SlideShare a Scribd company logo
Networking Devices
Networking Devices are units that mediate data in a computer network and are also called network
equipment. Units which are the last receiver or generate data are called hosts or data terminal
equipment. Devices are:
1. Gateway: this device is placed at a network node and interfaces with another network that
uses different protocols. It works on OSI layers 4 to 7.
2. Router: a specialized network device that determines the
next network point to which it can forward a data packet
towards the ultimate destination of the packet. Unlike a
gateway, it cannot interface different protocols. It works on
OSI layer 3.
3. Switch: a device that allocates traffic from one network
segment to certain lines (intended destination(s)) which
connect the segment to another network segment. Unlike a
hub, a switch splits the network traffic and sends it to
different destinations rather than to all systems on the
network. It works on OSI layer 2.
Figure 1 Gateway
Figure 2 Router
Figure 3 Switch
Networking Devices
4. Bridge: a device that connects multiple network segments along the data link layer. It works on
OSI layer 2.
5. Hub: a device that connects multiple Ethernet segments, making them acts as a single segment.
When using a hub, every attached device shares the same broadcast domain and the same
collision domain. Therefore, only one computer connected to the hub is able to transmit at a
time. Depending on the network topology, the hub provides a basic level 1 OSI model connection
among the network objects (workstations, servers, etc.). It provides bandwidth which is shared
among all the objects, in contrast to switches, which provide a connection between individual
nodes. It works on OSI layer 1.
6. Repeater: a device which amplifies or regenerates digital
signals received while sending them from one part of a network
into another. It works on OSI layer 1.
Some Hybrid Network Devices:
1. Protocol Converter: a hardware device that converts between two different types of
transmission, such as asynchronous and synchronous transmissions.
2. Bridge Router (BRouter): a device that combines router and bridge functionality and
therefore works on OSI layers 2 and 3.
Figure 4 Bridge
Figure 5 Repeater
Networking Devices
Hardware or software components that typically sit on the connection point
of different networks, e.g. between an internal network and an external
network:
1. Proxy Server: A proxy server is a server that makes Internet connections on behalf of the client
PCs. All the requests for Internet access that are made by a client on a network are executed by
the proxy server. In other words, a proxy server acts as a point of contact between a private
network and a public network such as the Internet.
2. Firewall: a piece of hardware or software put on the network to prevent some communications
forbidden by the network policy.
3. Network Address Translator (NAT): network service provided as hardware or software
that converts internal to external network addresses and vice versa.
Other hardware for establishing networks or dial-up connections:
1. Multiplexer: a device that combines several electrical signals into a single signal.
2. Network Interface Controller: a device connecting the attached computer to a wire-based
computer network.
3. Wireless Network Interface Controller: a device connecting the attached computer to a
radio-based computer network.
4. Modem: device that modulates an analog "carrier" signal (such as sound) to encode digital
information, and that also demodulates such a carrier signal to decode the transmitted
information, such as a computer communicating with another computer over a telephone
network.
5. ISDN Terminal Adapter (TA): a specialized gateway for ISDN.
6. Line Driver: A device to increase transmission distance by amplifying the signal; used in base-
band networks only.
Networking Devices
Specialized Network Devices:
1. Multilayer Switch: A multilayer switch (MLS) is a computer networking device that switches
on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.
2. Layer 4-7 Switch, Web-Switch, Content-Switch: Some switches can use up to OSI layer 7
packet information; these may be called layer 4-7 switches, content-switches, content services
switches, web-switches or application-switches.
Content switches are typically used for load balancing among groups of servers. Load balancing
can be performed on HTTP, HTTPS, VPN, or any TCP/IP traffic using a specific port. Load
balancing often involves destination network address translation so that the client of the load
balanced service is not fully aware of which server is handling its requests.
3. IDS/IPS (Intrusion Detection System/Intrusion Prevention System): An Intrusion
Detection System (IDS) is software and/or hardware designed to detect unwanted attempts at
accessing, manipulating, and/or disabling of computer systems, mainly through a network, such
as the Internet. An intrusion detection system is used to detect several types of malicious
behaviors that can compromise the security and trust of a computer system. This includes
network attacks against vulnerable services, data driven attacks on applications, host based
attacks such as privilege escalation, unauthorized logins and access to sensitive files, and
malware (viruses, Trojan horses, and worms). An Intrusion Prevention System is a network
security device that monitors network and/or system activities for malicious or unwanted
behavior and can react, in real-time, to block or prevent those activities.
4. Load Balancer: In computing, load balancing distributes workloads across multiple computing
resources, such as computers, a computer cluster, network links, central processing units or disk
drives. Load balancing aims to optimize resource use, maximize throughput, minimize response
time, and avoid overload of any single resource. Using multiple components with load balancing
instead of a single component may increase reliability through redundancy. Load balancing
usually involves dedicated software or hardware, such as a multilayer switch or a Domain Name
System server process.
5. DNS (Domain Name System) Server: A name server is a computer hardware or software
server that implements a network service for providing responses to queries against a directory
service. It translates an often humanly-meaningful, text-based identifier to a system-internal,
often numeric identification or addressing component. This service is performed by the server in
response to a service protocol request.
Networking Devices
6. CSU/DSU (Channel Service Unit/Data Service Unit): A CSU/DSU (Channel Service
Unit/Data Service Unit) is a digital-interface device used to connect a Data Terminal Equipment
device or DTE, such as a router, to a digital circuit, such as a T1 line. The CSU/DSU implements
two different functions. The CSU is responsible for the connection to the telecom network while
the DSU is responsible for handling the interface with the DTE. A CSU/DSU is the equivalent of
the modem for an entire LAN.
7. Bandwidth Shaper: Traffic shaping (also known as "packet shaping") is a computer network
traffic management technique which delays some or all datagrams to bring them into
compliance with a desired traffic profile. Traffic shaping is a form of rate limiting.
Differences between a Network Switch & a Hub?
A switch is effectively a higher-performance alternative to a hub. People tend to benefit from a switch
over a hub i their home network has four or more computers, or if they want to use their home network
applications that generate significant amounts of network traffic, like multiplayer games or heavy music
file sharing. In most cases, home networkers will not notice an appreciable difference between a hub
and a switch (hubs do cost slightly less).
Technically speaking, hubs operate using a broadcast model and switches operate using virtual circuit
model. When four computers are connected to a hub, for example, and two of those computers
communicate with each other, hubs simply pass through all network traffic to each of the four
computers. Switches, on the other hand, are capable o determining the destination of each individual
traffic element (such as an Ethernet frame) and selectively forwarding data to the one computer that
actually needs it. By generating less network traffic in delivering messages, a switch performs better
than a hub on busy networks.
Figure 6 Channel Service Unit/Data Service Unit

More Related Content

PPT
Networking devices(siddique)
PPTX
Networking devices
PPSX
Networking Devices and Networking Topologies
PPT
Network Devices
PPTX
Computer networking devices
DOC
Terminologies used with networking
DOC
Hubs vs switches vs routers
Networking devices(siddique)
Networking devices
Networking Devices and Networking Topologies
Network Devices
Computer networking devices
Terminologies used with networking
Hubs vs switches vs routers

What's hot (20)

PPT
Networking Devices
PPTX
Networking devices
PPTX
Computer network and networking peripherals (ITM)
PDF
Network Layer & Transport Layer
PPTX
Network Devices
PDF
Sample elements of computer networking
PDF
Understanding Networking Devices – A Brief Introduction | TechLinu.com
PPTX
Computer networking
PPTX
Network interface card(nic)
PPTX
Networking devices
PPTX
Network devices
PPT
Computer network basics
PPT
Internetworking devices(networking)
PPT
Welcome to Computer Networks
PPTX
Networking Fundamentals
DOCX
Common network devices
PPTX
Networking devices
PPTX
Network Hardware And Software
DOCX
Routers vs-switch
PDF
Networking Hardware
Networking Devices
Networking devices
Computer network and networking peripherals (ITM)
Network Layer & Transport Layer
Network Devices
Sample elements of computer networking
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Computer networking
Network interface card(nic)
Networking devices
Network devices
Computer network basics
Internetworking devices(networking)
Welcome to Computer Networks
Networking Fundamentals
Common network devices
Networking devices
Network Hardware And Software
Routers vs-switch
Networking Hardware
Ad

Viewers also liked (20)

PDF
Eincop Netwax Lab: EIGRP iii
PDF
OSPF Route Filtering
PDF
TCP Intercept
PDF
STP Protection
PDF
Introduction of Networking
PDF
VPN (virtual private network)
PDF
OSPF (open shortest path first) part iii
PDF
Nxll23 i pv6
PDF
OSPF (open shortest path first) part ii
PDF
IP Address
PDF
Nxll24 i pv6
PDF
SSL Web VPN
PDF
VRF Configuration
PDF
Wireless Technology
PDF
119163798 icnd1-practice-questions-9tut
PDF
VLAN (virtual local area network)
PDF
Routed Protocol
PDF
Cisco Internetworking Operating System (ios)
PDF
Nxll10 v lan and trunking
PDF
Why We Need IPv6
Eincop Netwax Lab: EIGRP iii
OSPF Route Filtering
TCP Intercept
STP Protection
Introduction of Networking
VPN (virtual private network)
OSPF (open shortest path first) part iii
Nxll23 i pv6
OSPF (open shortest path first) part ii
IP Address
Nxll24 i pv6
SSL Web VPN
VRF Configuration
Wireless Technology
119163798 icnd1-practice-questions-9tut
VLAN (virtual local area network)
Routed Protocol
Cisco Internetworking Operating System (ios)
Nxll10 v lan and trunking
Why We Need IPv6
Ad

Similar to Networking Devices (20)

PPTX
JEG-G4.pptx
PDF
NT BY AKATSUKI.pdf E
PPTX
Network connectivity devices
PDF
Computer Network Second Edition
PDF
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
DOC
Hand Note on Basic Internet Network Wordings
PDF
Note: Introduction to Computer Networks
PPTX
Networking concepts by Sachidananda M H
PPTX
concept of security and network administration
PPTX
Networking devices
DOCX
Computer network
PPTX
Basic Networking
PPTX
CS-109-Networks-and-Communication-Lesson-1.pptx
PDF
Introduction To Computer Networks
PDF
Data Communication
DOCX
Computer networks
PPTX
Networks
DOCX
Devices use in computer networking
PDF
Computer network
PPTX
Neetika (ppt)
JEG-G4.pptx
NT BY AKATSUKI.pdf E
Network connectivity devices
Computer Network Second Edition
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Hand Note on Basic Internet Network Wordings
Note: Introduction to Computer Networks
Networking concepts by Sachidananda M H
concept of security and network administration
Networking devices
Computer network
Basic Networking
CS-109-Networks-and-Communication-Lesson-1.pptx
Introduction To Computer Networks
Data Communication
Computer networks
Networks
Devices use in computer networking
Computer network
Neetika (ppt)

More from Netwax Lab (20)

PDF
Eincop Netwax Lab: Lab 1 static route
PDF
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
PDF
Eincop Netwax Lab: Redistribution
PDF
Eincop Netwax Lab: Route Redistribution
PDF
Nxll12 zone based firewall
PDF
Nxll11 bgp
PDF
Nxll09 access list
PDF
Nxll21 ospf filtering & summarization
PDF
Nxll16 basic asa v8.2
PDF
Nxll20 na ting
PDF
Nxll14 cut through-proxy on asa
PDF
Nxll17 dynamic routing with asa
PDF
Nxll18 vpn (s2 s gre & dmvpn)
PDF
Nxll19 vrrp (virtual router redundancy protocol)
PDF
Nxll22 role based cli
PDF
Nxll25 hsrp with failover
PDF
Nxll26 bgp ii
PDF
Nxll28 ospf iii
PDF
Eincop Netwax Lab: Vlan and Trunking ii
PDF
Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: Route Redistribution
Nxll12 zone based firewall
Nxll11 bgp
Nxll09 access list
Nxll21 ospf filtering & summarization
Nxll16 basic asa v8.2
Nxll20 na ting
Nxll14 cut through-proxy on asa
Nxll17 dynamic routing with asa
Nxll18 vpn (s2 s gre & dmvpn)
Nxll19 vrrp (virtual router redundancy protocol)
Nxll22 role based cli
Nxll25 hsrp with failover
Nxll26 bgp ii
Nxll28 ospf iii
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: EIGRP ii

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PDF
cuic standard and advanced reporting.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Unlocking AI with Model Context Protocol (MCP)
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
KodekX | Application Modernization Development
cuic standard and advanced reporting.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding

Networking Devices

  • 1. Networking Devices Networking Devices are units that mediate data in a computer network and are also called network equipment. Units which are the last receiver or generate data are called hosts or data terminal equipment. Devices are: 1. Gateway: this device is placed at a network node and interfaces with another network that uses different protocols. It works on OSI layers 4 to 7. 2. Router: a specialized network device that determines the next network point to which it can forward a data packet towards the ultimate destination of the packet. Unlike a gateway, it cannot interface different protocols. It works on OSI layer 3. 3. Switch: a device that allocates traffic from one network segment to certain lines (intended destination(s)) which connect the segment to another network segment. Unlike a hub, a switch splits the network traffic and sends it to different destinations rather than to all systems on the network. It works on OSI layer 2. Figure 1 Gateway Figure 2 Router Figure 3 Switch
  • 2. Networking Devices 4. Bridge: a device that connects multiple network segments along the data link layer. It works on OSI layer 2. 5. Hub: a device that connects multiple Ethernet segments, making them acts as a single segment. When using a hub, every attached device shares the same broadcast domain and the same collision domain. Therefore, only one computer connected to the hub is able to transmit at a time. Depending on the network topology, the hub provides a basic level 1 OSI model connection among the network objects (workstations, servers, etc.). It provides bandwidth which is shared among all the objects, in contrast to switches, which provide a connection between individual nodes. It works on OSI layer 1. 6. Repeater: a device which amplifies or regenerates digital signals received while sending them from one part of a network into another. It works on OSI layer 1. Some Hybrid Network Devices: 1. Protocol Converter: a hardware device that converts between two different types of transmission, such as asynchronous and synchronous transmissions. 2. Bridge Router (BRouter): a device that combines router and bridge functionality and therefore works on OSI layers 2 and 3. Figure 4 Bridge Figure 5 Repeater
  • 3. Networking Devices Hardware or software components that typically sit on the connection point of different networks, e.g. between an internal network and an external network: 1. Proxy Server: A proxy server is a server that makes Internet connections on behalf of the client PCs. All the requests for Internet access that are made by a client on a network are executed by the proxy server. In other words, a proxy server acts as a point of contact between a private network and a public network such as the Internet. 2. Firewall: a piece of hardware or software put on the network to prevent some communications forbidden by the network policy. 3. Network Address Translator (NAT): network service provided as hardware or software that converts internal to external network addresses and vice versa. Other hardware for establishing networks or dial-up connections: 1. Multiplexer: a device that combines several electrical signals into a single signal. 2. Network Interface Controller: a device connecting the attached computer to a wire-based computer network. 3. Wireless Network Interface Controller: a device connecting the attached computer to a radio-based computer network. 4. Modem: device that modulates an analog "carrier" signal (such as sound) to encode digital information, and that also demodulates such a carrier signal to decode the transmitted information, such as a computer communicating with another computer over a telephone network. 5. ISDN Terminal Adapter (TA): a specialized gateway for ISDN. 6. Line Driver: A device to increase transmission distance by amplifying the signal; used in base- band networks only.
  • 4. Networking Devices Specialized Network Devices: 1. Multilayer Switch: A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers. 2. Layer 4-7 Switch, Web-Switch, Content-Switch: Some switches can use up to OSI layer 7 packet information; these may be called layer 4-7 switches, content-switches, content services switches, web-switches or application-switches. Content switches are typically used for load balancing among groups of servers. Load balancing can be performed on HTTP, HTTPS, VPN, or any TCP/IP traffic using a specific port. Load balancing often involves destination network address translation so that the client of the load balanced service is not fully aware of which server is handling its requests. 3. IDS/IPS (Intrusion Detection System/Intrusion Prevention System): An Intrusion Detection System (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, Trojan horses, and worms). An Intrusion Prevention System is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. 4. Load Balancer: In computing, load balancing distributes workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource. Using multiple components with load balancing instead of a single component may increase reliability through redundancy. Load balancing usually involves dedicated software or hardware, such as a multilayer switch or a Domain Name System server process. 5. DNS (Domain Name System) Server: A name server is a computer hardware or software server that implements a network service for providing responses to queries against a directory service. It translates an often humanly-meaningful, text-based identifier to a system-internal, often numeric identification or addressing component. This service is performed by the server in response to a service protocol request.
  • 5. Networking Devices 6. CSU/DSU (Channel Service Unit/Data Service Unit): A CSU/DSU (Channel Service Unit/Data Service Unit) is a digital-interface device used to connect a Data Terminal Equipment device or DTE, such as a router, to a digital circuit, such as a T1 line. The CSU/DSU implements two different functions. The CSU is responsible for the connection to the telecom network while the DSU is responsible for handling the interface with the DTE. A CSU/DSU is the equivalent of the modem for an entire LAN. 7. Bandwidth Shaper: Traffic shaping (also known as "packet shaping") is a computer network traffic management technique which delays some or all datagrams to bring them into compliance with a desired traffic profile. Traffic shaping is a form of rate limiting. Differences between a Network Switch & a Hub? A switch is effectively a higher-performance alternative to a hub. People tend to benefit from a switch over a hub i their home network has four or more computers, or if they want to use their home network applications that generate significant amounts of network traffic, like multiplayer games or heavy music file sharing. In most cases, home networkers will not notice an appreciable difference between a hub and a switch (hubs do cost slightly less). Technically speaking, hubs operate using a broadcast model and switches operate using virtual circuit model. When four computers are connected to a hub, for example, and two of those computers communicate with each other, hubs simply pass through all network traffic to each of the four computers. Switches, on the other hand, are capable o determining the destination of each individual traffic element (such as an Ethernet frame) and selectively forwarding data to the one computer that actually needs it. By generating less network traffic in delivering messages, a switch performs better than a hub on busy networks. Figure 6 Channel Service Unit/Data Service Unit