Network Devices
Network Devices
Network devices, also known as networking hardware, are physical devices that allow hardware
on a computer network to communicate and interact with one another. For example NIC, Modem,
RJ-45, Repeater, Hub, Bridge, Switch, Routers, Gateway etc.
Physical layer--NIC , RJ45n , Modem , Repeater
Data link—Hub , Bridge ,Switch
Network layer layer—Router, Gateway
NIC- Network Interface Card (NIC) is a hardware component that is present on the computer. It is used
to connect different networking devices such as computers and servers to share data over the connected
network. It provides functionality such as support for I/O interrupt, Direct Memory Access (DMA) interfaces,
partitioning, and data transmission.
NIC is important for us to establish a wired or wireless connection over the network.
Network Interface Card is also known as Network Interface Controller, Network Adapter, Ethernet card,
Connection card, and LAN (Local Area Network) Adapter.
Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over the
same network before the signal becomes too weak or corrupted to extend the length to which the
signal can be transmitted over the same network. An important point to be noted about repeaters
is that they do not amplify the signal. When the signal becomes weak, they copy it bit by bit and
regenerate it at its star topology connectors connecting if original strength. It is a 2-port device.
A repeater is a dynamic network device used to reproduce the signals when they transmit over a greater
distance so that the signal’s strength remains equal. It can be used to create an Ethernet network. A repeater
that occurs as the first layer of the OSI layer is the physical layer.
Features of Repeaters
These repeaters are linked to each other at the physical layer.
It sends the signals for the unsteady areas to enlarge the system signals.
These receptors linked the various network signals to convert the data between the two devices.
These repeaters can eliminate the distance between the two devices.
The repeaters can frequently monitor the signals that are created between the two LANs.
Repeaters can support dynamic networking.
Multi-site connection solutions provide the 30 repeaters linked to it.
The IP network links all the repeaters with an IP site relation network.
This IP network can support a fast response to any issue in the repeater network.
These receptors can support 100 % digital communication so that they do not require to wait for analog voice
calls.
Advantages of Repeater
The main advantages of repeaters are −
The signals get weaker as they transit to greater distances. The repeater provides the stability of the signals.
These repeaters are cost-effective and easy to use.
The repeaters don’t influence network performance.
It is not all signals that can be linked using physical media.
These repeaters can retransmit the information and powerful the weak signals.
Disadvantage of Repeaters
The main disadvantages of repeaters are −
They cannot connect two distinct networks.
While amplifying the signals, the repeaters also amplify the level of noise in those signals.
If we enhance the extent of the web by only using the repeaters. In that case, the signal propagation time will
grow to a considerable level, and the network’s performance will collapse.
Hub – A hub is a basically multi-port repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different stations.
Hubs cannot filter data, so data packets are sent to all connected devices. In other words,
the collision domain of all hosts connected through Hub remains one. Also, they do not have the
intelligence to find out the best path for data packets which leads to inefficiencies and wastage.
Features of Hubs
A hub operates in the physical layer of the OSI model.
A hub cannot filter data. It is a non-intelligent network device that sends message to all ports.
It primarily broadcasts messages. So, the collision domain of all nodes connected through the hub stays
one.
Transmission mode is half duplex.
Collisions may occurs during setup of transmission when more than one computers place data
simultaneously in the corresponding ports.
Since they lack intelligence to compute best path for transmission of data packets, inefficiencies and
wastage occur.
They are passive devices, they don’t have any software associated with it.
They generally have fewer ports of 4/12.
Types of Hubs
Initially, hubs were passive devices. However, with development of advanced technology, active hubs and
intelligent hubs came into use.
Passive Hubs − Passive hubs connects nodes in a star configuration by collecting wiring from nodes.
They broadcast signals onto the network without amplifying or regenerating them. As they cannot extend
the distance between nodes, they limit the size of the LAN.
Active Hubs − Active hubs amplify and regenerate the incoming electrical signals before broadcasting
them. They have their own power supply and serves both as a repeater as well as connecting centre.
Due to their regenerating capabilities, they can extend the maximum distance between nodes, thus
increasing the size of LAN.
Intelligent Hubs − Intelligent hubs are active hubs that provide additional network management
facilities. They can perform a variety of functions of more intelligent network devices like network
management, switching, providing flexible data rates etc.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of the source and destination. It is
also used for interconnecting two LANs working on the same protocol. It has a single input and
single output port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are completely unaware of
the bridge’s existence i.e. whether or not a bridge is added or deleted from the network,
reconfiguration of the stations is unnecessary. These bridges make use of two processes i.e.
bridge forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is performed by the source
station and the frame specifies which route to follow. The host can discover the frame by
sending a special frame called the discovery frame, which spreads through the entire network
using all possible paths to the destination.
A bridge in a computer network is a device used to connect multiple LANs together with a larger
Local Area Network (LAN). The mechanism of network aggregation is known as bridging. The bridge
is a physical or hardware device but operates at the OSI model’s data link layer and is also known
as a layer of two switches.
The primary responsibility of a switch is to examine the incoming traffic and determine whether to
filter or forward it. Basically, a bridge in computer networks is used to divide network connections
into sections, now each section has separate bandwidth and a separate collision domain. Here
bridge is used to improve network performance.
Types of Bridges:
There are three types of bridges in computer networks, which are as follows:
1. Transparent bridge
2. Source routing bridge
3. Translational bridge
Transparent Bridge:
Transparent bridges are invisible to other devices on the network. This bridge doesn’t reconfigure
the network on the addition or deletion of any station. The prime function of the transparent bridge
is to block or forward the data according to the MAC address.
Advantages:
Bridges can be used as a network extension like they can connect two network topologies
together.
It has a separate collision domain, which results in increased bandwidth.
It can create a buffer when different MAC protocols are there for different segments.
Highly reliable and maintainable. The network can be divided into multiple LAN segments.
Simple installation, no requirement of any extra hardware or software except the bridge itself.
Protocol transparency is higher as compared to other protocols.
Disadvantages:
Expensive as compared to hubs and repeaters.
Slow in speed.
Poor performance as additional processing is required to view the MAC address of the device
on the network.
As the traffic received is in bulk or is broadcasted traffic, individual filtering of data is not
possible.
During the broadcasting of data, the network has high broadcast traffic and broadcast storms
can be formed.
Uses of Bridge in Computer Network:
Bridges are used to increase the network capacity as they can integrate multiple LANs together.
On receiving a data frame, databases use the bridge to decide whether to accept or reject the
data.
In the OSI model, it can be used to transmit the data to multiple nodes of the network.
Used to broadcast the data even if the MAC address or destination address is unavailable.
It forwards data packets despite faulty nodes.
The data packet can be forwarded or discarded by the bridge when the MAC address is
available.
Functions of Bridges in the Network
The bridge is used to divide LANs into multiple segments.
To control the traffic in the network.
It can interconnect two LANs with a similar protocols.
It can filter the data based on destination/MAC address.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost its
efficiency(a large number of ports imply less traffic) and performance. A switch is a data link layer
device. The switch can perform error checking before forwarding data, which makes it very
efficient as it does not forward packets that have errors and forward good packets selectively to
the correct port only. In other words, the switch divides the collision domain of hosts, but
the broadcast domain remains the same.
Switches refer to the networking devices that operate at an OSI model’s layer 2 or data link layer. They establish
connections between networked devices and employ packet switching to transmit, receive, or forward data packets or
frames over the network.
There are numerous ports on a switch where computers can be connected. A network switch evaluates the destination
address of each data frame that enters one of its ports, runs any necessary checks, and then sends the frame to the
appropriate device(s). It enables broadcast, multicast, and unicast communications.
Features of Switches
Switches function in the OSI model’s layer 2 or data connection layer.
It is a smart network appliance that resembles a multiport network bridge.
The media access control (MAC) sublayer addresses are used to transport data packets to certain target ports.
To accept and transmit data packets from the source device to the target device, it employs packet switching
technology.
It allows one-to-one (unicast), one-to-many (multicast), and one-to-all (broadcast) communications.
Full duplex transmission means that communication in the channel happens in both directions at once. As a
result, collisions do not happen.
Switches are operational hardware that has network management and software capabilities.
Switches have the ability to carry out some error checking before sending data to the target port.
There are a total of 24/48 ports, which is more than usual.
Types of Switches
There are several switches that fall into one of the following four categories:
Unmanaged Switch
These affordable switches are frequently used in small enterprises and household networks. They are easy to set up,
and once connected to the network, they are ready to use right away. This plug-and-play approach makes it easy to add
more switches when new devices need to be added. Since they don’t need to be configured or monitored, they are
referred to as “unmanaged.”
Managed Switch
Since the managed switches can be tailored to add functionality to a regular switch, these expensive switches are used
in organisations with large and complicated networks. The added features could include QoS (Quality of Service)
enhancements, including more precise control, stronger security standards, and total network administration. They are
valued in expanding organisations despite their expense because of their scalability and adaptability. Switches that are
monitored are configured using the Simple Network Management Protocol (SNMP).
LAN Switch
Devices connected to a company’s internal LAN are connected by LAN switches. They are also known as data switches
or Ethernet switches. These switches are very useful for easing network bottlenecks or congestion. They do this in a
way that prevents data packets in a network from overlapping.
PoE Switch
In PoE Gigabit Ethernets, Power over Ethernet (PoE) switches are used. Devices linked to it can receive both energy
and data over the same line due to PoE technology, which combines data and power communication over the same
connection. PoE switches provide more flexibility and make cable hookups easier.
5. Routers – A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network Layer device. Routers normally connect LANs and
WANs and have a dynamically updating routing table based on which they make decisions on
routing the data packets. The router divides the broadcast domains of hosts connected through it.
The router is a physical or virtual internetworking device that is designed to receive, analyze, and forward
data packets between computer networks. A router examines a destination IP address of a given data packet,
and it uses the headers and forwarding tables to decide the best way to transfer the packets. There are some
popular companies that develop routers; such are Cisco, 3Com, HP, Juniper, D-Link, Nortel, etc. Some
important points of routers are given below:
o A router is used in LAN (Local Area Network) and WAN (Wide Area Network) environments. For
example, it is used in offices for connectivity, and you can also establish the connection between
distant networks such as from Bhopal to
o It shares information with other routers in networking.
o It uses the routing protocol to transfer the data across a network.
o Furthermore, it is more expensive than other networking devices like switches and hubs.
A router works on the third layer of the OSI model, and it is based on the IP address of a computer. It uses
protocols such as ICMP to communicate between two or more networks. It is also known as an intelligent
device as it can calculate the best route to pass the network packets from source to the destination
automatically.
A virtual router is a software function or software-based framework that performs the same functions as a
physical router. It may be used to increase the reliability of the network by virtual router redundancy protocol,
which is done by configuring a virtual router as a default gateway. A virtual router runs on commodity servers,
and it is packaged with alone or other network functions, like load balancing, firewall packet filtering, and wide
area network optimization capabilities.
Features of Router
o A router works on the 3rd layer (Network Layer) of the OSI model, and it is able to communicate with
its adjacent devices with the help of IP addresses and subnet.
o A router provides high-speed internet connectivity with the different types of ports like gigabit, fast-
Ethernet, and STM link port.
o It allows the users to configure the port as per their requirements in the network.
o Routers' main components are central processing unit (CPU), flash memory, RAM, Non-Volatile RAM,
console, network, and interface card.
o Routers are capable of routing the traffic in a large networking system by considering the sub-network
as an intact network.
o Routers filter out the unwanted interference, as well as carry out the data encapsulation and
decapsulation process.
o Routers provide the redundancy as it always works in master and slave mode.
o It allows the users to connect several LAN and WAN.
o Furthermore, a router creates various paths to forward the data.
Applications of Routers
There are various areas where a router is used:
o Routers are used to connect hardware equipment with remote location networks like BSC, MGW, IN,
SGSN, and other servers.
o It provides support for a fast rate of data transmission because it uses high STM links for connectivity;
that's why it is used in both wired or wireless communication.
o Internet service providers widely use routers to send the data from source to destination in the form of
e-mail, a web page, image, voice, or a video file. Furthermore, it can send data all over the world with
the help of an IP address of the destination.
o Routers offer access restrictions. It can be configured in a way that allows for few users to access the
overall data and allows others to access the few data only, which is defined for them.
o Routers are also used by software testers for WAN communications. For example, the software
manager of an organization is located in Agra, and its executive is located at a different place like Pune
or Bangalore. Then the router provides the executive the method to share his software tools and other
applications with the manager with the help of routers by connecting their PCs to the router using WAN
architecture.
o In wireless networks, by configuring VPN in routers, it can be used in the client-server model, which
allows sharing the internet, video, data, voice, and hardware resources. As shown in the below picture:
o In modern times, routers have the facility of inbuilt USB ports within the hardware. They have enough
internal storage capacity. External storage devices can be used with routers to store and share data.
o Routers are used to set up the operation and maintenance center of an organization, which is known
as the NOC center. All equipment at a distant location are connected by routers on optical cable at a
central location, which also offer redundancy through the main link and protection link topology.
Types of Routers
There are various types of routers in networking; such are given below:
1. Wireless Router: Wireless routers are used to offer Wi-Fi connectivity to laptops, smartphones, and other
devices with Wi-Fi network capabilities, and it can also provide standard ethernet routing for a small number
of wired network systems.
Wireless routers are capable of generating a wireless signal in your home or office, and it allows the computers
to connect with routers within a range, and use the internet. If the connection is indoors, the range of the
wireless router is about 150 feet, and when the connection is outdoors, then its range is up to 300 feet.
Furthermore, you can make more secure wireless routers with a password or get your IP address. Thereafter,
you can log in to your router by using a user ID and password that will come with your router.
2. Brouter: A brouter is a combination of the bridge and a router. It allows transferring the data between
networks like a bridge. And like a router, it can also route the data within a network to the individual systems.
Thus, it combines these two functions of bridge and router by routing some incoming data to the correct
systems while transferring the other data to another network.
3. Core router: A core router is a type of router that can route the data within a network, but it is not able to
route the data between the networks. It is a computer communication system device and the backbone of
networks, as it helps to link all network devices. It is used by internet service providers (ISPs), and it also
provides various types of fast and powerful data communication interfaces.
4. Edge router: An edge router is a lower-capacity device that is placed at the boundary of a network. It allows
an internal network to connect with the external networks. It is also called as an access router. It uses an
External BGP (Border Gateway Protocol) to provides connectivity with remote networks over the internet.
The label edge router is used in the boundary of Multiprotocol Label Switching (MPLS) networks. It acts as a
gateway between the LAN, WAN, or the internet.
5. Broadband routers: Broadband routers are mainly used to provide high-speed internet access to
computers. It is needed when you connect to the internet through phone and use voice over IP technology
(VOIP).
All broadband routers have the option of three or four Ethernet ports for connecting the laptop and desktop
systems. A broadband router is configured and provided by the internet service provider (ISP). It is also known
as a broadband modem, asymmetric digital subscriber line (ADSL), or digital subscriber line (DSL) modem.
Gateway – A gateway, as the name suggests, is a passage to connect two networks that may
work upon different networking models. They work as messenger agents that take data from one
system, interpret it, and transfer it to another system. Gateways are also called protocol
converters and can operate at any network layer. Gateways are generally more complex than
switches or routers. A gateway is also called a protocol converter.
Gateway in networking definition: A gateway is a connecting device (node) that can connect two
networks that employ different transmission protocols.
In simpler terms, a gateway in networking is a network node that acts as an entry point to another network.
A gateway in networking can be considered the most intelligent device among various network connecting
devices. Intelligent in terms of operation, transmission speed, error control, data packet routing, etc. It is
made up of both hardware and software components.
The gateway acts as a portal between two applications via protocol communications, allowing them to share
data on the same or other systems. Hence, a gateway is also a protocol converter that can operate at
any OSI model layer.
Based on the direction of data flow, the gateway can be classified into two categories, such as:
Unidirectional gateways: These gateways allow data to flow in only one direction.
Bidirectional gateways: These gateways allow data to flow in both directions.
Based on functionalities, the gateway can be classified under various categories, such as:
Network gateway: Provides interface between two dissimilar networks operating with different protocols
Cloud storage gateway: Translates storage requests with different cloud storage service API calls, such
as SOAP, REST, etc.
IoT gateway: Collects sensor data from IoT devices and performs translation between different sensor
protocols before sending it to the cloud network.
Internet-To-Orbit gateway: Connects devices on the Internet to satellites and spacecraft orbiting the
earth
API Gateways: Oversees traffic streaming into and out of service or XML-based web service
Features of a gateway
Gateway in computer network has a lot of different features. Let’s explore some of the key features of a
gateway:
Better visibility: Network gateways are positioned at network boundaries, providing unparalleled visibility
into traffic passing through the boundaries.
Collects information: A network gateway gathers data from other sections of the network to aid in
diagnostics and troubleshooting.
Better security: The location of network gateways at the network boundary provides them with the
necessary control for security and serves as an important site for firewalls and security software.
Provides multi-protocol support: Gateways are often built to accommodate a variety of protocols
(protocol translation) to make the transmission of data between different networks using different network
protocols easier.
The main function of a router is routing the The main function of a gateway is to
3. traffic from one network to the other. translate one protocol to the other.
A router operates on layer 3 and layer 4 of A gateway operates upto layer 5 of the
4. the OSI model. OSI model.