12
 
Lan internetworking devices
Lan internetworking devicesLan internetworking devices
Lan internetworking devices
QAU ISLAMABAD,PAKISTAN
 

Similar to Study of Network Devices (20)

Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Networks
Networks   Networks
Networks
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
Computer Network Components
Computer Network  ComponentsComputer Network  Components
Computer Network Components
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Networkswitch
Networkswitch Networkswitch
Networkswitch
 
Network switch
Network switchNetwork switch
Network switch
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
Networking
NetworkingNetworking
Networking
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
NIM module 1 31122017.pdf
NIM module 1 31122017.pdfNIM module 1 31122017.pdf
NIM module 1 31122017.pdf
 
Data Communication Class Note
Data Communication Class NoteData Communication Class Note
Data Communication Class Note
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
 
Network devices
Network devicesNetwork devices
Network devices
 
Lan internetworking devices
Lan internetworking devicesLan internetworking devices
Lan internetworking devices
 

More from SM. Aurnob

Book Review : Hajar Bochor Dhore
Book Review : Hajar Bochor DhoreBook Review : Hajar Bochor Dhore
Book Review : Hajar Bochor Dhore
SM. Aurnob
 
Movie Review : 3 Idiots
Movie Review : 3 IdiotsMovie Review : 3 Idiots
Movie Review : 3 Idiots
SM. Aurnob
 
SQL Queries and Solutions (Database)
SQL Queries and Solutions (Database)SQL Queries and Solutions (Database)
SQL Queries and Solutions (Database)
SM. Aurnob
 
Gauss Elimination Method With Partial Pivoting
Gauss Elimination Method With Partial PivotingGauss Elimination Method With Partial Pivoting
Gauss Elimination Method With Partial Pivoting
SM. Aurnob
 
Digital Search Tree
Digital Search TreeDigital Search Tree
Digital Search Tree
SM. Aurnob
 
Social Media
Social MediaSocial Media
Social Media
SM. Aurnob
 
Privacy : The Right to be Forgotten
Privacy : The Right to be ForgottenPrivacy : The Right to be Forgotten
Privacy : The Right to be Forgotten
SM. Aurnob
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management system
SM. Aurnob
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management System
SM. Aurnob
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
SM. Aurnob
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management System
SM. Aurnob
 
Doctor Appointment Management System
Doctor Appointment Management SystemDoctor Appointment Management System
Doctor Appointment Management System
SM. Aurnob
 
Bus Ticket Management System
Bus Ticket Management SystemBus Ticket Management System
Bus Ticket Management System
SM. Aurnob
 
Blood Bank Management System
Blood Bank Management SystemBlood Bank Management System
Blood Bank Management System
SM. Aurnob
 
Bank Management System
Bank Management SystemBank Management System
Bank Management System
SM. Aurnob
 

More from SM. Aurnob (15)

Book Review : Hajar Bochor Dhore
Book Review : Hajar Bochor DhoreBook Review : Hajar Bochor Dhore
Book Review : Hajar Bochor Dhore
 
Movie Review : 3 Idiots
Movie Review : 3 IdiotsMovie Review : 3 Idiots
Movie Review : 3 Idiots
 
SQL Queries and Solutions (Database)
SQL Queries and Solutions (Database)SQL Queries and Solutions (Database)
SQL Queries and Solutions (Database)
 
Gauss Elimination Method With Partial Pivoting
Gauss Elimination Method With Partial PivotingGauss Elimination Method With Partial Pivoting
Gauss Elimination Method With Partial Pivoting
 
Digital Search Tree
Digital Search TreeDigital Search Tree
Digital Search Tree
 
Social Media
Social MediaSocial Media
Social Media
 
Privacy : The Right to be Forgotten
Privacy : The Right to be ForgottenPrivacy : The Right to be Forgotten
Privacy : The Right to be Forgotten
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management system
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management System
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management System
 
Doctor Appointment Management System
Doctor Appointment Management SystemDoctor Appointment Management System
Doctor Appointment Management System
 
Bus Ticket Management System
Bus Ticket Management SystemBus Ticket Management System
Bus Ticket Management System
 
Blood Bank Management System
Blood Bank Management SystemBlood Bank Management System
Blood Bank Management System
 
Bank Management System
Bank Management SystemBank Management System
Bank Management System
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Study of Network Devices

  • 1. Study of Network Devices in Detail 1.Repeater: Basic knowledge,Feature and Services: >> A repeater is a device that operates only at the Physical layer. >> A repeater can be used to increase the length of network by elemenating the effect of attenuation on the signal. >> It connects two segments of the same network, overcoming the distance limitations of the transmission media. >> A repeater forwards every frame; It has no filtering capability. >> A repeater is a regenerator not an amplifier. >>Repeaters can connect segments that have the same access method. (CSMA/CD,Token Passing, Polling etc.)
  • 2. 2. Hub: Basic knowledge,Feature and Services: >> A hub is used as a central point of connection among media segments. >> It works at Physical layer of the OSI model. >> It cannot filter data. Data packets are sent to all connected devices and there is no intelligence to find out the best path for data packet which then leads to inefficiencies and wastage. >> Cables from network devices plug in to the port on the hub. >> Types of hubs : Passive hub: A passive hub is just a connector. It connects wires coming from different branches. The signal pass through a passive hub without regeneration or amplification. Active hub: They regenerate or amplify the signal before ther are retransmitted. It is known as Multiport repeater also. >> Hubs are used on a small networks where data transmission is not very high.
  • 3. 3. Switch: Basic knowledge,Feature and Services: >> A network switch is a computer networking devices that is used to connect devices together on a computer network by performing a form of packet switching. >> Types of Switch : Two layer switch : It operates at Physical and data link layer. eg. Bridge. Three layer switch : It operates at network layer. eg. Router. >> It is considered more advanced than a hub because a switch will only send a message to the device that need or requests it, rather than broadcasting the same message out of its ports.
  • 4. 4. Bridge: Basic knowledge,Feature and Services: >> Operates in both the PHYSICAL and the data link layer. >As a PHYSICAL layer device, it regenerates the signal it receives. >As a data link layer device, the bridge can check the PHYSICAL/MAC addresses (source and destination) contained in the frame. >> Types of Bridges : Transparent Bridge – Also called learning bridges. Build a table of MAC addresses as frames arrive. Ethernet networks use transparent bridge. Source Routing Bridge – Used in Token Ring networks. Each station should determine the route to the destination when it wants to send a frame and therefore include the route information in the header of frame. A Frame contains not only the source and destination address but also the bridge addresses. >> A bridge has a table used in filtering decisions. It can check the destination address of a frame and decide if the frame should be forwarded or dropped. If the frame is to be forwarded, the decision must specify the port. >> A bridge has a table that maps address to ports. >> Limit or filter traffic keeping local traffic local yet allow connectivity to other parts (segments).
  • 5. 5. Router: Basic knowledge,Feature and Services: >> Routes packets based on their logical addresses.(host-to-host addressing) >> A router normally connects LANs and WANs in the Internet and has a routing table that is used for making decision about the route. >> Types of Routers: There are several types of routers in the market. eg. Broadband Routers,Wireless Routers, Brouters, Edge Router, Subscriber Edge Router, Inter-provider Border Router, Core Router, Wired and Wireless Routers etc. >> The routing tables are normally dynamic and are updated using routing protocols. >> Provide sophisticated routing, flow control, and traffic isolation. >> Configurable, which allows network manager to make policy based on routing decisions.
  • 6. 6. Gate Way : Basic knowledge,Feature and Services: >> Connect two networks above the network layer of OSI model. >> Are capable of converting data frames and network protocols into the format needed by another network. >> Types of Gateways : Transport Gateway- Make a connection between two networks at the transport layer. Application Gateway- Connect two parts of an application in the application layer. eg. Sending email between two machines using different mail formats. Broadband-modem-router Gateway- It combines the functions of a DSL or cable modem, a hub or switch, and a firewall. Broadband routers attempt to combine all of the essential features of home networking in one integrated, easy-to-use package. Differentiators for home "residential gateways" include specific features, reliability, cost, speed, and vendor reputation. >> Provide for translation services between different computer protocols.
  • 7. Ans to the ques no: 04 Firewall: An entity that prevents a specific type of information from moving between outside world (untrusted network) and inside world (trusted network). Perform and process of Firewall: Firewall can limit network exposure. It can prevent the dangers of the Internet from spreading into a LAN (e.g. DdoS). It can keep one (more vulnerable) segment of a LAN from another. A firewall can log Internet activity. Since all traffic passes through the firewall, the firewall is a good place to collect information about system and network use or misuse. Based on this view I will block the access of FACEBOOK (https://www.facebook.com) under network in Bangladesh. I will apply this Firewall at Gateway hardware which I described above.