Networking Devices are units that mediate data in a computer network and are also called network equipment. Units which are the last receiver or generate data are called hosts or data terminal equipment. Some common devices are:
This device is placed at a network node and interfaces with another network that uses different protocols. It works on OSI layers 4 to 7.
A specialized network device that determines the next network point to which it can forward a data packet towards the ultimate destination of the packet. Unlike a gateway, it cannot interface different protocols. It works on OSI layer 3.
A device that allocates traffic from one network segment to certain lines (intended destination(s)) which connect the segment to another network segment. Unlike a hub, a switch splits the network traffic and sends it to different destinations rather than to all systems on the network. It works on OSI layer 2.
A device that connects multiple network segments along the data link layer. It works on OSI layer 2.
A device that connects multiple Ethernet segments, making them act as a single segment. When using a hub, every attached device shares the same broadcast domain and the same collision domain. Therefore, only one computer connected to the hub is able to transmit at a time. Depending on the network topology, the hub provides a basic level 1 OSI model connection among the network objects (workstations, servers, etc.). It provides bandwidth which is shared among all the objects, in contrast to switches, which provide a connection between individual nodes. It works on OSI layer 1.
A device which amplifies or regenerates digital signals received while sending them from one part of a network into another. It works on OSI layer 1.
Hybrid Network Devices
A hardware device that converts between two different types of transmission, such as asynchronous and synchronous transmissions.
Bridge Router (BRouter)
A device that combines router and bridge functionality and therefore works on OSI layers 2 and 3.
Hardware or Software Components that typically sit on the connection point of different networks, e.g. between an Internal Network and an External Network
A piece of hardware or software put on the network to prevent some communications forbidden by the network policy.
Network Address Translator (NAT)
Network service provided as hardware or software that converts internal to external network addresses and vice-versa.
Other hardware for establishing Networks or Dial-Up Connections
A device that combines several electrical signals into a single signal. Network interface controller: a device connecting the attached computer to a wire-based computer network.
Wireless network interface controller
A device connecting the attached computer to a radio-based computer network.
Device that modulates an analog “carrier” signal (such as sound) to encode digital information, and that also demodulates such a carrier signal to decode the transmitted information, such as a computer communicating with another computer over a telephone network.
ISDN Terminal Adapter (TA)
A specialized gateway for ISDN.
A device to increase transmission distance by amplifying the signal; used in base-band networks only.
Specialized Network Devices
A MultiLayer Switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
Layer 4-7 Switch, Web-Switch, Content-Switch
Some switches can use up to OSI layer 7 packet information; these may be called layer 4-7 switches, content-switches, content services switches, web-switches or application-switches.
Content switches are typically used for load balancing among groups of servers. Load balancing can be performed on HTTP, HTTPS, VPN, or any TCP/IP traffic using a specific port. Load balancing often involves destination network address translation so that the client of the load balanced service is not fully aware of which server is handling its requests.
IDS/IPS (Intrusion Detection System/Intrusion Prevention System)
An Intrusion Detection System (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, Trojan horses, and worms). An Intrusion Prevention System is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities.
In computing, load balancing distributes workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource. Using multiple components with load balancing instead of a single component may increase reliability through redundancy. Load balancing usually involves dedicated software or hardware, such as a multilayer switch or a Domain Name System server process.
DNS (Domain Name System) Server
A name server is a computer hardware or software server that implements a network service for providing responses to queries against a directory service. It translates an often humanly-meaningful, text-based identifier to a system-internal, often numeric identification or addressing component. This service is performed by the server in response to a service protocol request.
CSU/DSU (Channel Service Unit/Data Service Unit)
A CSU/DSU (Channel Service Unit/Data Service Unit) is a digital-interface device used to connect a Data Terminal Equipment device or DTE, such as a router, to a digital circuit, such as a T1 line. The CSU/DSU implements two different functions. The CSU is responsible for the connection to the telecom network while the DSU is responsible for handling the interface with the DTE. A CSU/DSU is the equivalent of the modem for an entire LAN.
A proxy server is a server that makes Internet connections on behalf of the client PCs. All the requests for Internet access that are made by a client on a network are executed by the proxy server. In other words, a proxy server acts as a point of contact between a private network and a public network such as the Internet.
Traffic shaping (also known as “packet shaping”) is a computer network traffic management technique which delays some or all datagrams to bring them into compliance with a desired traffic profile. Traffic shaping is a form of rate limiting.
Difference between a Network Switch & a Hub?
A switch is effectively a higher-performance alternative to a hub. People tend to benefit from a switch over a hub i their home network has four or more computers, or if they want to use their home network applications that generate significant amounts of network traffic, like multiplayer games or heavy music file sharing. In most cases, home networks will not notice an appreciable difference between a hub and a switch (hubs do cost slightly less).
Technically speaking, hubs operate using a broadcast model and switches operate using virtual circuit model. When four computers are connected to a hub, for example, and two of those computer communicate with each other, hubs simply pass through all network traffic to each of the four computers. Switches, on the other hand, are capable o determining the destination of each individual traffic element (such as an Ethernet frame) and selectively forwarding data to the one computer that actually needs it. By generating less network traffic in delivering messages, a switch performs better than a hub on busy networks.