0% found this document useful (0 votes)
10 views

Network devices

The document provides an overview of network devices, defining them as hardware or software essential for communication within a network. It categorizes various types of network devices such as repeaters, hubs, bridges, switches, routers, network interface cards, and firewalls, explaining their functions and roles in network management. Additionally, it describes the different types of each device and their operational layers in the OSI model.

Uploaded by

camosor399
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Network devices

The document provides an overview of network devices, defining them as hardware or software essential for communication within a network. It categorizes various types of network devices such as repeaters, hubs, bridges, switches, routers, network interface cards, and firewalls, explaining their functions and roles in network management. Additionally, it describes the different types of each device and their operational layers in the OSI model.

Uploaded by

camosor399
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Thursday, September 19, 2024 5:28 AM

Network Device Definition


A network device is a piece of hardware or software integral to communication between a computer and an internet network.

Types of Network Devices


Understanding the different types of network devices is important for optimizing and securing your organization’s network
infrastructure. Below, we provide a list of network device examples that form the foundation of effective network
management and communication:

• Repeater
• Hub
• Bridge
• Switch
• Routers
• Gateway
• Network Interface Card

Repeater
A digital signal can only travel so far down a cable until it degrades. This gradual weakening is referred to as attenuation rate. A repeater operating at the
OSI model’s physical layer (Layer 1) is a powered device that reenergizes the signal to keep traveling further. Dedicated repeaters are rarely used today, as
powered hubs, switches, and routers do the job of a repeater. However, repeaters are occasionally employed to extend the range of remote wireless access
points.

Hub
A network hub is an essential multiport device that connects multiple Ethernet devices into a single broadcast network segment, which makes them prone
to traffic congestion. There are three types of Hub:

Passive hub
Active hub
Intelligent hub
Let’s look at each of these:

Passive hub: No power source is needed to connect devices without amplification.


Active hub: This hub amplifies incoming signals before broadcasting and requires external power. Thus, it acts as a repeater.
Intelligent hub: Includes network management, monitoring, and diagnostic features.
Once widespread, hubs are now rarely used as switches have replaced them. Like repeaters, hubs operate at the OSI model’s physical layer (Layer 1).

Bridge
While a hub connects multiple devices, a network bridge connects two or more network segments and filters the traffic between them. Their role is to
isolate local segment traffic and reduce traffic congestion for better network performance. A local bridge connects two or more network segments within
the exact physical location or LAN. In contrast, a remote bridge connects network segments that are geographically separated, often over a WAN link.

Types of Bridges
There are two types of bridges:

Transparent bridges
Source bridges
Let’s look at each of these:

Transparent bridges build and maintain a MAC address table by examining incoming frames’ source addresses and making forwarding decisions by checking
the destination MAC address against this table.
Source bridges used a different approach and were commonly used with token ring networks, which are virtually obsolete. Bridges operate at the OSI
model’s data link layer (Layer 2). You will most likely never work with either type of bridge today

Switch
There are many different types of switches available today, such as:

Unmanaged switches
Managed switches
Smart switch
Layer 2 switch
Layer 3 switch
PoE switch
Gigabit switch
Rack-mounted switch
Desktop switch
Modular switch

Routers
The main job of a router is to direct traffic. Routers transfer packets to their destinations by charting a path through interconnected networking devices
using different network topologies. They are intelligent devices that store information about their connected networks. Routers commonly use access
control lists (ACLs) to filter traffic; some can even serve as packet-filtering firewalls.

Routers also divide internal networks into two or more subnetworks and can be connected internally to other routers, creating zones that operate
independently. Routers establish communication by maintaining tables about destinations and local connections. A router also contains information about
the routers they are connected to and uses this information to forward packets to any destination it doesn’t know about. Routers operate at the OSI
model’s network layer (Layer 3). There are two types of router:

Static Router
Dynamic Router
Let’s take a look at each of them.

Static Router
A static router uses manually configured routes to direct network traffic to ensure consistent, predefined data-pack paths without automatically adjusting
to network changes. They are ideal for smaller networks.

Dynamic Router
A dynamic router automatically communicates with other dynamic routers to modify its routing table based on real-time network conditions. It uses
dynamic routing protocols like OSPF, RIP, or BGP to exchange information about network topology and link states with other routers. These protocols
enable routers to discover optimal paths, adapt to network changes, and reroute traffic efficiently. Dynamic routers continuously update their routing
tables, allowing automatic failover and load balancing. They can quickly respond to network failures or congestion by finding alternative routes. This
flexibility makes them ideal for large, complex networks where manual configuration would be impractical

Network Interface Card


Any network-connected device includes a Network Interface Card (NIC). This card provides a dedicated connection between a computer and a network and
manages the data transmission and reception. It is referred to as a card, originally designed as an expansion card inserted into a slot in the motherboard.
Most NICs today are integrated directly into the motherboard. They come in various types, including:

Wired (e.g., Ethernet)


Wireless (e.g., Wi-Fi)
Fiber optic
NICs typically consist of several key components:

A controller for processing data


A port for cable or transceiver connection
A bus interface for connecting to the computer
A unique MAC address for identification on the network

Firewall
A firewall is a network security device that establishes a barrier between trusted internal networks and untrusted external networks. A firewall connects
multiple areas called zones, such as:

LAN
WAN
DMZ
Using assigned security policies, they filter traffic by examining data packets that flow between the different zones. The internet is, of course, the most
untrusted network of all. Firewalls can also be placed within the internal network to isolate internal departments that host sensitive data, such as HR or
Finance. Firewalls can be hardware-based, software-based, or a combination of both.

Firewalls may enforce blocklists (also known as deny lists) that allow all traffic but certain types. For more restrictive security, you can implement an
allowlist (also called an allow list) that blocks all traffic except what is specified. Several types of firewalls exist, and which one is right for you depends on
your operation. Some of the most common firewall types include:

Packet Filtering
Stateful Inspection
Next-Generation Firewall (NGFW)
Let’ elaborate on each of the three types for firewalls.

Packet filtering
Acts as a network layer checkpoint, analyzing data packets by IP address, packet type, port number, or network protocols

Stateful inspection
Analyzes data at network and transport layers, inspecting source IP, destination IP, source port, and destination port.

Next-Generation Firewall (NGFW)


This advanced network security device goes beyond traditional firewall capabilities and boasts multiple security features integrated into the product. Some
examples include deep packet inspection, intrusion prevention systems (IPS), application awareness and control, and advanced threat detection. NGFWs
may also use AI to combat sophisticated threats by examining the contents of packets and identifying applications and potential threats within the traffic.

You might also like