Network devices
Network devices
• Repeater
• Hub
• Bridge
• Switch
• Routers
• Gateway
• Network Interface Card
Repeater
A digital signal can only travel so far down a cable until it degrades. This gradual weakening is referred to as attenuation rate. A repeater operating at the
OSI model’s physical layer (Layer 1) is a powered device that reenergizes the signal to keep traveling further. Dedicated repeaters are rarely used today, as
powered hubs, switches, and routers do the job of a repeater. However, repeaters are occasionally employed to extend the range of remote wireless access
points.
Hub
A network hub is an essential multiport device that connects multiple Ethernet devices into a single broadcast network segment, which makes them prone
to traffic congestion. There are three types of Hub:
Passive hub
Active hub
Intelligent hub
Let’s look at each of these:
Bridge
While a hub connects multiple devices, a network bridge connects two or more network segments and filters the traffic between them. Their role is to
isolate local segment traffic and reduce traffic congestion for better network performance. A local bridge connects two or more network segments within
the exact physical location or LAN. In contrast, a remote bridge connects network segments that are geographically separated, often over a WAN link.
Types of Bridges
There are two types of bridges:
Transparent bridges
Source bridges
Let’s look at each of these:
Transparent bridges build and maintain a MAC address table by examining incoming frames’ source addresses and making forwarding decisions by checking
the destination MAC address against this table.
Source bridges used a different approach and were commonly used with token ring networks, which are virtually obsolete. Bridges operate at the OSI
model’s data link layer (Layer 2). You will most likely never work with either type of bridge today
Switch
There are many different types of switches available today, such as:
Unmanaged switches
Managed switches
Smart switch
Layer 2 switch
Layer 3 switch
PoE switch
Gigabit switch
Rack-mounted switch
Desktop switch
Modular switch
Routers
The main job of a router is to direct traffic. Routers transfer packets to their destinations by charting a path through interconnected networking devices
using different network topologies. They are intelligent devices that store information about their connected networks. Routers commonly use access
control lists (ACLs) to filter traffic; some can even serve as packet-filtering firewalls.
Routers also divide internal networks into two or more subnetworks and can be connected internally to other routers, creating zones that operate
independently. Routers establish communication by maintaining tables about destinations and local connections. A router also contains information about
the routers they are connected to and uses this information to forward packets to any destination it doesn’t know about. Routers operate at the OSI
model’s network layer (Layer 3). There are two types of router:
Static Router
Dynamic Router
Let’s take a look at each of them.
Static Router
A static router uses manually configured routes to direct network traffic to ensure consistent, predefined data-pack paths without automatically adjusting
to network changes. They are ideal for smaller networks.
Dynamic Router
A dynamic router automatically communicates with other dynamic routers to modify its routing table based on real-time network conditions. It uses
dynamic routing protocols like OSPF, RIP, or BGP to exchange information about network topology and link states with other routers. These protocols
enable routers to discover optimal paths, adapt to network changes, and reroute traffic efficiently. Dynamic routers continuously update their routing
tables, allowing automatic failover and load balancing. They can quickly respond to network failures or congestion by finding alternative routes. This
flexibility makes them ideal for large, complex networks where manual configuration would be impractical
Firewall
A firewall is a network security device that establishes a barrier between trusted internal networks and untrusted external networks. A firewall connects
multiple areas called zones, such as:
LAN
WAN
DMZ
Using assigned security policies, they filter traffic by examining data packets that flow between the different zones. The internet is, of course, the most
untrusted network of all. Firewalls can also be placed within the internal network to isolate internal departments that host sensitive data, such as HR or
Finance. Firewalls can be hardware-based, software-based, or a combination of both.
Firewalls may enforce blocklists (also known as deny lists) that allow all traffic but certain types. For more restrictive security, you can implement an
allowlist (also called an allow list) that blocks all traffic except what is specified. Several types of firewalls exist, and which one is right for you depends on
your operation. Some of the most common firewall types include:
Packet Filtering
Stateful Inspection
Next-Generation Firewall (NGFW)
Let’ elaborate on each of the three types for firewalls.
Packet filtering
Acts as a network layer checkpoint, analyzing data packets by IP address, packet type, port number, or network protocols
Stateful inspection
Analyzes data at network and transport layers, inspecting source IP, destination IP, source port, and destination port.