LO 3-Administrating Network
LO 3-Administrating Network
Straight-through cable
Crossover cable
Rolled cable
Straight-through Cable
The network device is one kind of device used to connect devices or computers
together to transfer resources or files like fax machines or printers.
Hub
Switch
Router
Bridge
Gateway
Modem
Repeater
Access Point
HUB
A network hub is a node that broadcasts data to every computer or Ethernet-
based device connected to it.
A hub is less sophisticated than a switch, the latter of which can isolate data
transmissions to specific devices.
Network hubs are best suited for small, simple local area network (LAN)
environments.
Passive
Active
Intelligent network.
Switch
Just like a hub and a bridge, a switch is also used to connect multiple devices in a
LAN segment. A switch is the upgraded version of the bridge.
To forward data packets to their destination, the router keeps a record of the
connected network.
The main functions of routers are the following: -
A bridge is used to divide a large network into smaller segments. The basic functions
of a bridge are the following: -
A bridge can connect two different types of media or network architecture, but it
cannot connect two different types of network layer protocols such as TCP/IP or IPX.
It requires the same network-layer protocols across all segments.
There are three types of bridge:-
Local Bridge
Remote Bridge
Wireless Bridge
Gateway
Gateway is used to forward packets that originate from a local host or a local network
and are intended for remote networks.
Modem
Depending on the size of the network, one or more WAPs may be required.
Additional WAPs are used to allow access to more wireless clients and to
expand the range of the wireless network.
Transceivers
transceiver = transmitter and a receiver
device that receives data, converts it, and then sends it to another
location
Rradio frequency transceivers, fiber-optic transceivers, Ethernet
transceivers, are examples
Firewall
The most common type is used to protect a computer or an entire network from
unauthorized access from the Internet.
Firewalls can be programmed to filter data packets based on the information that is
contained in the packets.