Network Devices
In computer networks, many different network devices are used. These devices
used in computer networks has different characteristics. Each of them provides
a specific role. What are these network equipment’s?
Basically, these network equipment’s are:
Hubs
Bridges
Layer 2 Switches
Multi-Layer Switches
Routers
Modems
Repeater
Firewall
Hub
Hub is a very simple network device that is used in LANs. It is basically a
multiport repeater. Hubs do not decide anything and forwards any traffic to all
of the ports. So, they are not smart devices. They have multiple ports that
connects different network equipment’s in the same network.
Bridge
A Bridge is a device that connects different Local Area Networks (LANs). It
has single incoming port and single outgoing port. Bridges works at Layer 2,
Data-Link Layer. Bridges are also used for dividing the network into two
collision domains. But this solution was an early solution. It is rarely used
nowadays.
Layer 2 Switch
Layer 2 Switch is a network device that works in Layer 2 (Data Link Layer). It
is a smart device that collects data and switches the traffic according to this
data. Switches have many ports and with this characteristic, they expand the
network through endpoints.
Router
A Router is a network device that works on Layer 3. It is basically used to
connect different networks. Router is a smart device. So, it calculates the routes
according to some algorithms and then makes the route decision. Then forwards
the packets according to the Layer 3 IP addresses.
Repeater
Repeater in Computer Networks A repeater is a powerful network hardware
device that regenerates an incoming signal from the sender before retransmitting
it to the receiver. It is also known as a signal booster, and it helps in extending
the coverage area of networks.
Repeaters are defined as a networking device that is used to amplify and
generate the incoming signal. Repeaters work at the physical layer of the OSI
model. The main aim of using a repeater is to increase the networking distance
by increasing the strength and quality of signals.
The performance of Local Area Networks (LANs) and Wide Area Networks
(WANs) repeaters are used. Using repeaters helps to reduce error, and loss of
data and provides with delivery of data at specified locations only. The major
advantage of using a repeater is that it provides with transfer of data with more
security and over a long distance.
Repeater
Features of Repeaters
Repeater can regenerate the signal without modifying it.
Repeaters can be used in analog signals and digital signals .
Repeaters can extend the range of networks.
Dynamic networking is supported by repeater.
Use of Repeaters reduces error and loss of data.
Working of Repeaters
Initially the source system transmits the signals. This source systems
can be a mobile phone, laptop or radio.
This transmitted signal from the source system travels in air if it’s
wireless network or through the cable if it is wired network. As the
signal goes away from the source it’s strength gets weak.
The signal received to the repeater is not the actual signal sent by
source system but a weak signal. Therefore repeater amplifies this
weak signal to get it strengthen.
The strengthen signal is now being sent from the repeater to its
destination. This signal is more stronger and can travel at longer
distance. In short, it extends the network without losing the quality of
signal.
Repeaters are therefore used in various wireless technologies such
as Wi-Fi and wired technologies such as ethernet.
Types of Repeaters
According to the functions and features repeaters are divided into three types.
They are as follow:
1. According to the type of Signals
According to the type of signal being generated by the Repeater they are
classified as:
Analog Repeater: Analog repeaters are used to amplify only the
analog signals. Analog repeaters receives the analog signal, amplifies
it and then regenerates it as the output. Analog repeaters were mostly
used in the older network technologies where analog signal was used.
Digital Repeater: Digital repeaters are the type of repeaters that
does not amplify digital signal but regenerates it directly. Digital
repeaters are mostly used in the modern technologies where digital
signal is being used. Digital repeaters are also capable to reconstruct
a distorted signal.
2. According to the type of Connected Network
Based on the type of network the repeaters can connect they are categorized as
below:
Wired Repeaters: Wired repeaters are used in wired Local Area
Networks(LANs). Wired repeater receives the signal and repeats it.
This helps to extend the network travel data without loosing it’s
strength and data.
Wireless Repeaters: Wireless repeaters are used in wireless Local
Area Networks(LANs) and Cellular networks. A router connected in
the network sends wireless signal to the repeater. Once received,
repeater broadcast the signal to increase the coverage of network.
Advantages of Repeater
Better Performance of Network: Repeaters provide with better
performance of network because they do not always depend on
processing overheads at the time.
Cost Effective: Repeaters are more cost effective as compared to
other network devices therefore they are cost effective.
Extends the network: Repeaters provides with an advantage to
extend the available network for transmission of data.
No Physical barriers: Using physical devices can led to some
barrier while transmission of signals. With the help of wireless
repeaters such issues are resolved.
Enhanced Signals: When computer devices and routers are
connected in a network over long distance it weakens the strength of
signals. While using repeaters it improves the strength of signals
even over long distances.
Disadvantages of Repeater
Network Traffic: Repeaters do not have features to segment the
network traffic. Therefore repeaters do lack with the property to
congestion.
Network Segmentation: As repeaters do not have feature to segment
the network traffic repeaters cannot create a separate traffic from one
cable to another.
Gateway
A gateway is a computer on a network that provides the interface between two
applications or networks that use different protocols. They are also used to
provide a connection to the Internet. A gateway in a network converts
information from one protocol to another and then transfers it over the web.
A gateway is a network node that forms a passage between two networks
operating with different transmission protocols. The most common type of
gateways, the network gateway operates at layer 3, i.e. network layer of the
OSI (open systems interconnection) model.
However, depending upon the functionality, a gateway can operate at any of the
seven layers of OSI model. It acts as the entry – exit point for a network since
all traffic that flows across the networks should pass through the gateway. Only
the internal traffic between the nodes of a LAN does not pass through the
gateway.
Features of Gateways
Gateway is located at the boundary of a network and manages all data
that inflows or outflows from that network.
It forms a passage between two different networks operating with
different transmission protocols.
A gateway operates as a protocol converter, providing compatibility
between the different protocols used in the two different networks.
The feature that differentiates a gateway from other network devices is
that it can operate at any layer of the OSI model.
It also stores information about the routing paths of the communicating
networks.
When used in enterprise scenario, a gateway node may be supplemented
as proxy server or firewall.
A gateway is generally implemented as a node with multiple NICs
(network interface cards) connected to different networks. However, it
can also be configured using software.
It uses packet switching technique to transmit data across the networks.
Types of Gateways
On basis of direction of data flow, gateways are broadly divided into two
categories −
Unidirectional Gateways − They allow data to flow in only one
direction. Changes made in the source node are replicated in the
destination node, but not vice versa. They can be used as archiving tools.
Bidirectional Gateways − They allow data to flow in both directions.
They can be used as synchronization tools.
Firewall
A firewall is a network security device, either hardware or software-based,
which monitors all incoming and outgoing traffic and based on a defined set of
security rules it accepts, rejects or drops that specific traffic. Accept : allow
the traffic Reject : block the traffic but reply with an “unreachable
error” Drop : block the traffic with no reply A firewall establishes a barrier
between secured internal networks and outside untrusted network, such as the
Internet.
History and Need for Firewall
Before Firewalls, network security was performed by Access Control Lists
(ACLs) residing on routers. ACLs are rules that determine whether network
access should be granted or denied to specific IP address. But ACLs cannot
determine the nature of the packet it is blocking. Also, ACL alone does not
have the capacity to keep threats out of the network. Hence, the Firewall was
introduced. Connectivity to the Internet is no longer optional for organizations.
However, accessing the Internet provides benefits to the organization; it also
enables the outside world to interact with the internal network of the
organization. This creates a threat to the organization. In order to secure the
internal network from unauthorized traffic, we need a Firewall.
Types of Firewall
Firewalls are generally of two types: Host-based and Network-based.
1. Host- based Firewalls : Host-based firewall is installed on each
network node which controls each incoming and outgoing packet. It
is a software application or suite of applications, comes as a part of
the operating system. Host-based firewalls are needed because
network firewalls cannot provide protection inside a trusted network.
Host firewall protects each host from attacks and unauthorized
access.
2. Network-based Firewalls : Network firewall function on network
level. In other words, these firewalls filter all incoming and outgoing
traffic across the network. It protects the internal network by filtering
the traffic using rules defined on the firewall. A Network firewall
might have two or more network interface cards (NICs). A network-
based firewall is usually a dedicated system with proprietary
software installed.
Advantages of using Firewall
1. Protection from unauthorized access: Firewalls can be set up to
restrict incoming traffic from particular IP addresses or networks,
preventing hackers or other malicious actors from easily accessing a
network or system. Protection from unwanted access.
2. Prevention of malware and other threats: Malware and other
threat prevention: Firewalls can be set up to block traffic linked to
known malware or other security concerns, assisting in the defense
against these kinds of attacks.
3. Control of network access: By limiting access to specified
individuals or groups for particular servers or applications, firewalls
can be used to restrict access to particular network resources or
services.
4. Monitoring of network activity: Firewalls can be set up to record
and keep track of all network activity. This information is essential
for identifying and looking into security problems and other kinds of
shady behavior.
Disadvantages of using Firewall
1. Complexity: Setting up and keeping up a firewall can be time-
consuming and difficult, especially for bigger networks or companies
with a wide variety of users and devices.
2. Limited Visibility: Firewalls may not be able to identify or stop
security risks that operate at other levels, such as the application or
endpoint level, because they can only observe and manage traffic at
the network level.
3. False sense of security: Some businesses may place an excessive
amount of reliance on their firewall and disregard other crucial
security measures like endpoint security or intrusion detection
systems.
4. Limited adaptability: Because firewalls are frequently rule-based,
they might not be able to respond to fresh security threats.
5. Performance impact: Network performance can be significantly
impacted by firewalls, particularly if they are set up to analyze or
manage a lot of traffic.