A network is a group of computers, servers and mainframes that are connected to each other to enable data sharing. Here are some common network devices.

Bridge A network bridge connects two networks that use the same protocol and allows them to function as one network. Bridges are often used with local areas networks (LANs), which allow them to reach larger areas. Bridges are not only used for expanding coverage, but they also allow you to break down larger networks into smaller segments. This is done by the bridge, which places itself between two parts of two networks and controls the flow of data. It can also block data flow. There are three types: Transparent Bridge: The transparent bridge is invisible to all other devices. It forwards or blocks data only according to the protocol.

Translational bridge: This device allows for conversion. It can convert data formats from one network to the next and connects two networks.

Source Route Bridge: The device is placed in the packet’s path through the network. It is most commonly used in Token-ring networks, although it is not often used. Source-route Bridge–Source-route Bridges were created for Token Ring Networks by IBM. Source-route bridge is named because the entire route for the frame is embedded within each frame. This allows bridges to make precise decisions about how frames should be transmitted through the network.

Token Ring has been declining in popularity so your chances of working with a source bridge bridge are slim.

A router connects multiple computer networks via either wired or wireless connections. It connects a network to transmit data. Only authorized computers can connect to routers. The majority of routers can keep log files about local network activity.

A digital subscriber-line (DSL), modem allows the computer connect to the Internet using an Internet Service Provider. DSL allows for a significantly higher Internet speed than a dial-up connection.

A switch allows you to connect multiple computers together. Many Ethernet ports can be connected to switches, such as computers, DSL modems or cables. Rack mounted switches are more common for high-end switches with over 50 ports.

Switches have the ability to limit traffic between ports so that each device connected can receive sufficient bandwidth. But switches are not capable of providing firewall and log capabilities.

Network Interface Cards (NICs), which are hardware devices, connect a computer to a network. These devices are placed on the motherboard and have the ability to establish a physical link between the network’s computer and it. Network Interface cards converts computer data to electrical signals for transmission to the network.

While wired NICs use connectors and cables as a means to transfer data, wireless cards use an antenna that employs radiowave technology. Modern laptops have a wireless NIC as well as a wired adapter.

The Network Interface Card is one of the key components of a computer network. It can connect to speeds as high as 10Mbps, 100Mbps or 1000Mbps. Standard network cards can be connected at Gigabit speeds (1000Mbps). It supports connections at speeds of 10Mbps and 100Mbps. The speed of your LAN will determine the speed of your card.

The hub is the most basic network device. It connects multiple network devices or computers to form one network segment, allowing computers to communicate directly. You can connect up to three network devices using the multiple Ethernet ports. Each computer connected to the hub is capable of communicating with all other devices that are connected to its Ethernet ports. There are three basic types: Passive hubs: These hubs do not need power, so they cannot regenerate or process data. It shares only physical media.

Active hub: It is powered by electricity and can therefore regenerate data before it is retransmitted. In the event of disturbance, it also strengthens signals.

Intelligent hub: An intelligence hub is an active hub. It can be stacked and joined to multiple hubs to increase the number of ports. They can run diagnostics and are useful for troubleshooting. It can also be remotely managed.

Author

  • katebailey

    Kate Bailey is a 27-year-old educational blogger and volunteer and student. She is interested in educating others on various topics, and is passionate about helping others achieve their goals. She believes that education is the key to success, and hopes to share her knowledge with as many people as possible.

Related Posts